Lookout joins Google Cloud’s
BeyondCorp Alliance for visibility
Lookout is also a Google Cloud
Technology Partner and earlier this
year, Lookout announced the launch
of the Post-Perimeter Security Alliance
with Google Cloud and other members
to address a pressing challenge for
enterprises: how to integrate security
capabilities across endpoint, cloud and
identity to protect access to corporate
data while enabling productivity.
Today, organisations are adopting
formal mobility programmes as a way
to empower employee productivity and
Google’s Cloud Identity has become
one of the main ways for employees
to access enterprise applications from
mobile devices. Lookout and Cloud
Identity help ensure:
ookout, a leader in securing
the post-perimeter world, has
announced that it has joined
Google Cloud’s BeyondCorp Alliance as
one of the only mobile threat defence
vendors, giving organisations the ability
to dynamically monitor the health of an
endpoint connected to the enterprise
and feed that data to Google Cloud’s
context-aware access engine.
L
Lookout, alongside Google’s Cloud
Identity, ensures only trusted mobile
devices are accessing enterprise data
and apps via Cloud Identity.
“To secure the cloud-first, mobile-first
world, enterprises need to adopt a post-
perimeter solution that includes endpoint
protection, secure access to the cloud as
well as identity and access management
(IAM),” said Marc Jaffan, Vice President,
Business and Corporate Development
at Lookout. “By joining the BeyondCorp
58
To secure the cloud-
first, mobile-first
world, enterprises
need to adopt a post-
perimeter solution.
Alliance, Lookout securely enables mobile
productivity for Google’s Cloud Identity,
G Suite and Google Cloud Platform
customers, and furthers our vision to
provide security and productivity for the
modern, perimeter-less, cloud-delivered
and privacy-focused world.”
• Device health: Together, Lookout
and Cloud Identity help verify that a
device is healthy enough to access
applications and single sign-on
(SSO) platforms
• Automated detection and
remediation: Lookout provides
device health information (for
example, if the device has an app
that violates security policy) to Cloud
Identity and admin can then take
appropriate remediation action. This
includes the ability to block access
to G Suite and other enterprise apps
on unmanaged devices based on
Lookout risk status
• Threat visibility: Enterprises
have full visibility into out-of-date
operating systems, as well as into
risky device configurations and
jailbreak/root detections
• Phishing protection: With Lookout,
Cloud Identity customers can monitor
and block mobile attempts from web
and content-based threats. u
Issue 13
|
www.intelligentciso.com