Lookout Mobile Post Perimeter Security and Antivirus Software
Lookout enables mobile security on IOS and Android platform by monitoring real-time risk at the endpoint, including phishing threats, application security.
Lookout provides continuous conditional access to corporate resources. This happens only when there is an acceptable level of risk, and the device is in compliance with policy.
Features
- lookout offers real time protection against phishing attacks.
- Allows you to set policy against non compliant mobile apps.
- Lookout provides a cloud-based console offering threat intelligence
- Lookout Integrates with leading Enterprise Mobility Management Solutions.
- Identify Network-based threats like Man-in-the-middle.
- Identify app-based threats: Malware, rootkits, and side-loaded apps
- Identify device-based threats: Jailbroken / rooted mobile devices.
- Detect insecure environments for root detection in real time
- Protect user data and secure sensitive data in real time
- Centrally managed security policy for all your mobile devices
Benefits
- Lookout mobile threat detection across apps, network, and device.
- Secure mobility across devices either corporate owned or BYOD.
- Privacy policy minimises data collection from corporate or stakeholders alike.
- Lookout gives end-to-end visibility into the spectrum of mobile risk.
- Lookout enables users to remain productive and secure
- Enterprise Grade Mobile Security for the public sector.
- Simple three click easy deployment process to enroll users.
- adding mobile security within your cyber security policy
- Embrace more flexible working and mobility programs, including BYOD,
- Mobile privacy by design
Pricing
£55 a device a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
3 2 7 2 5 1 2 0 6 5 3 5 0 2 6
Contact
PRIMENET LIMITED
Tony Smith
Telephone: 07951 290632
Email: tony@primenetuk.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Mobile Device Management. (MDM)
Identity and access management solutions - Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
-
- IOS
- Android
- Chrome Book
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
S1- critical service impact:30 mins 24x7x365
S2- major service impact: 2 hours 24x7x365
S3- minor service impact : 8 hours 8x5
S4- no service impact : 1 business day 8x5 - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Primenet will provide both a technical account manager and a cloud support engineer with the service.
Primenet offers multiple options to fulfill your Support needs.
Our Standard Support Package provides for your basic Support needs while our Premium and Premium Plus Programs add 24x7x365 Support Access in the event your needs extend beyond normal business hours. In addition, our Premium Plus Program includes value added services that will ensure your success in securing your Mobile Fleet. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The Lookout service can be fully managed by Primenet, or manged by the end user with assistance from Primenet.
Primenet fully supports installation and deployment of their recommended vendor solutions.
Primenet can provide training of the service and also provide vendor documentation. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Lookout does not collect any Personal Identifiable Information so a simple uninstall from the mobile device will suffice.
- End-of-contract process
- You will contacted three months from contract end to understand if you would like to renew the contract over the same term. If you decline, your tenant will be closed down on contract end date.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Lookout and Android and IOS security company with no solution for the desktop platform.
- Service interface
- No
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Lookout is hosted on AWS in three high availability zones. and continue to monitor the number of devices using their service to ensure optimum service.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Primenet can deliver detailed reports on a Weekly, Monthly or Quarterly basis. These metrics are predefined and consulted on at the beginning of deployment, and can be customised to your needs of reporting to senior stakeholders or compliance.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Lookout
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- There is no data to export
- Data export formats
- Other
- Other data export formats
- There is no data to export from the service
- Data import formats
- Other
- Other data import formats
- There is no data to import
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- Available on request
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Lookout have tiered access to the management console.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ACS Registrars Limited
- ISO/IEC 27001 accreditation date
- 9th November 2019
- What the ISO/IEC 27001 doesn’t cover
- All Primenet internal and external operations in the UK are Covered by the ISO27001 certification. Our German office is not certified as yet.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Security Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO 27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Any changes to the product are pushed over the air.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- N/A
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All threats would be reported in real time
- Incident management type
- Supplier-defined controls
- Incident management approach
-
The application is proactive and not reactive so there is no need for reporting.
All reporting is managed within the management portal.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £55 a device a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- There is a free to download restricted features stand alone version available in the App and Play Store depending on what operating system you have on your phone. This will give you a basic insight into the application and how it works.