Lookout Mobile Post Perimeter Security and Antivirus Software

Lookout enables mobile security on IOS and Android platform by monitoring real-time risk at the endpoint, including phishing threats, application security.

Lookout provides continuous conditional access to corporate resources. This happens only when there is an acceptable level of risk, and the device is in compliance with policy.


  • lookout offers real time protection against phishing attacks.
  • Allows you to set policy against non compliant mobile apps.
  • Lookout provides a cloud-based console offering threat intelligence
  • Lookout Integrates with leading Enterprise Mobility Management Solutions.
  • Identify Network-based threats like Man-in-the-middle.
  • Identify app-based threats: Malware, rootkits, and side-loaded apps
  • Identify device-based threats: Jailbroken / rooted mobile devices.
  • Detect insecure environments for root detection in real time
  • Protect user data and secure sensitive data in real time
  • Centrally managed security policy for all your mobile devices


  • Lookout mobile threat detection across apps, network, and device.
  • Secure mobility across devices either corporate owned or BYOD.
  • Privacy policy minimises data collection from corporate or stakeholders alike.
  • Lookout gives end-to-end visibility into the spectrum of mobile risk.
  • Lookout enables users to remain productive and secure
  • Enterprise Grade Mobile Security for the public sector.
  • Simple three click easy deployment process to enroll users.
  • adding mobile security within your cyber security policy
  • Embrace more flexible working and mobility programs, including BYOD,
  • Mobile privacy by design


£55 a device a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 2 7 2 5 1 2 0 6 5 3 5 0 2 6


Telephone: 07951 290632

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Mobile Device Management. (MDM)
Identity and access management solutions
Cloud deployment model
Public cloud
Service constraints
System requirements
  • IOS
  • Android
  • Chrome Book

User support

Email or online ticketing support
Email or online ticketing
Support response times
S1- critical service impact:30 mins 24x7x365
S2- major service impact: 2 hours 24x7x365
S3- minor service impact : 8 hours 8x5
S4- no service impact : 1 business day 8x5
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Primenet will provide both a technical account manager and a cloud support engineer with the service.

Primenet offers multiple options to fulfill your Support needs.
Our Standard Support Package provides for your basic Support needs while our Premium and Premium Plus Programs add 24x7x365 Support Access in the event your needs extend beyond normal business hours. In addition, our Premium Plus Program includes value added services that will ensure your success in securing your Mobile Fleet.
Support available to third parties

Onboarding and offboarding

Getting started
The Lookout service can be fully managed by Primenet, or manged by the end user with assistance from Primenet.

Primenet fully supports installation and deployment of their recommended vendor solutions.

Primenet can provide training of the service and also provide vendor documentation.
Service documentation
Documentation formats
End-of-contract data extraction
Lookout does not collect any Personal Identifiable Information so a simple uninstall from the mobile device will suffice.
End-of-contract process
You will contacted three months from contract end to understand if you would like to renew the contract over the same term. If you decline, your tenant will be closed down on contract end date.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Lookout and Android and IOS security company with no solution for the desktop platform.
Service interface
Customisation available


Independence of resources
Lookout is hosted on AWS in three high availability zones. and continue to monitor the number of devices using their service to ensure optimum service.


Service usage metrics
Metrics types
Primenet can deliver detailed reports on a Weekly, Monthly or Quarterly basis. These metrics are predefined and consulted on at the beginning of deployment, and can be customised to your needs of reporting to senior stakeholders or compliance.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There is no data to export
Data export formats
Other data export formats
There is no data to export from the service
Data import formats
Other data import formats
There is no data to import

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Approach to resilience
Available on request
Outage reporting
Email Alerts

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
Lookout have tiered access to the management console.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ACS Registrars Limited
ISO/IEC 27001 accreditation date
9th November 2019
What the ISO/IEC 27001 doesn’t cover
All Primenet internal and external operations in the UK are Covered by the ISO27001 certification. Our German office is not certified as yet.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Security Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Any changes to the product are pushed over the air.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All threats would be reported in real time
Incident management type
Supplier-defined controls
Incident management approach
The application is proactive and not reactive so there is no need for reporting.

All reporting is managed within the management portal.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£55 a device a year
Discount for educational organisations
Free trial available
Description of free trial
There is a free to download restricted features stand alone version available in the App and Play Store depending on what operating system you have on your phone. This will give you a basic insight into the application and how it works.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.