Skip to main content
TrustRadius
Lookout

Lookout

Overview

What is Lookout?

Lookout, from the San Francisco-based company of the same name, is a platform offering mobile endpoint security.

Read more

Learn from top reviewers

Commonly Discussed Topics

Share Feedback
These are common buyer considerations generated to help you find the best products. While this is a beta feature, it is our mission is to provide you with the best information possible to make confident and trusted technology decisions.

Return to navigation

Pricing

View all pricing

Premium

$2.99

Cloud
Per Device Per Month

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Lookout + Google MDM - Full Integration Overview

YouTube

Lookout 2.0 Demo

YouTube

Quo Vagis Demo 05 - DLC Models #1, Point Lookout

YouTube

JWE Modding: Monorail Lookout Stops (Ultimate Mixed Eras 1.6 feature demo)

YouTube

PAW Patrol - My Size Lookout Tower demo with toys

YouTube

Demo of Flexilis (Now Called "Lookout") - Mobile Security Application

YouTube
Return to navigation

Product Details

What is Lookout?

Lookout Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

Companies can't remove reviews or game the system. Here's why
(1-3 of 3)

Lookout for Mobile/App Cybersecurity You Can Trust Where You Need To

Rating: 9 out of 10
September 23, 2019
JB
Vetted Review
Verified User
Lookout
3 years of experience
Lookout is used for proactive mobile device (endpoint) security. Everyone on our team hails from a cybersecurity background so we are very aware that a cybersecurity breach is no longer a question of "if", but when. The business problem Lookout addresses for us, is today most of the world transacts via some type of mobile device and using, as Lookout says, "40 million+" different apps. We valued that Lookout takes a proactive security posture and visibility into threat data from 100 million mobile devices within their global network that they include when they scan our devices and apps for potential threats. That's incredible cybersecurity protection for us to have 24/7 access to, right where we need it most.
  • A key strength is their proactive cybersecurity posture. That's not nearly as common as it should be, especially with the level of awareness of the scope of the problem these days.
  • Another key strength is their global network. That level of visibility makes all the difference, in today's cyber wars where, and you can quote me: "When an Advanced Persistent Threat (APT) attack is just a matter of time, when even zero day detection is too late, radically different approaches are required if we are ever to win these cyberwars." That's exactly what Lookout has done, and continues to do.
  • One of the greatest cyber risks in mobile is what every one uses - apps! Apps from Starbucks to Nordstroms to banking to the myriad of productivity tools we all use everyday to exceed our business/productivity goals. Now with the ability of threat actors to trojanized apps, those Lookout scans that don't require you to do any upgrades, and their proactive cybersecurity posture are business critical for everyone.
Cons
  • They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.
  • Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.
  • Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.
  • More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.
Best suited when a company is aware of the level of cyber threat out there, aware of the need to protect at their mobile devices and at the app level.

Ironically, it's also best suited when they are not at all aware. Why? Because that's exactly where the threat actors are! All you'd need to do is a few scans, for the unaware/or in denial, to get onboard. The ease of use you provide, and a demo of the cyberintelligence they get as a client "at no extra cost" will convert them pretty quickly.



  • It's always difficult, in cyber, to put an ROI on a "non-event". As they say, the best that can happen to a CISO's day, is that no breach happened.
  • Lookout's auto scan and auto-reporting that every app has been scanned, the number of apps and what has/has not been found gives a level of comfort, and embeds a level of alertness everyday, never to be taken for granted.
  • There has been no negative impact. I open those scans every time, in anticipation of good news but realizing there well could be news of another kind. What I am as confident as possible about, is that, if there were an issue, Lookout would have been there to see it, and take the appropriate actions.
  • In the earlier days of cybersecurity, one would have had to hire an entire team of cyber experts or outsource it to a managed cybersecurity company at a cost that might have prohibited business. Lookout has made is easier for us all to stay compliant, aware and grow.
They were all good in their day, but then they evolved into "we do everything" mode. We prefer the technical horsepower of purpose-built solutions where the problem is compelling, which mobile/app cybersecurity is. Otherwise, discovery of a source issue, cost and complexity that comes inherently in "we do everything" offerings is exponentially less effective.

Lookout - Personal & Enterprise Mobile Security

Rating: 10 out of 10
September 01, 2016
NJ
Vetted Review
Verified User
Lookout
3 years of experience
Lookout is utilized for mobile security throughout our organization. It is deployed across all Android devices within the organization so we can stay ahead on mobile security. It regularly scans for malware, either scheduled or on demand when desired. Meanwhile, between scans it also monitors the file system so any files downloaded locally to a device are also checked instantaneously. Scan history is tracked and can be viewed online at any time to ensure security is universal across all applications. Malware definitions are updated regularly, so it helps secure mobile devices which often contain personal and bank information, and could be easily hacked. Aside from personal information security, Lookout also offers great flexibility for remote device monitoring. Users can track all types of important information from their device. There's a nice online feature which allows users to find their device on demand at any given time. If the device is in silent mode there is a way to make the device "Scream" through the online interface so it makes a sound even without sound currently enabled locally. It also allows for remote wiping of the device if desired. Lastly a premium feature is backing up and download all contact/call data.
  • Scanning of all device apps with up to date definitions.
  • Backing up all device related data to the cloud.
  • Finding devices.
Cons
  • Letting users know when device backups stop after premium services/payment expire.
Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
  • Lookout has minimized lost devices, by essentially enabling all users to find their device no matter where it may be lost. Almost all devices are recoverable with Lookout installed and an ability to get to the current location of the device. This prevents excessive replacement device costs.
  • If a device cannot be physically recovered all personal data on the device can be wiped remotely. This reduces data breach risk for a lost/stolen device.
Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution. MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.

A reliable solution for the backup and protection of mobile phones

Rating: 9 out of 10
April 11, 2019
MC
Vetted Review
Verified User
Lookout
1 year of experience
Lookout is an antivirus that we use throughout our company because we are aware that today nobody is safe from a cyber attack. That is why we keep our phones under analysis in search of any vulnerability like malware, as well as any downloaded file that may cause some alteration of the system. In this way, personal and work security is maintained, since identity theft or banking data or important files are avoided.
  • It emits alerts before any vulnerability found, thus avoiding damages.
  • It has a very simple interface so it is easy to use.
  • It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft.
  • It runs in the background so it does not interrupt any activity.
  • Its access is very flexible since only the internet is required to access through the application or web.
Cons
  • It tends to consume a lot of battery.
  • Your configuration is not very manageable.
  • Requires better optimization.
  • Many times it is updated or not but it does not issue a notification where it is indicated if said action has been carried out.
  • It is ideal for when the phone has been lost or stolen because it detects the immediate location of the phone.
  • Although it is capable of scanning at high speed, it tends to consume the battery very fast, so it has to be a big problem.
  • It is software that can have a personal or business level, and in both cases, security is maintained through its function as an antivirus.
  • If you want to make a copy of the security of personal or business information as files, this is ideal for it, as it works as a backup.
  • Business security based on mobile phones is kept safe thanks to the fact that this antivirus allows us to be aware of the state of each of them.
  • It allows all the information available through mobile phones to be kept safe since it also provides a backup of it.
If you have tried other products such as Malwarebytes but it tends to consume too many resources on mobile, so for its implementation it requires more advanced phones while Lookout does not require so many resources. That makes it possible to be implemented on any mobile device. Besides, this not only provides security against viruses but also provides a backup of information and search or tracking of the device.
Return to navigation