Mobile EDR for security professionals by security professionals

By: Aaron Cockerill

While the announcement is a major milestone for the company, as we’re introducing the industry’s first comprehensive endpoint detection and response (EDR) solution for mobile, it’s also a celebration of our threat intelligence team’s track record. Our researchers have exposed some of the most sophisticated mobile threats ever found, such as Pegasus, Dark Caracal, Monokle and most recently SilkBean. In fact, our research team has been responsible for over 90 percent of all mobile threat discoveries over the past five years. They’re simply the best in the business.

With this introduction, your organization has the opportunity to use the same tools to investigate cyberattacks involving mobile devices and prevent data breaches. These are research tools designed by security professionals for security professionals.

We purpose-built a security platform for mobile

The fact is, delivering effective security and EDR for mobile is very different to that of legacy devices such as servers, desktops and laptops. On mobile devices you cannot rely on tactics that are battery draining, privacy-invasive, or require privileged access to the operating systems and apps.

Lookout understood these challenges over a decade ago and have been continuously innovating on our solution ever since. We designed a platform from the ground up that made us experts in leveraging big data and machine intelligence-based analysis. This enables us to deliver a distinctly mobile-first approach that is sensitive to the constrained resources on mobile platforms and the privacy of end users while supporting the threat detection and response process.

The foundation of our security platform is grounded on our advanced machine intelligence leveraging the Lookout Security Graph. The Graph contains behavioral analysis of telemetry data from nearly 200 million devices, 120 million apps and continuously analyzes over 4 million URLs every day. This platform automatically detects threats continuously without human intervention even if we have never seen them before.

Read more...