All resources sponsored by:

Lookout

9 Matches
Mobile Security for the Remote Worker
sponsored by Lookout
RESOURCE:In the remote world, mobile device use is increasing, employees are taking more risks, and 9 to 5 is out the window. The result: security is tougher to nail down. With phishing on the rise (and productivity apps attracting phishing), mobile devices must be monitored more closely than ever. Take a glance at this infographic for more details.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


TikTok Case Study
sponsored by Lookout
WHITE PAPER:Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020
Get This Now


Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive
sponsored by Lookout
DATA SHEET:IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.
Posted: 24 Jul 2020 | Published: 24 Jul 2020
Get This Now


Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER:It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.
Posted: 23 Jul 2020 | Published: 23 Jul 2020
Get This Now


Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER:The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020
Get This Now


CIO Insight: Why Mobile Threat Defense
sponsored by Lookout
DATA SHEET:According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.
Posted: 22 Jul 2020 | Published: 22 Jul 2020
Get This Now


Lookout Enables GDPR Compliance
sponsored by Lookout
CASE STUDY:In this case study, follow Henkel’s GDPR compliance journey as they partner with Lookout to be able to turn off collection and storage of end-user personal data and limit access rights to data by building a multitiered role-based access admin feature. Read on to learn more about this partnership.
Posted: 06 May 2019 | Published: 24 Apr 2020
Get This Now


Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE:Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017
Get This Now


Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE:As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016
Get This Now


9 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info