Lookout, from the San Francisco-based company of the same name, is a platform offering mobile endpoint security.
$2.99
Per Device Per Month
Microsoft Defender for Endpoint
Score 8.7 out of 10
N/A
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
Because of its integration with Windows, it is very easy to deploy and manage. Any IT department should be able to leverage the software and interface. The admin portal provides weighted recommendations that comprise the Secure Store, offering admins, security teams, and business owners valuable insights into their security footprint without requiring a strong security background. The software would be ideal for small and mid-sized businesses that cannot dedicate resources to security. Larger enterprises would also benefit, but may require the enhanced license.
One, it's crazy lightweight, so compared to some of the competitors that we also have used with our security services, it's really lightweight and so I don't have a lot of overhead on the system that it's running on.
They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.
Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.
Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.
More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.
So the fact that Defender for Endpoint still works with signatures is actually, I don't know, a little difficult for us because, I mean, since Microsoft trusts those signatures, you can easily inject code. And we've done it many times. To show that you can inject code through vulnerabilities like CV 2013, 99, and 33 but still keep the signature. So because of the trust of those signatures, the malware just kind of slides into the environment without Defender knowing. That's the first part. The second part is that the behavioral analysis is not precisely its Prime. It's not Defender's best capability for endpoints. So, Defender does not identify all behaviors considered by other EDRs in the market.
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
It offers multiple security features and integrates well with Microsoft ecosystems. A workflow for threat detection, investigation, automated remediation, and a centralized dashboard is an added advantage. This application is mainly designed for experienced users; new users may feel challenged.
Microsoft Defender for Endpoint chugs along just fine no matter what we throw at it and what systems it's running on. It doesn't take up a lot of resources either, so that's welcomed.
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Deployment was handled by our team here and everything went pretty smoothly. We did have a few hiccups in our test group, but that only took a bit to get ironed out.
Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution. MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.
Cylance's policy is to block everything and requires an active person to monitor and unblock legitimate processes. As updates and software continue to evolve, it is a full-time job to be a Cylance administrator. Microsoft Defender for Endpoint is a set-and-forget solution that catches threats when they occur and leaves you to focus on your work unimpeded.
Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data.
Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs.