ESG's Dave Gruber discusses email and other security challenges for employees using their mobile devices. This is Part 2 of 2.
Watch part 1 of this series:
Dave: Hi, this is Dave Gruber, senior ESG analyst, and I'm here with part two of our continuing email security strategy. I'm joined by Aaron Cockerill, Chief Strategy Officer from Lookout Security. And in this segment, we want to learn a little bit more about how Lookout Security is addressing a combination of mobile-specific security requirements together with the email threat vector.
So, Aaron, can you tell us a little bit about how Lookout is addressing both the threat landscape associated with email but maybe the broader mobile security situation?
Aaron: Yeah. Thanks, Dave. Good to be here. We concentrate on a number of areas. The first one is enabling users to identify social engineering and phishing attacks. So, if a user is sent a message that has a link in it that we can identify as a potential phishing or malicious link that will install malware and so on, we will block access to that link warn the user that this is potentially a phishing attack.
So, that's the first layer of response. It's actually, whilst we call it phishing, it's a lot more like, for example, what you would receive as protections behind a corporate firewall from a secure web gateway but on the local device. And that's really important because the traffic is not sent off the device, the solution respects user privacy, which is really important in a mobile device.
The next layer of protection is all around stopping the installation of malware. So, if a user attempts to install malicious code or a malicious application and so on, or to jailbreak or root their phone or any type of malicious modification of the operating system, we will detect that. We will make sure that that device, firstly, that the user is warned that this device is now out of security compliance for the company.
And then we'll also in those instances, block that device from accessing sensitive corporate data, thereby also protecting the corporation from a potential attack from a compromised device.
Dave: So, lots going on on our mobile devices that super important that organizations pay attention to, but also have specific strategies to protect their end-users but importantly, to protect corporate data and corporate assets. And especially as in this climate, everybody's working at home and I'm sure people are depending on their personal devices more than ever.
Aaron, thank you so much for taking the time to be with me here today. This has been super insightful. I urge folks that are listening to check it out and find out more about how Lookout can assist you in protecting your mobile environments and on a broader perspective helping protect against some of the most typical modern-day attacks today that involve phishing in a pretty significant way, but also involve the other factors on mobile devices as well.
So, thanks very much, Aaron, and thank you all for joining me today.