Lookout company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

lookout.com

Lookout has not claimed their Profile.

1 of Lookout's Competitors have claimed theirs.

Here's what their competitors are saying:

SlashNext company logo

SlashNext claims to be a better solution than Lookout due to:

Stronger zero-hour phishing protection. Only vendor that can protect users against natural language Smishing attacks

Lookout's alternatives and competitors

See how Lookout compares to similar products. Lookout's top competitors include Zimperium, Veracode, and Red Canary.

Zimperium provides enterprise mobile threat defense. The Zimperium Mobile Threat Defense system delivers enterprise-class protection for Android and iOS devices against…

Lookout vs. Zimperium

View more in-depth data on:

  • Competitors
  • Products
  • Customer References and more
  • Veracode is an AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a resu…

    Lookout vs. Veracode

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Red Canary provides a multi-dimensional endpoint threat detection system that combines technology with human analysts to assess thousands of potentially malicious event…

    Lookout vs. Red Canary

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • SlashNext logo

    Analyst Briefing Submitted

    SlashNext administers network-based cyber security specifically focused on detecting and blocking web-based phishing attacks, data theft, and malware.

    Lookout vs. SlashNext

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Bitglass delivers technologies that allow the network perimeter to deliver total data protection for the enterprise in the cloud, on mobile devices, and anywhere on the…

    Lookout vs. Bitglass

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • RiskIQ is a provider of enterprise security solutions beyond the firewall. The company's technology intelligently interacts with websites and mobile applications, model…

    Lookout vs. RiskIQ

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Deep Instinct applies a subset of artificial intelligence (AI), known as deep learning, to cybersecurity. The company has built a vast neural network that is trained on…

    Lookout vs. Deep Instinct

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Wandera is a mobile technology company based in San Francisco, London, Singapore, and mainland Europe. Its gateway architecture and proprietary technology are designed …

    Lookout vs. Wandera

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • FireEye is a provider in stopping next-generation threats, such as zero-day and APT attacks, that bypass traditional defenses and compromise over 95% of networks. The F…

    Lookout vs. FireEye

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • MobileIron offers enterprise mobility management solutions to combine data-driven mobile device management with real-time wireless cost control. Available as an on-prem…

    Lookout vs. MobileIron

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • NowSecure is a mobile app security software company. The NowSecure Platform delivers fully automated mobile app security testing with the speed, accuracy, and efficienc…

    Lookout vs. NowSecure

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Appthority provides a cloud-based platform that automatically identifies and grades risky behavior in mobile apps including known and unknown malware, new malware used …

    Lookout vs. Appthority

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Mi3 Security, formerly MetaIntell, takes a proactive approach to company protection of business and government entities, letting them secure the escalating demand for, …

    Lookout vs. Mi3 Security

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Skycure specializes in mobile threat defense. Skycure's platform offers unparalleled depth of threat intelligence to predict, detect and protect against the broadest ra…

    Lookout vs. Skycure

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Mojave Networks, formerly Clutch Mobile, has developed a cloud-based approach to mobile security for enterprises that detects advanced threats and protects company data…

    Lookout vs. Mojave Networks

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • AirWatch is a provider of enterprise-grade Mobile Device Management, Mobile application management, mobile content management, email, and security management solutions.…

    Lookout vs. AirWatch

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Mobile Armor is a managed services provider of enterprise mobile data security.

    Lookout vs. Mobile Armor

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more
  • Good Technology, a provider in secure enterprise mobility solutions, offers a platform employees can securely connect, communicate, and collaborate using personal iOS, …

    Lookout vs. Good Technology (acquired by Visto)

    View more in-depth data on:

    • Competitors
    • Products
    • Customer References and more

Work for Lookout?

Brief our analysts.

Get in front of tech buyers.

100% free.

No pay-to-play nonsense.

You May Also Like

Zimperium Logo
Zimperium

Zimperium provides enterprise mobile threat defense. The Zimperium Mobile Threat Defense system delivers enterprise-class protection for Android and iOS devices against the next generation of advanced mobile threats. Developed for mobile devices, Zimperium uses patented, behavior-based analytics that continuously runs on the device to protect mobile devices against WiFi, cellular, and host-based threats wherever business takes them.

Veracode Logo
Veracode

Veracode is an AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities.

Recorded Future Logo
Recorded Future

Recorded Future delivers threat intelligence powered by patented machine learning to significantly lower risk, empowering organizations to reveal unknown threats before they impact business, and enable teams to respond to security alerts faster.

Workspot Logo
Workspot

Workspot makes software solutions for the mobile workplace. The company has created a mobile workplace that helps end-users and IT departments separate work-related content and personal information stored on the device.

Capriza Logo
Capriza

Capriza fundamentally disrupts the speed and economics of taking existing business applications mobile. Capriza's end-to-end enterprise mobility platform enables IT and lines of business to mobile-enable critical business workflows in a matter of days without the need to access source code, APIs, or integration. The solution is applicable for packaged applications such as SAP, Oracle, Salesforce as well as custom built solutions. Capriza extends the capability of these applications, in a simple, elegant way, onto any smartphone, tablet or desktop.

Deep Instinct Logo
Deep Instinct

Deep Instinct applies a subset of artificial intelligence (AI), known as deep learning, to cybersecurity. The company has built a vast neural network that is trained on hundreds of millions of files. There are no human dependencies related to identifying and preventing cyber attacks. As a result, threats are detected >99% of the time, with a false positive rate <0.1%.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.