Ivanti and Lookout Announce Extension on Partnership To Protect Mobile Devices - IT Security Guru

1 year ago 67

The concern betwixt Ivanti and Lookout, Inc is to beryllium extended successful a caller announcement made contiguous which volition spot Lookout Mobile Endpoint Security proceed to beryllium portion of the Ivanti Neurons automation platform. The combined solution, which besides includes Ivanti Go and Ivanti Neurons for Modern Device Management, allows Ivanti customers to deploy a mobile strategy to unafraid the hybrid workforce portion reducing wide hazard to the organisation.

This cloud-based solution is present disposable arsenic an integrated add-on to Ivanti Neurons for Unified Endpoint Management (UEM) and the caller add-on is afloat embedded into the existent UEM client, allowing customers to activate the add-on easy and seamlessly without creating friction for their extremity users.

This latest announcement comes aft Ivanti and Lookout precocious joined forces to assistance organisations accelerate unreality adoption and mature their Zero Trust information posture successful the “Everywhere Workplace.” The associated solution – which includes Ivanti Neurons for Zero Trust Access (ZTA), Lookout Cloud Access Security Broker (CASB) and Lookout Secure Web Gateway (SWG) – helps customers execute implicit menace prevention and information information some on-premises and successful the cloud, wrong and extracurricular the network, portion pursuing Zero Trust Access information principles.

The 2 companies are expanding their strategical concern to present see Lookout Mobile Endpoint Security, powered by the Lookout Cloud Security Platform, which provides precocious mobile information for Android, iOS and Chrome OS devices. The solution embeds Lookout functionality into the Ivanti Go app, consolidating endpoint absorption and information functions for elemental and seamless deployment and administration. Management functions specified arsenic locating mislaid devices, remotely wiping information and applying entree power policies present beryllium alongside information that protects firm information and credentials from compromise, resulting from mobile phishing attacks, device-level exploits, exertion malware and web threats.

Together, the associated Ivanti/Lookout solution enables companies to proactively support each devices – PCs, mobile devices and unreality workloads – from vulnerabilities and attacks. One of the cardinal features of the solution includes extortion from web-based and blase attacks that are typically unmonitored and unprotected by accepted solutions.

Key benefits outlines from the Ivanti+Lookout concern include:

  • Enhanced detection and mitigation of cyber threats targeting mobile devices
  • More penetration and power into mobile devices to conscionable privateness and compliance requirements
  • Simplified unreality adoption with unafraid entree to SaaS apps from mobile devices
  • The quality to let the hybrid workforce to enactment securely from immoderate mobile device

“We are thrilled to spouse with Lookout to supply much options for our customers arsenic they unafraid an progressively mobile workforce​,” said Srinivas Mukkamala, main merchandise serviceman astatine Ivanti. “With Ivanti Neurons for MTD, instrumentality learning algorithms supply contiguous and ongoing visibility into malicious threats crossed each protected devices. The operation of unified endpoint absorption and mobile menace defence enables organisations to proactively negociate and unafraid mobile devices against the broadest array of attacks and support against web-based and blase attacks.”

“Our concern with Ivanti continues to spell from spot to spot – we couldn’t beryllium prouder of our corporate committedness to assistance customers simplify their unreality adoption and unafraid their hybrid workforce from anywhere, astatine immoderate time, from immoderate device,” said Jim Dolce, Lookout CEO. “Regardless of an organisation’s entree oregon hosting method, our associated solution addresses the challenges and realities of information extortion today, ensuring that CISOs and CIOs person the astir seamless, robust solution for securing their data, careless of wherever it flows and wherever it resides.”

For much information, click here

Read Entire Article