Back to Search Begin New Search Save Search Auto-Notify
Lookout Mobile Endpoint Security Hands-...
Threat actors want to access data that is now flowing between devices, apps, and networks via the cloud. Mobile devices, crucial for access and authentication into the services that host this data, are often the easiest to compromise - but they’re often the least protected despite the unique nature of their operating systems and significant risk they’re exposed to. Lookout provides a comprehensive solution that continuously grants...
April 9, 2025
Organizer: Lookout
Location: Virtual
Add Favorite
Lookout Mobile Endpoint Security Hands-...
Threat actors want to access data that is now flowing between devices, apps, and networks via the cloud. Mobile devices, crucial for access and authentication into the services that host this data, are often the easiest to compromise - but they’re often the least protected despite the unique nature of their operating systems and significant risk they’re exposed to. Lookout provides a comprehensive solution that continuously grants...
March 12, 2025
Organizer: Lookout
Location: Virtual
Add Favorite
Lookout Mobile Endpoint Security Hands-...
Threat actors want to access data that is now flowing between devices, apps, and networks via the cloud. Mobile devices, crucial for access and authentication into the services that host this data, are often the easiest to compromise - but they’re often the least protected despite the unique nature of their operating systems and significant risk they’re exposed to. Lookout provides a comprehensive solution that continuously grants...
February 12, 2025
Organizer: Lookout
Location: Virtual
Add Favorite
Protect Your Agency's Data from Adversa...
In this webinar, Jim Coyle, Federal Security Strategist at Lookout and Frank Srp, Senior Technical Marketing Engineer at Lookout, will explain the importance of government agencies taking proactive steps to protect their mobile devices from attacks. With Lookout's Moible Endpoint Security, your organization can go above and beyond compliance with state government bans and federal OMB M-23-12. Don't miss this opportunity to learn how Lookout's...
April 11, 2023
Organizer: Lookout Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust for Smartphones
On behalf of Lookout and Carahsoft, we would like to invite you to join our webinar on mobile security for U.S. civilian agencies. Attendees of this webinar will hear the following topics: Colonial Pipeline attack BYOD/Unmanaged Smartphone Protection – Complete security is needed Vulnerable entry points into your infrastructure Software-defined perimeter & Continuous / Conditional access controls Smartphones accessing your VPN? Ranso...
June 23, 2021
Organizer: Lookout Government Team at Carahsoft
Location: Webcast
Add Favorite
Virtual Lunch & Learn: Where does mobil...
Lookout is hosting a lunch and learn webinar discussion on how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this over lunch (our treat) and answer any questions you may have about how smartphones and tablets fit into your security strategy. Register today to sav...
December 16, 2020
Organizer: Lookout
Location: Webcast
Add Favorite
Understanding Chromebook Security
Google Chromebooks are a popular choice for students and employees looking for an affordable laptop to browse the web and connect to their cloud applications. By applying a defense-in-depth approach to Chromebooks, Google has built-in several layers of security to keep its customers at ease. In this webinar, Lookout takes a closer look at Chrome OS security to provide some additional insight based on our in-depth knowledge of the mobile threat...
December 9, 2020
Organizer: Lookout
Location: Webcast
Add Favorite
Understanding Chromebook Security
Google Chromebooks are a popular choice for students and employees looking for an affordable laptop to browse the web and connect to their cloud applications. By applying a defense-in-depth approach to Chromebooks, Google has built-in several layers of security to keep its customers at ease. In this webinar, Lookout takes a closer look at Chrome OS security to provide some additional insight based on our in-depth knowledge of the mobile threat...
December 9, 2020
Organizer: Lookout
Location: Webcast
Add Favorite
Cyber Security Digital Summit: Security...
Security in Motion is a virtual event focused on protecting the modern endpoint. Global corporate enterprise has forever been redesigned to a mobile first stance. In response, the Summit unpacks key issues CISOs face when continuing the evolution to securing that mobile reality. Sessions include: Threat Hunting on the Move: Phishing, Vishing, Smishing, Oh My! Securing Your Remote Workforce The Modern Endpoint Security: Challenges & Opportu...
December 2, 2020
Organizer: Cyber Security Hub | IQPC
Location: Virtual
Add Favorite
Back to Search Begin New Search