Lookout Features
Top Rated Lookout Alternatives
Filter for Features
Orchestration
Asset Management | Lets users group and organize their endpoints to gather threat intelligence on specific technologies. | Not enough data | |
Security Workflow Automation | Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. | Not enough data | |
Deployment | The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. | Not enough data | |
Sandboxing | A feature that allows security testing and information gathering to occur in a secure, resource independent environment. | Not enough data |
Information
Proactive Alerts | Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Intelligence Reports | The ability for users to produce reports outlining detailed and personalized threat information | Not enough data |
Personalization
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Security Validation | The product has a recurring examination process to update your intelligence reports as new threats emerge. | Not enough data | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Administration
Data Management | Administrators can access and organize data related to incidents to produce reports or make data more navigable. | Not enough data | |
Incident Logs | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
Reporting | Produces reports detailing trends and vulnerabilities related to bot management and performance. | Not enough data |
Governance
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Data Visibility | Similifies data identification to increase visibility and management capabilities | Not enough data |
Security
Encryption | Protects data with within and as it leaves your secure or local network. | Not enough data | |
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Activity Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Breach Detection | Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. | Not enough data | |
Security Automation | Allows administrative control over automated security tasks. | Not enough data | |
Application Security | Protects application access and data. Prompts additional authentication for suspicious users. | Not enough data | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. | Not enough data | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. | Not enough data | |
Governance | Allows users to create, edit, and relinquish user access privileges. | Not enough data | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Data Encryption/Security | Manages policies for user data access and data encryption. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data |
Network Management
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. | Not enough data | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Identity Management
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. | Not enough data | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. | Not enough data | |
User Monitoring | Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | Not enough data |
Analysis
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Anomoly Detection | Monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data |
Functionality
SSO | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
Cloud Registry | Details SaaS products the cloud security product can integrate with and provide security for. | Not enough data | |
Mobile Device Mangement | Offers the ability to set standards for types of mobile devices and networks capable of accessing data. | Not enough data |
Management
Multicloud Management | Allows users to track and control cloud spend across cloud services and providers. | Not enough data | |
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data | |
Dynamic Scaling | Scale resources automatically, adjusting for usage demands. | Not enough data | |
Policy Enforcement | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | Not enough data |
Monitoring
Data Center Networking | Provides advanced data center network services to deliver multiple high-speed IP. | Not enough data | |
Multicloud Visibility | Allows users to track and control activity across cloud services and providers. | Not enough data | |
Anomaly Detection | Constantly monitors system to detect anomalies in real time. | Not enough data |
Protection
Firewall-as-a-Service | Managed, cloud-delivered firewall that protects devices, assets, networks, and other cloud services from web-based threats. | Not enough data | |
Cloud Application Brokerage | Provides a single access point for users to access multiple cloud applications, services, and products through a central gateway | Not enough data | |
Web Gateway | Provides a private web gateway for secure internet browsing. | Not enough data | |
Adaptive Access Control | Provides a risk-based approach to determining trust within the network. | Not enough data |