Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Lookout of the it-sa 365
default Stage Background
Exhibitor
Manufacturer

Hall 7 - Booth Number 7-534

Lookout

Data-Centric Cloud Security

About us

south_east

Floor plan

south_east

Employees

south_east

Products

south_east

Actions

south_east

We offer

  • Application security
  • Cloud (computing) security
  • Email security
  • Endpoint security
  • Mobile security
  • Web application security
  • Data leakage / loss prevention
  • Data protection, data security
  • Digital / Enterprise Rights Management (DRM/ERM)
  • Remote access (VPN)

Industry

  • Industrial IT security
Arlandaweg 92 - Unit 6.1
1043 EX Amsterdam
Netherlands

About us

Lookout, Inc. is the data-centric cloud security company that uses a defense in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real time. The Lookout Cloud Security Platform is purpose-built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final cloud data extraction. We are trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and securely.

  ... read more

Floor plan

Employees

show more

Keywords

Threat Intelligence | Mobile Security | Data Security | Cloud Security

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.