Lookout Mobile Endpoint Detection & Response EDR - From HANDD Business Solutions
Scalable, unified Mobile Endpoint Detection and Response platform to protect managed or unmanaged IOS, Android and Chrome OS devices. The platform is powered by telemerty from hundreds of millions of mobile application, devices and web items to detect mobile compromise and phishing attacks.
Features
- Mobile Endpoint Detection & Response
- Mobile Threat Intelligence & Advisory Services
- Managed Device & BYOD Security
- Device Risk Posture Management
- Mobile Phishing & Content Protection
- Mobile Vulnerability Management
- App Binaries & PCAP
- Mobile Web & Content Analysis
- Malicious & Risky Code Analysis
- Indicators of Compromise
Benefits
- Visibility into risk posed by mobile devices and users
- Protect agaist threats on managed & BYO Mobile devices
- Mitigate the risk of credential and multifactor authentication compromise
- Extend your Endpoint Detection and Response capabilities to cover mobile
- Minimise threats with adaptive access control
- Implement phishing and content control specific to mobile
- Protection that goes beyond mobile device management
- Intergrate seamlessly with existing infrastructure and services
Pricing
£22 a device a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 5 3 5 9 9 6 9 9 5 4 9 1 0 7
Contact
HANDD Business Solutions
Matthew Parkinson
Telephone: 07779150169
Email: matt.parkinson@handd.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Mobile Device Management or Unified Endpoint Management solutions like Intune or Workspace One. Or as an extention to your existing Endpoint Detection & Response service to cover your managed and unmanaged mobile fleet.
- Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 30 minutes to 8 hours depending on issue severity.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- HANDD provide bespoke configuration, support, management and managed service offerings depending on size and complexity. Vendor support is included in th costs provided
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Customers will have access to a dedicated support portal containing but not limited to: Documentation and deployment guides, Elearning and videos, test plans and internal roll out communications.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Lookout does not store sensitive customer data within the solution, deleting all customer meta data according to the data retention period configured by the customer. Data retention can be configured between 3 & 36 months.
- End-of-contract process
- Upon contract termination the customer tenat with its accociated data are deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile specific Endpoint Detection and Response. It does not cover traditional endpoints.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Lookout Mobile EDR provides a single pane of glass approach to management with the web based GUI designed to provide all administrative and investigative features within a single UI. Accessable globally in a responsive design, the intuitive user experience lets authorised users access the management console for any type of role, including:
Full Access
Restricted Access
Analyst Access
Analyst Read Only Access
Read Only Access - Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
Lookout Mobile EDR provides various enterprise integrations for the support of bidirectional telemetry as well as the purpose of automating tasks. As an example, three of the open RESTful API’s are;
· Mobile Risk API (stream/query threats, devices, OS, vulnerabilities, etc)
· SSO Config API – Automate the implementation of Single Sign On for tenants
· Connector API – Automate the implementation of EMM/MDM
· PCP Threat Feed – Ingest domain IOC’s
Further information can be found in our API Swagger document LINK . This is a responsive and interactive guide that cannot function as a hard copy.
The enterprise integrations enable the organisation to receive a push of data or can query the Lookout dataset to retrieve specific data. Example include Web API supporting the following ;
· Get Device/s by Filter
· Get Web and Content Threat/s by Filter
· Get Threat by Filter
· Get Threats by Filter Web and Content
· Get Android Security Patch Level Vulnerabilities
· Get CVE information
· Get Devices Vulnerable to CVE
· Get OS Vulnerabilities
· Get IOS Vulnerabilities for Given Version
· Get IOS and Android Version Present in the Fleet
Stream Mobile Risk Device, Threat and Audit Events - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The logos on the admin console and the application can be customised and all allert messages pushed to mobile devices can be customised also. All security policies are fully customisable on a security group basis.
Scaling
- Independence of resources
- The solution has been designed with the following principles to ensure that users aren't effected by demandon the service. The solution supports true cloud principles with auto-scaling capabilities with the infrastructure implemented using cloud native technologies such as micro-services, virtualisation, containerisation, message brokers, elastic load balancers and data lakes. Each of the components within the solution are designed to scale as and when required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- They are available within the Management Console (real time dashboard) enabling authourised users to access license usage and licence availability. Fleet deployment status is available via API into the EMM/MDM or via open RESTful API.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- We sell our own Professional services including pre/post-sales support
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All telemetry that is provided through Lookout Mobile EDR can be exported via the web based management console GUI, exported as reports/CSV or accessed through the various enterprise/API intergrations.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- HTTPS API
- Data import formats
-
- CSV
- Other
- Other data import formats
- HTTPS API
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
The generation, storage and management of data encryption keys is done via Amazon KMS. Lookout uses a transparent data encryption equivilent in our databases (RDS managed encryption)
All local administrator account passwords are securely stored, encrypted and hashed.
Availability and resilience
- Guaranteed availability
-
Lookout commits to provide 99.9% uptime with respect to the Feature Components during each calendar month of the subscription period, excluding Excluded Downtime ("Service Availability") "EXCLUDED DOWNTIME" means the following times which shall not be counted as outage downtime. Any availability caused by:
FORCE MAJURE EVENT
SYSTEMS, HARDWARE OR SOFTWARE OUTSIDE OF LOOKOUT'S REASONABLE CONTROL INCLUDING THIRD-PARTY MDM SOFTWARE
NETWORK INTRUSTIONS AND DENIAL OF SERVICE ATTACKS, PROVIDED THAT LOOKOUT SHALL IN ALL CASES USE INDUSTRY BEST PRACTICES TO PREVENT SUCH EVENTS
SYSTEM MAINTENACE
EMERGENCY MAINTENACE
FEATURED COMPONENTS OF THE lOOKOUT SERVICES INCLUDE THE ADMINISTRATIVE CONSOLE AND CUSTOMER PORTAL USED BY CUSTOMERS TO PROTECT THEIR MOBILE DEVICES, AS WELL AS INFRASTRUCTURE REQUIRED TO ENABLE THE BELOW CORE FUNCTIONALITIES:
ABILITY TO LOGIN OR AUTHENTICATE TO THE CUSTOMER PORTAL (MTP LOGIN)
ABILITY TO DISPLAY DEVICE VIEWS WITHIN THE MTP CONSOLE (MTP LOGIN AND DEVICE VIEW)
Maintenance windows and emergency maintenance definition available upon request. - Approach to resilience
- Available upon request once mutual NDA signed.
- Outage reporting
- Email notification, esupport portal and public dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to the management console is restricted using SAML intergration to an existing IDP, or username, password and MFA for local accounts. Role Based Access Contral limits permissions available to users with 6 roles available from Full Access to Read Only access. Non administrative users do not have access to the management console.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman & Company LLC
- ISO/IEC 27001 accreditation date
- https://public-profile.whistic.com/4a2175f5-4cce-bc91-a703139bb6f2
- What the ISO/IEC 27001 doesn’t cover
- The scope of the ISO/IEC 27001 cerification is limited to the information security management system (ISMS) that comprises of Lookout's systems, applications, data, people processes, policies and proceedures supporting the mobile security products and services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- See below public link.
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- https://public-profile.whistic.com/4a2175f5-4cce-bc91-a703139bb6f2
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- See below link.
- PCI DSS accreditation date
- See below link.
- What the PCI DSS doesn’t cover
- https://public-profile.whistic.com/4a2175f5-4cce-bc91-a703139bb6f2
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SOC2
- FedRAMP
- CCPA
- EU-US Privacy Shield
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
SOC2
FedRAMP
StateRAMP
Cyber Essentials
CCPA
EU-US Pricacy Shield
GDPR - Information security policies and processes
- To be shared upon signiture of NDA
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Lookout treats security as an essential part of the design and implimentation. Lookout security, developers and other technical staff apply information security engineering principles in the specification, design, development, implementation and mobification of the infomation system by following the Lookout SDLC and industry standard security principles. Lookout implements a defense in depth security engineering philosophy. Futher detail is available on proceedures and technology implemented upon request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Lookout treats security as an essential part of the design and implimentation. Lookout security, developers and other technical staff apply information security engineering principles in the specification, design, development, implementation and mobification of the infomation system by following the Lookout SDLC and industry standard security principles. Lookout implements a defense in depth security engineering philosophy. Futher detail is available on proceedures and technology implemented upon request.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Lookout treats security as an essential part of the design and implimentation. Lookout security, developers and other technical staff apply information security engineering principles in the specification, design, development, implementation and mobification of the infomation system by following the Lookout SDLC and industry standard security principles. Lookout implements a defense in depth security engineering philosophy. Futher detail is available on proceedures and technology implemented upon request.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Lookout treats security as an essential part of the design and implimentation. Lookout security, developers and other technical staff apply information security engineering principles in the specification, design, development, implementation and mobification of the infomation system by following the Lookout SDLC and industry standard security principles. Lookout implements a defense in depth security engineering philosophy. Futher detail is available on proceedures and technology implemented upon request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
- Any internet connected solution
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
HANDD’s Equal Opportunities Policy The aim of this policy is to communicate the commitment of the Board and management to the promotion of equality of opportunity in HANDD Business Solutions. It is our policy to provide equality of staff membership to all, irrespective of: gender, including gender reassignment marital or civil partnership status having or not having dependents religious belief or political opinion race (including colour, nationality, ethnic or national origins, being an Irish traveller) disability sexual orientation age We are opposed to all forms of unlawful and unfair discrimination. All members of the organisation will be treated fairly and will not be discriminated against on any of the above grounds. Decisions on membership, selection for office, training or any other benefit will be made objectively, without unlawful discrimination, and based on aptitude and ability. To request a copy of this policy please email careers@handd.co.uk
Pricing
- Price
- £22 a device a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trial are available for proof of value and testing for upto 4 weeks.