Lookout, a leader in endpoint-to-cloud security, and Ivanti, the provider of the Ivanti Neurons automation platform that discovers, manages, secures, and services IT assets from cloud to edge, announced today that they have partnered to help organisations accelerate cloud adoption and mature their Zero Trust security posture in the “Everywhere Workplace.”
Ivanti and Lookout have combined their best-in-class technologies, including Ivanti Neurons for Zero Trust Access (ZTA), Lookout Cloud Access Security Broker (CASB), and Lookout Secure Web Gateway (SWG), to help customers achieve complete threat prevention and data security both on-premises and in the cloud, inside and outside the network, while adhering to Zero Trust Access security principles.
“We’re excited to partner with Lookout to help organizations solve these challenges. This partnership allows us to expand on the Ivanti Neurons for ZTA solution by adding CASB and SWG technologies via the Lookout Security Platform. Our three core technologies solve different, but equally important, security challenges. And when deployed together, they enable organizations to achieve secure cloud adoption, deliver a better end-user experience and a comprehensive Zero Trust security posture,”Nayaki Nayyar, president, and chief product officer at Ivanti
The joint solution from Ivanti and Lookout helps organisations better protect their data. It prevents data leakage with adaptive and contextual data protection controls, enforcing compliance policies with granular controls that consider device owner, resource location, current device posture, and data sensitivity, and detecting threats from both inside and outside the network.
The solution incorporates User and Entity Behavior Analytics (UEBA) into Virtual Private Network (VPN) technology, provides granular per-application and per-device access security using Software Defined Perimeter architecture protocols, and includes CASB features to protect against data loss and theft in SaaS applications. It continuously monitors the security posture of clients and grants access to applications based on that posture.