{"id":45210,"date":"2024-05-08T18:27:34","date_gmt":"2024-05-08T18:27:34","guid":{"rendered":"https:\/\/www.pax8.com\/en-us\/?post_type=vendors&#038;p=45210"},"modified":"2025-10-03T19:40:31","modified_gmt":"2025-10-03T19:40:31","slug":"lookout","status":"publish","type":"vendors","link":"https:\/\/www.pax8.com\/en-us\/vendors\/lookout\/","title":{"rendered":"Lookout"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Lookout\u2019s AI-powered platform defends against phishing, social engineering and account takeovers\u2014providing visibility and control that traditional security tools miss.<\/p>\n","protected":false},"featured_media":47813,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"categories":[115,91],"class_list":["post-45210","vendors","type-vendors","status-publish","has-post-thumbnail","hentry","category-mobile-security","category-security"],"acf":{"vendor_name":"Lookout","short_description":"Your customers are the target. Their mobile iOS and Android devices have become the delivery vehicle for modern attacks. Lookout\u2019s AI-powered platform defends against phishing, social engineering and account takeovers\u2014providing visibility and control that traditional security tools miss. Founded in 2007, Lookout is a globally recognized cybersecurity leader with a purpose-built MSP program. Designed with native multitenancy and zero-click deployment, Lookout Mobile EDR enables MSPs to rapidly scale enterprise-grade mobile security to any size business with ease.","greyscale_logo":"","colored_logo":"","products":[{"product":"<h4><strong>Security<\/strong><\/h4> \r\n<br>&nbsp;<br> \r\n<h5>Mobile security<\/h5> \r\n<br>&nbsp;<br> \r\n<ul> \r\n<li>Lookout Essentials<\/li>\r\n<li>Lookout Advanced<\/li>\r\n<\/ul>"}],"resource_url":"https:\/\/www.pax8.com\/en-us\/vendors\/lookout\/resources\/","vendor_flag":"null"},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors\/45210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors"}],"about":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/types\/vendors"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media\/47813"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media?parent=45210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/categories?post=45210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}