Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Benefits

With more than 90% of global traffic encrypted, most threats are passed within encryption and are invisible without implementing inline TLS inspection. However, several factors can put data at risk without TLS inspection:

  • Lack of visibility. Since data is sent in an encrypted TLS tunnel, you don’t have full visibility of the traffic flowing through your organization.
  • Threats. Bad actors leverage TLS to mimic legitimate sites, enabling them to carry out phishing attacks and hide malware downloads and command-and-control activities.
  • Sensitive data. Bad actors use TLS/TLS encrypted channels in an attempt to circumvent Data Loss Prevention (DLP) controls and exfiltrate sensitive data.
  • Compliance. Without TLS inspection, enterprises might not be able to comply fully with regulations such as GDPR, HIPAA, and PCI-DSS. Many Lookout SASE security features require TLS inspection to work with encrypted transactions. These security features depend on TLS inspection:
    • Anti-Virus/Malware
    • Browser Isolation
    • Data Loss Prevention (DLP)
    • File Type Control
    • Inline CASB

Lookout must be able to view transaction content to effectively block malware, manage data loss, and protect users. While Lookout can protect traffic using Zero Trust strategies, enterprises are not realizing the full benefit of many Lookout security features without TLS inspection.