Lookout Strategic Approach to TLS Inspection
Our strategic approach involves three implementation phases for TLS inspection, each building on the previous phase.
Phase 1
Phase 1 focuses on implementing TLS inspection for recommended categories by Lookout and assisting enterprises with endpoint steering configuration. This approach provides deeper visibility of user activities on the Internet, protection against risky and unsafe website access, and malware protection for file sharing sites. You can apply an out-of-the-box policy to block high-risk security categories such as phishing and malicious sites.
Lookout provides predefined best-practice policies to enable immediate visibility and protection from threats and malware. These predefined policies provide a quick start with configuring and testing Lookout Secure Internet Access.
Phase 2
Phase 2 focuses on extending TLS inspection to expand the number of categories for additional protection of sensitive data, including denying uploads to non-enterprise public cloud storage locations such as personal Box or Google Drive.
Phase 3
Phase 3 focuses on enforcing full TLS Inspection to all web traffic once an enterprise has completed testing of processes in Phases 1 and 2. The Lookout Enterprise Security Team assists in enabling full TLS inspection for pilot users with context-driven steering policies and then with business users.