SlideShare a Scribd company logo
1 of 22
Download to read offline
THE HISTORY OF
LOOKOUT
John Hering, Kevin Mahaffey and
James Burgess, three security
researchers from USC, discovered
a Bluetooth vulnerability in the
Nokia 3610.
The researchers tried to work with
Nokia to patch the vulnerability.
But the vulnerability would be too
complex to fix, and Nokia believed
that the range of Bluetooth was
only 10 — 100 meters.
2004
The Nokia 6310
The first mobile phone
with Bluetooth capabilities
To demonstrate the Bluetooth vulnerability, the founders built the BlueSniper,
which set a new world record by retrieving information on a device from over
1 mile away using the Bluetooth connections in mobile phones.
Living in LA at the time, the three
researchers walked around the red
carpet of the Academy Awards
with a high-powered Bluetooth
antenna, collecting evidence of the
vulnerability from hundreds of
celebrities’ phones.
2007
Realizing that people would need protection from mobile-based threats…
John Hering, Kevin Mahaffey & James Burgess officially
founded Lookout, then known as Flexilis, in 2007.
The first security app for
Windows mobile launched
2008
Lookout Mobile Security launched
on Android.
Lookout received a $5.5M Series A
round of funding from Khosla
Ventures & Trilogy Partners.
The same year, the company made
the move to San Francisco, left the
name Flexilis behind and became
Lookout.
2010
A BIG YEAR FOR LOOKOUT
Steven Mileham, 2011, Flickr
That was just the beginning…
2010
BusinessWeek names John Hering
Best Young Tech Entrepreneur
of 2010
Lookout tops 1 million users
Introduced Lookout Premium
for Android
Lookout joins leading tech
companies as an Accel Partners’ and
Index Ventures’ portfolio company
Lookout partners with Sprint to help keep Sprint customers safe
Lookout increases its user base by 9 million in one year, protecting
10 million devices
Andreessen Horowitz invests in Lookout and joins the board
Lookout Mobile Security launches on iPhone
 	
  
 	
  
 	
  
 	
  
2011
LOOKOUT MAKES BIG STRIDES
2011
Lookout goes global,
expanding its product offering
to Canada, Australia & the UK,
and is localized in German
2012
Lookout moves to new digs in the heart of SF’s Financial District
2012
A monumental year for key
partnerships with mobile
operators
2013
Lookout was named a 2013
Technology Pioneer by the World
Economic Forum
2012
In October 2012, Lookout debuted its
redesigned consumer offering with a
sleek new design, intelligent
dashboard and Signal Flare
LOOKOUT TODAY
2013
SINCE THE BEGINNING
The resounding theme has been growth
Partnered with 5 major mobile operators
Supports 3 platforms (Android, iOS & Kindle)
Localized in 11 languages


OCT 2008 JULY 2013OCT 2010
1M
3M
23M
45M
11M
45 MILLION
USERS WORLDWIDE
“The greatest product I’ll ever create is my company.”
— John Hering, Lookout CEO
THE LOOKOUT TEAM CONTINUES TO GROW
The Lookout Platform provides
organizations with threat intelligence and
attribution data to help protect their
customers, products, devices and networks
from constantly evolving threats.
More and more employees are bringing their
devices to work and company data is ending
up on them. Lookout for Business aims to
help businesses keep confidential
information secure.
THE ROAD AHEAD
LOOKOUT
For Business
THE LOOKOUT
PLATFORM
Keep in touch with
@lookout
/mylookout
blog.lookout.com
contact@lookout.com
http://bit.ly/history-of-lookout

More Related Content

What's hot

Nokia E7 Smartphone: Nokia and Microsoft Partnership
Nokia E7 Smartphone: Nokia and Microsoft PartnershipNokia E7 Smartphone: Nokia and Microsoft Partnership
Nokia E7 Smartphone: Nokia and Microsoft PartnershipNokia Central & East Europe
 
Mobile technology
Mobile technologyMobile technology
Mobile technologyhillarz
 
Fujitsu Managed Mobile. How to mobilise your business
Fujitsu Managed Mobile. How to mobilise your businessFujitsu Managed Mobile. How to mobilise your business
Fujitsu Managed Mobile. How to mobilise your businessFujitsu Russia
 
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety
 
Polar - India's Smartest House Hold Safe Vault
Polar - India's Smartest House Hold Safe VaultPolar - India's Smartest House Hold Safe Vault
Polar - India's Smartest House Hold Safe VaultPolarSensing
 
Cloud computing demystified overview
Cloud computing demystified overviewCloud computing demystified overview
Cloud computing demystified overviewBijan Houshiar
 
Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Brian K. Buntz
 
Kunskapsbaren 2011 Linköping - Mobila trender & strategier
Kunskapsbaren 2011 Linköping - Mobila trender & strategierKunskapsbaren 2011 Linköping - Mobila trender & strategier
Kunskapsbaren 2011 Linköping - Mobila trender & strategierHiQInternational
 
App korea wearable_davidkim_141127_v1.1
App korea wearable_davidkim_141127_v1.1App korea wearable_davidkim_141127_v1.1
App korea wearable_davidkim_141127_v1.1David Yushin KIM
 
It's Settled: Microsoft and Nokia
It's Settled: Microsoft and NokiaIt's Settled: Microsoft and Nokia
It's Settled: Microsoft and NokiaWafah Khairuddin
 
Projectglassppt 130418102721-phpapp01
Projectglassppt 130418102721-phpapp01Projectglassppt 130418102721-phpapp01
Projectglassppt 130418102721-phpapp01Hira Anwar
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom TrainingsCOEPD HR
 
Next Generation Mobile Apps
Next Generation Mobile AppsNext Generation Mobile Apps
Next Generation Mobile AppsConnected-Blog
 
google glasses
google glassesgoogle glasses
google glassesAl Asheer
 
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱Hugh Choi 최형욱
 

What's hot (19)

Nokia E7 Smartphone: Nokia and Microsoft Partnership
Nokia E7 Smartphone: Nokia and Microsoft PartnershipNokia E7 Smartphone: Nokia and Microsoft Partnership
Nokia E7 Smartphone: Nokia and Microsoft Partnership
 
Mbs t17
Mbs t17Mbs t17
Mbs t17
 
Google glass final
Google glass finalGoogle glass final
Google glass final
 
Google glasses
Google glassesGoogle glasses
Google glasses
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
Fujitsu Managed Mobile. How to mobilise your business
Fujitsu Managed Mobile. How to mobilise your businessFujitsu Managed Mobile. How to mobilise your business
Fujitsu Managed Mobile. How to mobilise your business
 
Final project
Final projectFinal project
Final project
 
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
 
Polar - India's Smartest House Hold Safe Vault
Polar - India's Smartest House Hold Safe VaultPolar - India's Smartest House Hold Safe Vault
Polar - India's Smartest House Hold Safe Vault
 
Cloud computing demystified overview
Cloud computing demystified overviewCloud computing demystified overview
Cloud computing demystified overview
 
Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017
 
Kunskapsbaren 2011 Linköping - Mobila trender & strategier
Kunskapsbaren 2011 Linköping - Mobila trender & strategierKunskapsbaren 2011 Linköping - Mobila trender & strategier
Kunskapsbaren 2011 Linköping - Mobila trender & strategier
 
App korea wearable_davidkim_141127_v1.1
App korea wearable_davidkim_141127_v1.1App korea wearable_davidkim_141127_v1.1
App korea wearable_davidkim_141127_v1.1
 
It's Settled: Microsoft and Nokia
It's Settled: Microsoft and NokiaIt's Settled: Microsoft and Nokia
It's Settled: Microsoft and Nokia
 
Projectglassppt 130418102721-phpapp01
Projectglassppt 130418102721-phpapp01Projectglassppt 130418102721-phpapp01
Projectglassppt 130418102721-phpapp01
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
Next Generation Mobile Apps
Next Generation Mobile AppsNext Generation Mobile Apps
Next Generation Mobile Apps
 
google glasses
google glassesgoogle glasses
google glasses
 
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
KBS 차정인의 T콘서트 - 사물인터넷과 웨어러블 - 최형욱
 

Similar to History of Lookout

Content Strategy Across Connected Devices
Content Strategy Across Connected DevicesContent Strategy Across Connected Devices
Content Strategy Across Connected DevicesBrandon Carson
 
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...Alexander Giles
 
CONSUMER PREFERENCES ON NOKIA MOBILE
CONSUMER PREFERENCES ON NOKIA MOBILE CONSUMER PREFERENCES ON NOKIA MOBILE
CONSUMER PREFERENCES ON NOKIA MOBILE Saptarshi Chakraborty
 
5 Ways IoT is shaping the Future of App Development
5 Ways IoT is shaping the Future of App Development5 Ways IoT is shaping the Future of App Development
5 Ways IoT is shaping the Future of App DevelopmentOprim Solutions
 
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...Thomas O. Dubuisson
 
A PROJECT REPORT ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
A PROJECT REPORT  ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONEA PROJECT REPORT  ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
A PROJECT REPORT ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONEVibhor Agarwal
 
Branded Content (in Mobile) by Chris Schaumann
Branded Content (in Mobile) by Chris SchaumannBranded Content (in Mobile) by Chris Schaumann
Branded Content (in Mobile) by Chris SchaumannChris Schaumann
 
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMPERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMIJNSA Journal
 
Wearables and Google Glass
Wearables and Google GlassWearables and Google Glass
Wearables and Google GlassMarta Rauch
 
Secure Open Telephony Network Presentation at Hope 9
Secure Open Telephony Network Presentation at Hope 9Secure Open Telephony Network Presentation at Hope 9
Secure Open Telephony Network Presentation at Hope 9Mark Belinsky
 
Mobile Technologies.pptx
Mobile Technologies.pptxMobile Technologies.pptx
Mobile Technologies.pptxBryCunal
 
User Interface and Future Interaction Technologies
User Interface and Future Interaction Technologies User Interface and Future Interaction Technologies
User Interface and Future Interaction Technologies Carlos Hugo Huertas Pérez
 
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Wayne Chen
 
PESTE analysis - Nokia
PESTE analysis - NokiaPESTE analysis - Nokia
PESTE analysis - NokiaPankaj Saharan
 
10 Mobile Trends for 2014 and Beyond (May 2014)
10 Mobile Trends for 2014 and Beyond (May 2014)10 Mobile Trends for 2014 and Beyond (May 2014)
10 Mobile Trends for 2014 and Beyond (May 2014)Karen Sanchez
 

Similar to History of Lookout (20)

T-Mobile G1
T-Mobile G1T-Mobile G1
T-Mobile G1
 
Content Strategy Across Connected Devices
Content Strategy Across Connected DevicesContent Strategy Across Connected Devices
Content Strategy Across Connected Devices
 
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
 
CONSUMER PREFERENCES ON NOKIA MOBILE
CONSUMER PREFERENCES ON NOKIA MOBILE CONSUMER PREFERENCES ON NOKIA MOBILE
CONSUMER PREFERENCES ON NOKIA MOBILE
 
5 Ways IoT is shaping the Future of App Development
5 Ways IoT is shaping the Future of App Development5 Ways IoT is shaping the Future of App Development
5 Ways IoT is shaping the Future of App Development
 
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
 
Consumer buying behaviour
Consumer buying behaviourConsumer buying behaviour
Consumer buying behaviour
 
A PROJECT REPORT ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
A PROJECT REPORT  ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONEA PROJECT REPORT  ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
A PROJECT REPORT ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
 
Google glass final
Google glass finalGoogle glass final
Google glass final
 
Branded Content (in Mobile) by Chris Schaumann
Branded Content (in Mobile) by Chris SchaumannBranded Content (in Mobile) by Chris Schaumann
Branded Content (in Mobile) by Chris Schaumann
 
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMPERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
 
Wearables and Google Glass
Wearables and Google GlassWearables and Google Glass
Wearables and Google Glass
 
Secure Open Telephony Network Presentation at Hope 9
Secure Open Telephony Network Presentation at Hope 9Secure Open Telephony Network Presentation at Hope 9
Secure Open Telephony Network Presentation at Hope 9
 
BBDF (2)
BBDF (2)BBDF (2)
BBDF (2)
 
Mobile Technologies.pptx
Mobile Technologies.pptxMobile Technologies.pptx
Mobile Technologies.pptx
 
User Interface and Future Interaction Technologies
User Interface and Future Interaction Technologies User Interface and Future Interaction Technologies
User Interface and Future Interaction Technologies
 
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
 
PESTE analysis - Nokia
PESTE analysis - NokiaPESTE analysis - Nokia
PESTE analysis - Nokia
 
10 Mobile Trends for 2014 and Beyond (May 2014)
10 Mobile Trends for 2014 and Beyond (May 2014)10 Mobile Trends for 2014 and Beyond (May 2014)
10 Mobile Trends for 2014 and Beyond (May 2014)
 
JWT: 10 Mobile Trends for 2014 and Beyond (May 2014)
JWT: 10 Mobile Trends for 2014 and Beyond (May 2014)JWT: 10 Mobile Trends for 2014 and Beyond (May 2014)
JWT: 10 Mobile Trends for 2014 and Beyond (May 2014)
 

More from Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 

More from Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

History of Lookout

  • 2. John Hering, Kevin Mahaffey and James Burgess, three security researchers from USC, discovered a Bluetooth vulnerability in the Nokia 3610. The researchers tried to work with Nokia to patch the vulnerability. But the vulnerability would be too complex to fix, and Nokia believed that the range of Bluetooth was only 10 — 100 meters. 2004 The Nokia 6310 The first mobile phone with Bluetooth capabilities
  • 3. To demonstrate the Bluetooth vulnerability, the founders built the BlueSniper, which set a new world record by retrieving information on a device from over 1 mile away using the Bluetooth connections in mobile phones.
  • 4. Living in LA at the time, the three researchers walked around the red carpet of the Academy Awards with a high-powered Bluetooth antenna, collecting evidence of the vulnerability from hundreds of celebrities’ phones. 2007
  • 5. Realizing that people would need protection from mobile-based threats… John Hering, Kevin Mahaffey & James Burgess officially founded Lookout, then known as Flexilis, in 2007.
  • 6. The first security app for Windows mobile launched 2008
  • 7. Lookout Mobile Security launched on Android. Lookout received a $5.5M Series A round of funding from Khosla Ventures & Trilogy Partners. The same year, the company made the move to San Francisco, left the name Flexilis behind and became Lookout. 2010 A BIG YEAR FOR LOOKOUT
  • 8. Steven Mileham, 2011, Flickr That was just the beginning…
  • 9. 2010 BusinessWeek names John Hering Best Young Tech Entrepreneur of 2010 Lookout tops 1 million users Introduced Lookout Premium for Android Lookout joins leading tech companies as an Accel Partners’ and Index Ventures’ portfolio company
  • 10. Lookout partners with Sprint to help keep Sprint customers safe Lookout increases its user base by 9 million in one year, protecting 10 million devices Andreessen Horowitz invests in Lookout and joins the board Lookout Mobile Security launches on iPhone             2011 LOOKOUT MAKES BIG STRIDES
  • 11. 2011 Lookout goes global, expanding its product offering to Canada, Australia & the UK, and is localized in German
  • 12. 2012
  • 13. Lookout moves to new digs in the heart of SF’s Financial District
  • 14. 2012 A monumental year for key partnerships with mobile operators
  • 15. 2013 Lookout was named a 2013 Technology Pioneer by the World Economic Forum
  • 16. 2012 In October 2012, Lookout debuted its redesigned consumer offering with a sleek new design, intelligent dashboard and Signal Flare
  • 18. 2013 SINCE THE BEGINNING The resounding theme has been growth Partnered with 5 major mobile operators Supports 3 platforms (Android, iOS & Kindle) Localized in 11 languages  
  • 19. OCT 2008 JULY 2013OCT 2010 1M 3M 23M 45M 11M 45 MILLION USERS WORLDWIDE
  • 20. “The greatest product I’ll ever create is my company.” — John Hering, Lookout CEO THE LOOKOUT TEAM CONTINUES TO GROW
  • 21. The Lookout Platform provides organizations with threat intelligence and attribution data to help protect their customers, products, devices and networks from constantly evolving threats. More and more employees are bringing their devices to work and company data is ending up on them. Lookout for Business aims to help businesses keep confidential information secure. THE ROAD AHEAD LOOKOUT For Business THE LOOKOUT PLATFORM
  • 22. Keep in touch with @lookout /mylookout blog.lookout.com contact@lookout.com http://bit.ly/history-of-lookout