Try our new research platform with insights from 80,000+ expert users

Lookout vs Menlo Secure comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Lookout
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
3
Ranking in other categories
Threat Intelligence Platforms (TIP) (29th), Endpoint Detection and Response (EDR) (51st), Mobile Threat Defense (3rd)
Menlo Secure
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (26th), Firewalls (53rd), ZTNA (24th), Cloud Security Remediation (9th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Lookout is designed for Mobile Threat Defense and holds a mindshare of 20.7%, down 25.7% compared to last year.
Menlo Secure, on the other hand, focuses on Cloud Security Remediation, holds 0.9% mindshare.
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
Lookout20.7%
Zimperium26.6%
Check Point Harmony Mobile10.3%
Other42.400000000000006%
Mobile Threat Defense
Cloud Security Remediation Market Share Distribution
ProductMarket Share (%)
Menlo Secure0.9%
Wiz Code31.7%
Seemplicity20.1%
Other47.3%
Cloud Security Remediation
 

Featured Reviews

DB
IT Manager at NHS Trust
Enhanced mobile security with visibility into app and website usage, but installation challenges remain
We use Lookout for mobile devices, such as phones It has reduced our risk around mobile devices. I like the security features and being able to see what apps and websites people are using. There is nothing we have come across that we've desired. We have been using Lookout for one year. The…
reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have not had any issues with bugs or breakdowns."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
 

Cons

"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The initial setup requires a little bit of experience with configuration."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"The user monitoring could still be improved."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
 

Pricing and Cost Advice

"The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
"Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
880,315 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
10%
Manufacturing Company
10%
Government
6%
Manufacturing Company
14%
Computer Software Company
12%
Retailer
12%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business2
Large Enterprise5
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Lookout?
The pricing is a little expensive. We are currently looking at comparisons with other solutions, including Umbrella.
What needs improvement with Lookout?
There is nothing we have come across that we've desired.
What is your primary use case for Lookout?
We use Lookout for mobile devices, such as phones.
What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which mak...
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic access, and by doing it that way, it has multiple use cases. For example, it man...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some of these functions, people typically choose another technology for those specifi...
 

Also Known As

CipherCloud
Menlo Security Web Security, Menlo Web Security
 

Overview

Find out what your peers are saying about Lookout vs. Menlo Secure and other solutions. Updated: August 2025.
880,315 professionals have used our research since 2012.