Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Lookout Expands Mobile Security Capabilities With Acquisition of Bluebox Security

Enterprise mobile security startup Bluebox security has agreed to be acquired by Lookout, a provider of mobile consumer and business mobile security products.

While Lookout started with a focus on consumer mobile security, the company has expanded its portfolio to target the enterprise technology market.

Enterprise mobile security startup Bluebox security has agreed to be acquired by Lookout, a provider of mobile consumer and business mobile security products.

While Lookout started with a focus on consumer mobile security, the company has expanded its portfolio to target the enterprise technology market.

Bluebox technology components will be added to Lookout’s core security platform and enable more advanced solutions for the company’s enterprise customers, Lookout said, which will further help the company tap the business market.

As part of its offerings, Bluebox provides a cloud-based mobile security solution that gives enterprises visibility, control, and security for mobile data, while providing privacy and freedom to employees as they use their mobile devices. The company also offers solutions designed to create “self defending” mobile apps.

San Francisco-based Lookout raised a massive $150 million round of funding in August 2014, and roughly $282 million in total funding to date.

The terms of the acquisition were not disclosed.

Founded in 2012 by Adam Ely and Caleb Sima, Bluebox emerged from stealth mode in 2012 with $9.5 Million in Funding Led by Andreessen Horowitz. The company has raised additional capital since, including an $18 million round in January 2014. 

Prior to launching Bluebox, Sima served as an “Entrepreneur in Residence” at Andreessen Horowitz. Sima also previously served as Chief Technology Officer for HP’s Application Security Center after joining the company as a result of HP’s acquisition of SPI Dynamics in 2007, a company he co-founded and as CTO oversaw development of WebInspect – a Web application security testing tool.

Ely was previously CISO of the Heroku business unit at salesforce.com. Prior to salesforce.com, Adam led security operations, application security, and compliance for TiVo. Before TiVo, he led security functions at Disney.

In July 2013, Bluebox was credited with discovering a serious “master key” vulnerability in Android, which would allow attackers to easily turn legitimate apps into Trojans, without affecting the cryptographic signature. In 2014, the company also discovered a “Fake ID” vulnerability in Adnroid which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet.

Following the acquisition, Bluebox development and marketing personnel will join the Lookout team.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...