---
description: Compare Lookout vs OpenText Core Endpoint Protection​ regarding their features, reviews, pricing, specifications, screenshots & more.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Lookout vs OpenText Core Endpoint Protection​ Comparison
---

Breadcrumb: [Home](/) > [Network Security Software](/directory/4170/network-security/software) > [Lookout \<span\>vs\</span\> OpenText Core Endpoint Protection​](https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection)

# Compare Lookout vs OpenText Core Endpoint Protection​

Canonical: https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection

> Detailed comparison between Lookout and OpenText Core Endpoint Protection​. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | Lookout | OpenText Core Endpoint Protection​ |
| **Overall rating** | 4.7/5 | 4.5/5 |
| **Total Reviews** | 69 | 216 |
| **Starting Price** | - | - |
| **Free Trial** | Yes | Yes |
| **Free Version** | Yes | No |
| **Deployment** | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Chromebook (Desktop), Android (Mobile), iPhone (Mobile), iPad (Mobile) | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop) |
| **Support** | 24/7 (Live rep), Chat | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, 24/7 (Live rep) |
| **Training** | In Person, Live Online, Webinars, Documentation | In Person, Live Online, Webinars, Documentation, Videos |

## Key features

### Lookout

- AI/Machine Learning
- API
- Activity Monitoring
- Anti Virus
- Application Security
- Behavioural Analytics
- Data Security
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Network Security Software
- Reporting/Analytics
- Threat Intelligence
- Threat Response
- VPN Software
- Web Threat Management
- Whitelisting/Blacklisting

### OpenText Core Endpoint Protection​

- AI/Machine Learning
- API
- Activity Monitoring
- Anti Virus
- Application Security
- Behavioural Analytics
- Data Security
- Endpoint Management
- Endpoint Protection Software
- IOC Verification
- Monitoring
- Network Security Software
- Remediation Management
- Reporting/Analytics
- Threat Intelligence
- Threat Response
- VPN Software
- Web Threat Management
- Whitelisting/Blacklisting

## Links

- [View Lookout Profile](https://www.softwareadvice.co.nz/software/379029/lookout)
- [View OpenText Core Endpoint Protection​ Profile](https://www.softwareadvice.co.nz/software/414862/webroot-business-endpoint-protection)
- [View Original Comparison](https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Lookout vs OpenText Core Endpoint Protection​ Comparison","description":"Compare Lookout vs OpenText Core Endpoint Protection​ regarding their features, reviews, pricing, specifications, screenshots & more.","url":"https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection","about":[{"@id":"https://www.softwareadvice.co.nz/software/379029/lookout#software"},{"@id":"https://www.softwareadvice.co.nz/software/414862/webroot-business-endpoint-protection#software"}],"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"inLanguage":"en-NZ"},{"name":"Lookout","description":"Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, and implement security policies. Lookout can increase visibility and provide protection for teams who are working remotely while using mobile devices and cloud technology.\n\nLookout works as a single security platform that protects data from endpoints to the cloud, without the need for multiple standalone solutions. It includes real-time protection for phishing attacks, custom web filtering for inappropriate web content, data protection in email, SaaS, and IaaS applications, plus more. \n\nPricing information is provided on request by Lookout. Support is available via an FAQ page, online portal, and other resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/399f889c-f47b-4fc9-a583-ed2ca6ecdf93.png","url":"https://www.softwareadvice.co.nz/software/379029/lookout","@id":"https://www.softwareadvice.co.nz/software/379029/lookout#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.7,"bestRating":5,"ratingCount":69},"operatingSystem":"Cloud, Apple, Windows, Chrome, Android, Platform ios, Platform ipad"},{"name":"OpenText Core Endpoint Protection​","description":"OpenText™ Core Endpoint Protection is a cloud-based endpoint security solution that helps small to large enterprises perform antivirus scans and prevent cyber threats across networks. It comes with an admin console, which enables users to configure system settings, grant access permissions, view data charts and generate reports on potential malware threats.\n\n\nOpenText™ Core Endpoint Protection allows businesses to sort data in tabular formats and change the order of data points in columns as ascending/descending. It provides users with a centralized dashboard to gain insights into device status using charts, improving business operations. Additionally, managers can create user profiles with credentials, view scan history and restore quarantined files.\n\nOpenText™ Core Endpoint Protection enables enterprises to reassign endpoints and apply security policies to multiple groups on the platform. Pricing is available on annual subscriptions and support is extended via email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/bc4dcb04-d45d-4be2-b17e-9dcc941bf9f2.png","url":"https://www.softwareadvice.co.nz/software/414862/webroot-business-endpoint-protection","@id":"https://www.softwareadvice.co.nz/software/414862/webroot-business-endpoint-protection#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.5,"bestRating":5,"ratingCount":216},"operatingSystem":"Cloud, Apple, Windows"},{"@id":"https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Security Software","position":2,"item":"/directory/4170/network-security/software","@type":"ListItem"},{"name":"Lookout vs OpenText Core Endpoint Protection​","position":3,"item":"https://www.softwareadvice.co.nz/compare/379029/414862/lookout/vs/webroot-business-endpoint-protection","@type":"ListItem"}]}]}
</script>
