Mobile Threat Defense

Protecting your enterprise mobile devices from web borne threats.

The Corrata Approach – Advanced protection against mobile threats

Employees spend more and more of their time accessing enterprise data through mobile devices.  In these circumstances it’s essential that organizations focus on providing the same level of threat defense on mobile as on traditional desktop computers.  Mobile security means more than just managing the configuration of a device with mobile device management.  It also encompasses protecting the device by preventing online threats reaching the end-point


on-device agent

Corrata examines every connection request over cellular and wifi

Requests to unknown hosts are checked against the latest threat intelligence.

content control

Attempts to access suspicious domains or IP addresses are blocked on the handset

Every network connection over any protocol is examined to confirm that that the device is only trying to access legitimate resources.

Any attempt to access a suspicious domain or IP is immediately intercepted and blocked

Users are informed of the block while information security staff are alerted to enable them to respond appropriately.

The Corrata Mobile App alerts employees to inappropriate, costly or risky usage. It enables usage to be monitored in real time regardless of location.  Corrata’s cloud software keeps the App updated with threat intelligence which the App uses to determine whether access should be permitted to a given IP address, url or domain.

Corrata Cloud receives summary control data from enterprise mobile devices and ensures that threat intelligence is updated in a timely manner.  It’s the cloud component of the Corrata Mobility Control solution.  Corrata Cloud monitors the status of devices, categorizes new access requests, gathers and analyzes the data captured by the Corrata App and generates alerts, notifications and blocks.

System administrators access the Corrata Cloud through an intuitive web interface for configuration, reporting and troubleshooting.  The web-based administration portal is used to manage device enrollment, to set policies, to review threat intelligence and to view reports.