Free trial

Whitepaper download

Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's examine how today's tools would have worked when confronted by a modern threat such as the recent WhatsApp Pegasus spyware hack.

Teсhnology startup of the year 2017

Latest blog posts

By Emma 25th November 2019

Does iOS Jailbreak Checkra1n pose a serious security risk?

Everything you need to know about Checkra1n, the latest jailbreak for iOS. What is jailbreaking?  The process of jailbreaking (also known as ‘rooting’ for Android) involves using 3rd party software to ‘unlock’ an iOS device such as an iPhone or iPad. This code overwrites the device’s software by removing the built in DRM (Digital Right […]

Read more
By Emma 6th November 2019

Corrata Confidential: The 3 benefits of a Zero Gateway Solution

Zero Gateway ensures device performance, employee privacy and company confidentiality One of the coolest things about Corrata is that that we are zero gateway. This means that we implement control over internet traffic at the device level. Unlike other providers, we avoid the traditional approach of routing all the traffic through a cloud gateway. By […]

Read more
By Emma 22nd October 2019

Time to Update your Mobile Phone Policy?

Corrata gives you some ideas about updating your organization’s mobile phone policy Policies Designed for the Past Today, most companies have some sort of policy covering mobile phone use. But in reality, many of these mobile phone policies date from an earlier era, one when mobile meant Blackberry or Nokia and most of what we […]

Read more

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, ne...

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating system...

Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's exam...

Get the facts about insecure Wi-Fi

Free Wi-Fi is a phrase so commonly heard today that we come to expect it in most public places. The vast majority of hotels, restaurants, coffee shops, and transpor...