Free trial

Whitepaper download

Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's examine how today's tools would have worked when confronted by a modern threat such as the recent WhatsApp Pegasus spyware hack.

Teсhnology startup of the year 2017

Latest blog posts

By Colm 10th February 2020

Cloud App Discovery in a mobile first world

With the growing popularity of SaaS services, sticking to the safe zone is key.   The rapid adoption of 3rd party SaaS services has driven cloud computing and digital transformation for many organizations. Google Drive, Dropbox and Salesforce amongst many others spring to mind. Services based on the SaaS model offer fantastic advantages. For a […]

Read more
By Corrata 6th February 2020

Corrata becomes a JAM Card friendly organisation

Corrata are delighted to be recognised as a disability aware company by JAM Card We at Corrata are proud to announce our involvement with JAM Card and our company’s successful completion of their disability training programme. This training ensure that our staff are equipped to provide excellent customer service to people with learning difficulties, communication […]

Read more
By Emma 31st January 2020

Does your tablet need security protection?

Your laptop and mobile phone are secure, but what about your iPad?  Computers and cyber security go together like pen and paper. They’re a duo that always go hand in hand. We just accept and expect that cyber security is implemented in every organization. You probably know the importance of mobile security too, given the […]

Read more

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, ne...

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating system...

Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's exam...

Get the facts about insecure Wi-Fi

Free Wi-Fi is a phrase so commonly heard today that we come to expect it in most public places. The vast majority of hotels, restaurants, coffee shops, and transpor...