Free Trial

Corrata Security and Control

Corrata’s solution offers the enterprise unrivaled visibility and control over security and data usage on mobile devices.

Request a demo
European Cybersecurity Startup of the Year 2018

What is the problem currently facing organizations?

Mobile devices face multiple security threats including phishing, malware, and insecure Wi-Fi. Organizations tasked with defending their mobile devices against compromise often lack the tools to protect against these threats and are therefore at risk.

Mobile Device Management systems focus primarily on device configuration and don't offer protection against today's most significant mobile threats.

Organizations need an endpoint protection solution for mobile which is effective in securing devices, easy to deploy and manage, and meets end user privacy and performance expectations.

Corrata Security and Control

Corrata uses granular visibility and control of device activity to provide
instant, targeted protection against mobile threats.

Corrata's patent pending SafePathML operates across multiple software and network
layers and protocols processing thousands of signals per device per day. This level
of visibility is critical to accurate machine learning assisted threat detection allowing Corrata to target
active threats rather than latent risks.

Corrata's solution is the first to incorporate an enterprise grade firewall designed for
deployment on iOS and Android devices.

SafePathML provides granular
visibility to instantly
detect active mobile threats

Corrata protects against
threats and provides
complete control

Threat Protection

Corrata Security and Control provides protection from the full scope of mobile threats. The solution protects against social engineering attacks by blocking access to phishing over email, SMS, social media, and messaging applications. It also prevents malware infection by blocking access to unofficial app stores, filtering malicious sites and content, as well as intercepting communication with CnC infrastructure to disable any malware attacks that do occur.

Threat Detection

Corrata identifies threats by monitoring device content, settings, and activity for malicious behavior. It also inspects network activity across multiple layers and protocols to prevent connections to compromised servers. Corrata's ground-breaking SafePathML algorithms target zero-day threats and with threat intelligence updated hourly and integration with SIEM, Corrata ensures that no threat goes undetected.

Usage Control

Corrata enables any organization to establish and apply mobile data usage policies tailored to their corporate culture and business needs. For example, administrators can set daily and/or monthly caps for non-business domestic and roaming usage, blacklist high bandwidth entertainment apps from using mobile data while allowing them over Wi-Fi, or whitelist business critical apps so employees can always get the job done.


Corrata can be configured to enforce your organization’s acceptable use policies by blocking access to content deemed inappropriate in a work environment or unauthorized cloud services. Corrata ensures that mobile activity is policy compliant and doesn’t expose the organization to legal or reputation risk.

How It Works

Corrata Security and Control is comprised of the Corrata App, a mobile application for smartphones and tablets, Corrata Cloud, a cloud hosted software platform, and Corrata Console, a web based administration portal

Corrata App

Corrata App is a low footprint mobile app which can be downloaded to any iOS or Android device via EMM or directly from the app store.

The Corrata App enables device activity to be controlled in real-time to provide instant protection against threats and enforce organizational policies.

The App scans for security threats and vulnerabilities and gives Corrata visibility of security sensitive information. It provides employees with security alerts, information about device security status, acceptable use policies and an overview of mobile data usage.

Corrata Cloud

Corrata Cloud receives anonymized data on security sensitive device activity allowing it to assist with threat detection. Corrata Cloud also collects the latest threat intelligence from a variety of sources including Corrata's Threat Research team and third party threat feeds.

In addition, Corrata Cloud is responsible for the management of the Corrata App installed on end user devices, the recording of policies, and integration with third party systems such as MDM and SIEM.

Corrata Console

System administrators access the Corrata Cloud through an intuitive web interface for configuration, reporting, and troubleshooting.

The web-based administration portal is used to manage device enrollment, to set policies, and to view reports and analytics.

Device support

Corrata can be used with any Android device running 6.0 or later, or any Apple device running iOS 10.5 or later. Corrata works on managed, unmanaged, supervised and unsupervised devices.

Enterprise Mobility
Management Integration

Corrata integrates will all major EMM platforms including Microsoft Intune, VMWare Airwatch, MobileIron, Citrix ZenMobile, IBM Maas360 and SOTI MobiControl. Using your existing EMM platform you can easily manage device enrollment and compliance.

Our EMM Integration Partners


Book a 20 Minute Corrata Demo