Mobile Threat Defense Solution

Protecting mobile devices from web threats, malware and insecure infrastructure.

The Corrata Approach – Advanced protection against mobile threats

Employees spend more and more of their time accessing enterprise data through mobile devices. In these circumstances, it’s essential that organizations focus on providing the same level of threat defense on mobile as on traditional desktop computers. Security of mobile devices means more than just managing the configuration of a device with mobile device management. It also encompasses protecting the device by preventing online threats reaching the end-point and detecting device compromise immediately it occurs.

HOW CORRATA DEFENDS AGAINST ONLINE THREATS

Device icon - Mobile Threat Defense

Corrata captures device and networking activity in real-time with a low footprint on-device agent.

circle monitor - Mobile Threat Defense

Networking and other device meta data are continuously monitored to protect against mobile threats and to detect device or infrastructure compromise.

content control circle - Mobile Threat Defense

Attempts to access suspicious domains or IP addresses are blocked on the handset based on the latest threat intelligence.

Every network connection over any protocol is examined to confirm that the device is only trying to access legitimate resources.

Any attempt to access a suspicious domain or IP is immediately intercepted and blocked.

Users are informed of the block while information security staff are alerted to enable them to respond appropriately.

icon tab - Mobile Threat Defense

The Corrata app enables devices to be monitored in real time regardless of what network they are using. Corrata’s cloud software keeps the app updated with threat intelligence which the app uses to determine whether access should be permitted to a given IP address, URL or domain.

Cloud - Mobile Threat Defense

Corrata Cloud receives summary control data from enterprise mobile devices and ensures that threat intelligence is updated in a timely manner. It’s the cloud component of the Corrata Mobile Data Management and Threat Defense solution. Corrata Cloud monitors the status of devices, categorizes new access requests, gathers and analyzes the data captured by the Corrata app and generates alerts, notifications, and blocks.

icon graph - Mobile Threat Defense

System administrators access the Corrata Cloud through an intuitive web interface for configuration, reporting, and troubleshooting. The web-based administration portal is used to manage devices enrollment, to set policies, to review threat intelligence and to view reports.