The Corrata Approach – Advanced protection against mobile threats
Employees spend more and more of their time accessing enterprise data through mobile devices. In these circumstances, it’s essential that organizations focus on providing the same level of threat defense on mobile as on traditional desktop computers. Security of mobile devices means more than just managing the configuration of a device with mobile device management. It also encompasses protecting the device by preventing online threats reaching the end-point and detecting device compromise immediately it occurs.
HOW CORRATA DEFENDS AGAINST ONLINE THREATS
Corrata captures device and networking activity in real-time with a low footprint on-device agent.
Networking and other device meta data are continuously monitored to protect against mobile threats and to detect device or infrastructure compromise.
Attempts to access suspicious domains or IP addresses are blocked on the handset based on the latest threat intelligence.
Every network connection over any protocol is examined to confirm that the device is only trying to access legitimate resources.
Any attempt to access a suspicious domain or IP is immediately intercepted and blocked.
Users are informed of the block while information security staff are alerted to enable them to respond appropriately.