Corrata Announces Partnership with Three UK Read More
Read about our latest innovations to secure your business data Learn More
Corrata warns about encryption vulnerabilities impacting major websites Read More

Microsoft and Corrata

Enhanced Endpoint Security & Experience

Microsoft Cloud App Security



The collaboration with Microsoft Cloud App Security (MCAS) brings together Corrata’s unique capability for collecting traffic information and controlling app usage on mobile devices with Microsoft’s market-leading Cloud Access Security Broker (CASB)

Traffic information from smartphones and tablets running Corrata is uploaded for analysis to Microsoft Cloud App Security on a continuous basis

Download Solution Brief

Usage information

Cloud app usage information collected by Corrata is visible to admins via the Microsoft Cloud App Security console. This provides an integrated view of an organization’s cloud app usage and one-click enforcement of app usage policies across iOS, Android, and Windows devices

Once apps are designated as risky or un-sanctioned within the MCAS portal they will automatically be blocked by Corrata on the mobile endpoint. This capability is delivered using Corrata’s patented SafePathML technology which powers the world’s only enterprise-grade firewall for mobile devices.

Download Solution Brief

Microsoft Defender
for Endpoint

Together the two solutions provide an integrated view of an organization’s and a user’s threat status and improve the speed, productivity and effectiveness of threat management

Corrata’s integration with Microsoft Defender for Endpoint enables Microsoft customers to detect, protect and respond to security threats on iOS and Android devices.

Corporate IT teams get a ‘single pane of glass” for all device platforms to investigate and defend against any potential threats.

Microsoft Defender for Endpoint users can investigate mobile security threats directly from within the Microsoft Defender Security Center.
Download Solution Brief

Resource Hub

Dive Deeper into the world of Mobile Security
Chatbot Phishing – Conversations with the Dark Web
Increasing use of chatbots being exploited by cybercriminals  Chatbots are increasingly used by service providers of all types to facilitate…
Read more
Corrata Announces Partnership with Three UK
Corrata announces partnership with Three UK to bring leading cybersecurity solution to UK businesse Deal with Three UK builds on…
Read more
Corrata discovers weak encryption on major websites when accessed using iOS devices
Official Press Release (Dublin, 16 May 2022): Mobile threat defense solution provider, Corrata, today announced the discovery of poor encryption…
Read more
Mobile Phishing
Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home.…
Read more
Today’s Mobile Threat Landscape
Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen…
Read more
Enterprise Mobile Data Control
Enterprise mobile data consumption is growing at close to 100% annually and some analysts believe it will have increased tenfold…
Read more
Why Google and Apple’s Malware Protection Might Not Be Good Enough
Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and…
Download briefing note
Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?
For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading…
Download briefing note
The Rising Threat of Social Media Phishing Attacks
Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital…
Download briefing note

Make your business devices impenetrable