Corrata Announces Partnership with Three UK Read More
Read about our latest innovations to secure your business data Learn More
Corrata warns about encryption vulnerabilities impacting major websites Read More

Microsoft and Corrata

Enhanced Endpoint Security & Experience

Microsoft Cloud App Security



The collaboration with Microsoft Cloud App Security (MCAS) brings together Corrata’s unique capability for collecting traffic information and controlling app usage on mobile devices with Microsoft’s market-leading Cloud Access Security Broker (CASB)

Traffic information from smartphones and tablets running Corrata is uploaded for analysis to Microsoft Cloud App Security on a continuous basis

Download Solution Brief

Usage information

Cloud app usage information collected by Corrata is visible to admins via the Microsoft Cloud App Security console. This provides an integrated view of an organization’s cloud app usage and one-click enforcement of app usage policies across iOS, Android, and Windows devices

Once apps are designated as risky or un-sanctioned within the MCAS portal they will automatically be blocked by Corrata on the mobile endpoint. This capability is delivered using Corrata’s patented SafePathML technology which powers the world’s only enterprise-grade firewall for mobile devices.

Download Solution Brief

Microsoft Defender
for Endpoint

Together the two solutions provide an integrated view of an organization’s and a user’s threat status and improve the speed, productivity and effectiveness of threat management

Corrata’s integration with Microsoft Defender for Endpoint enables Microsoft customers to detect, protect and respond to security threats on iOS and Android devices.

Corporate IT teams get a ‘single pane of glass” for all device platforms to investigate and defend against any potential threats.

Microsoft Defender for Endpoint users can investigate mobile security threats directly from within the Microsoft Defender Security Center.
Download Solution Brief

Resource Hub

Dive Deeper into the world of Mobile Security
Five Deadly Sins
The privacy pitfalls to avoid when choosing a mobile threat defense solution In our experience, mobile is almost always used…
Read more
Unprotected Text
Why you need the protection against smishing that only a specialist can provide The recent attacks against Twilio and Cloudflare…
Read more
Stealing Cookies
How Adversary-in-the-Middle attacks are undermining multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start…
Read more
Mobile Phishing
Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home.…
Read more
Today’s Mobile Threat Landscape
Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen…
Read more
Enterprise Mobile Data Control
Enterprise mobile data consumption is growing at close to 100% annually and some analysts believe it will have increased tenfold…
Read more
Why Google and Apple’s Malware Protection Might Not Be Good Enough
Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and…
Download briefing note
Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?
For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading…
Download briefing note
The Rising Threat of Social Media Phishing Attacks
Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital…
Download briefing note

Make your business devices impenetrable