Free Trial

Resources

Download our latest Whitepaper, read our blog posts or check out our other resources below.

European Cybersecurity Startup of the Year 2018

Latest Blog

Solving the Mobile Web Gateway Problem – No More Undermining the Privacy and Productivity of your Employees

Since the development of the Internet, organizations have struggled to find a way to gain some form of control and visibility over traffic in the corporate network. With the emergence of Secure Web Gateways (SWGs), proxies that sit between the Internet and the edge of a network, came the ability to control employees’ access and […]

Read more

Latest Whitepaper

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps, to steal information from users. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Case studies

Case Study: One Housing

See how Corrata’s Data Usage Control solution gave One Housing, a busy non-profit organization in the UK, the visibility and control needed over individual employee data usage to manage costs and reduce ‘bill shock’.

Download Case Study

Case Study: OFM Solutions

Discover why OFM Solutions, an accounting and financial services firm based in Dublin, needed to secure their entire mobile fleet and ensure that sensitive client information was always protected and how Corrata helped them to achieve this.

Download Case Study

Case Study: GemPool

Learn how leading Irish recruitment firm GemPool mitigated the risk of cyber attack or data leakage on their employee mobile devices and gained the confidence to work quickly and remotely without taking risks, with Corrata’s Internet Security Solution.

Download Case Study
Filter by
By Colm 26th October 2018

Solving the Mobile Web Gateway Problem – No More Undermining the Privacy and Productivity of your Employees

Since the development of the Internet, organizations have struggled to find a way to gain some form of control and visibility over traffic in the corporate network. With the emergence of Secure Web Gateways (SWGs), proxies that sit between the Internet and the edge of a network, came the ability to control employees’ access and […]

Read more
By Colm 1st October 2018

The Rising Threat of Social Media Phishing Attacks

Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world. For years, cyber criminals have successfully stolen the personal details of internet users through malicious websites and links sent via email and as cyber-security has developed, users and technologies have gotten smarter. Most employees […]

Read more
By Colm 19th September 2018

Privacy vs Security: Finding the Right Balance

With over 67% of employees in the US now using their own devices for work, more and more companies are beginning to recognize the benefits of implementing BYOD policies in the workplace. Allowing employees to use their own mobile devices, including smartphones and tablets, for work purposes can help to reduce costs by eliminating the […]

Read more
By Colm 12th September 2018

Autumn’s Must Have Accessory for iOS 12 is Security

Later today, Apple will host their annual September launch event in which they are expected to announce three new iPhones: the iPhone XS, iPhone XS Max and iPhone XC, following on from the iPhone X generation released in 2017. As well as this, Apple are expected to unveil the Apple Watch 4 and the latest […]

Read more
By Colm 27th August 2018

Google is Tracking Your Location – Even When You Tell It Not To

Google have come under fire in recent weeks following the discovery that services on Android and Apple devices store location data and track users, even after they have explicitly opted out and turned off the setting that permits Google to do so. An investigation by the Associated Press recently found that user data was continuously […]

Read more
By Colm 20th August 2018

Android Users Facing ‘Epic’ Security Threats Following Independent Release of Fortnite

Fortnite, the hugely popular online video game, recently confirmed rumours that it would be made available to Android device users, but with a catch. Already available on desktop, Playstation 4, Xbox One, Nintendo Switch and recently iOS, the free-to-play Battle Royale game will not be made available for players to download via the official Google Play […]

Read more
By Colm 10th August 2018

Godzilla-sized Data Usage is Coming to a City Near You

Smartphone ownership and usage is at an all-time high, driven by expanding networks, reduced costs, and greater accessibility on a global scale. As a result of this mobile data usage is also rising rapidly, according to industry researchers at Ericsson. In their report published in June 2018, the IT giant looks at the statistics and […]

Read more
By Colm 27th July 2018

WhatsApp scams ‘Martinelli’ and ‘WhatsApp Gold’ – Do They Really Pose a Threat to Mobile Devices?

WhatsApp has become one of the most popular smartphone apps in the world with over 1.5 billion monthly users, however a recent report by Appthority has found that the instant messaging service is also one of the riskiest apps used by enterprises. Along with Facebook Messenger, WhatsApp is the most commonly blacklisted app in organizations […]

Read more

We’re building the future of mobile Security.

JOIN OUR TEAM

View jobs at  

Our blog

By Colm 26th October 2018

Solving the Mobile Web Gateway Problem – No More Undermining the Privacy and Productivity of your Employees

Since the development of the Internet, organizations have struggled to find a way to gain some form of control and visibility over traffic in the corporate network. With the emergence of Secure Web Gateways (SWGs), proxies that sit between the Internet and the edge of a network, came the ability to control employees’ access and […]

Read more
By Dylan 24th October 2018

Business phone + torrents = ?

“I get all my movies online for free” exclaimed the person sitting across the table from me. I was chatting to an acquaintance who is trusting of technology and subscribes to the belief that a handset from one of the mainstream players such as Apple or Samsung is virtually impenetrable to attack. The conversation up […]

Read more
By Colm 1st October 2018

The Rising Threat of Social Media Phishing Attacks

Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world. For years, cyber criminals have successfully stolen the personal details of internet users through malicious websites and links sent via email and as cyber-security has developed, users and technologies have gotten smarter. Most employees […]

Read more