Use Case

Dangerous Applications

219,635 apps were delisted by Google and Apple in Q1 2022 alone. Its not just operating system vulnerabilities that put your data at risk. Mobile applications can contain flaws which leave your data exposed. Malware distribution is often facilitated by ostensibly legitimate apps. Apps present a variety of risks to enterprises.


Malicious apps can obtain access to powerful device features and data. Out of date apps can include unpatched vulnerabilities.

And downloading apps from outside official app stores can lead to the installation of fake versions of legitimate services.


How Corrata reduces risk from malicious mobile apps

Corrata provides a number of features which address app risk. Apps which seek user permission to access functions which are not acceptable from a security perspective are identified as are apps with known high severity vulnerabilities. Corrata protects such apps from causing harm through features such as blocking CnC traffic and quarantining low trust devices.


Preventing harm from dangerous apps

  • check-icon

    Dangerous permissions

    Highlighting apps where users have given consents which are open to abuse

    Malicious apps take advantage of users’ willingness to grant consent to access powerful device functions such as accessibility features, location or file storage. Corrata addresses this risk by highlighting any such occurrences and offering the potential to impose automatic restrictions on impacted devices.

  • check-icon

    Potentially harmful apps

    Any apps which represent a threat to enterprise data are prevented from operating

    Corrata monitors the apps on every device to identify any that are known to cause harm. In addition to highlighting such apps to Info Sec staff and employees, Corrata’s ability to block CnC traffic is used to prevent such apps exfiltrating data.

  • check-icon

    Apps with known vulnerabilities

    Out of date versions of popular apps can contain dangerous vulnerabilities

    Developers of popular apps are generally diligent in addressing any security vulnerabilities through the release of patched versions. However app store distribution cannot guarantee that users will upgrade to the new safe version. Corrata highlights apps with known high severity vulnerabilities.

  • check-icon

    App Catalogue

    Ensure that employees download the legitimate version of your enterprise apps

    Today, more and more enterprise applications are available on mobile. Corrata provides an App Catalogue as part of the Corrata client to simplify distribution of these apps to end user devices (particularly BYOD) and to avoid the real risk that users are tricked into downloading fake versions from outside the app store.


Dangerous applications are those, while otherwise legitimate, that contain flaws or request permissions that might put your organization at risk. For instance, an out-of-date application may have an unpatched vulnerability which leaves it open to being exploited. Another concern is apps requesting sensitive permissions like location tracking or accessibility permission, which attackers can exploit.

Corrata identifies and highlights these dangerous apps both to end users and admins. This allows the organization to make informed decisions about the risk associated with the application.

Corrata provides a range of features including alerting, blocking and quarantining which can be used to address the risk associated with risky applications.

We’re on a mission

We’re here to stop every existing and emerging threat to your mobile workforce and business. Explore our Use Cases to find out more about the powerful and proactive protection we provide.

  • Phishing protection

  • Anti-malware

  • Dangerous applications

  • AiTM Protection

  • Vulnerability management

  • Web filtering

  • smishing-content-img

    use case

    Phishing protection

    Every day employees are being targeted with mobile phishing attacks which leverage SMS, QR codes, messaging apps and social media to harvest credentials, steal authentication cookies and more.

    Learn more
  • malware-content-img

    use case


    Sophisticated malware such as the notorious Pegasus and its clones are being used to undermine the built in security of both iOS and Android making sensitive content accessible to bad actors.

    Learn more
  • integration-content-img

    use case

    Dangerous applications

    Even applications downloaded from official app stores can represent a threat to information security. Understand how Corrata identifies such risks and provides the tools you need to counter them.

    Learn more
  • wifi-content-img

    use case

    AiTM Protection

    In today’s cloud centric world most enterprise data travels over networks which are fundamentally insecure. Corrata provides the protection you need to ensure that your data remains private.

    Learn more
  • security-content-img

    use case

    Vulnerability management

    Good device security posture is critical to reducing risk. Corrata monitors the settings and activity on your employees’ devices, assessing their security status and prompting end users to remedy any issues found.

    Learn more
  • privacy-content-img

    use case

    Web filtering

    Blocking access to categories of content which are risky or against your organization’s acceptable use policy is an essential step for mobile security. Corrata provides robust, privacy sensitive web filtering tailored to your organization’s needs.

    Learn more