Use Case


85% of data breaches start with
a successful phishing attack. On mobile SMS phishing is the most common threat but increasingly attackers leverage QR codes, WhatsApp messages and other channels to steal credentials and bypass MFA


Because these phishing messages are delivered directly by your mobile operator they bypass your organisation’s defenses - and without Corrata you are completely unprotected.

And it's not just text messages: WhatsApp, Slack and Microsoft Teams are among the communications and collaboration platforms cybercriminals seek to exploit.


How Corrata protects against mobile phishing

Corrata protects against phishing by blocking suspicious links detected by our specialized mobile phishing threat intelligence. This includes threats from SMS phishing, WhatsApp meesages, QR codes, LinkedIn posts and more.

Corrata delivers protection which is 3 times more effective than the competition. In addition to blocking domains based on DNS filtering, Corrata also implements a range of enhanced protections, listed below, which go beyond our competitors.


Enhanced mobile phishing protections

  • check-icon

    Protecting against zero-day attacks.

    A new phishing domain appears every 60 seconds - Corrata responds in real-time.

    Corrata uses a range of techniques to assess the threat level associated with previously unseen domains. Domains which are assessed as risky are quarantined until their reputations can be established.

  • check-icon

    Blocking IP address ranges used by phishing tool kits.

    Cybercriminals use toolkits sourced on the dark web - Corrata stops these in their tracks.

    90% of phishing attacks are delivered using toolkits. By blocking access to the servers hosting the phishing infrastructure Corrata renders these toolkits ineffective.

  • check-icon

    Blocking website builder platforms with high phishing incidence.

    Website builder platforms are used extensively to host phishing domains.

    Cyberciminals often avoid detection by using legitimate web platforms to host their phishing sites. A number of website builder platforms are known to host a large number of phishing sites.

    Corrata gives customers the ability to block access to any content hosted on the most abused platforms.

  • check-icon

    Detection based on Server Name Indicator as well as Domain names.

    Using SNI Corrata never goes dark even when DNS traffic is encrypted.

    Privacy concerns are leading more and more end users to ‘hide’ their DNS requests using DNS over https (DOH) or DNS over tls (DOT). To address this Corrata has developed a unique capability to establish server domains using the Server Name Indicator (SNI) protocol.

  • check-icon

    Specialist threat intelligence.

    Corrata enhances standard industry phishing block lists with specialist smishing threat intelligence.

    Traditional phishing threat intelligence focuses on email. As a result many mobile security solutions lack reliable, timely intelligence on mobile attacks. Corrata augments traditional threat intelligence with threat research focused on smishing and other mobile specific threats.


Guide to Mobile Phishing

85% of phishing attacks on mobile take place outside email on channels such as SMS, WhatsApp and Facebook Messenger. To learn how to combat this threat download our updated guide.

Learn how


85% of phishing on mobile takes place outside email therefore bypassing your email security protections. And employees are notably less vigilant when using mobile due to its convenience and informality.

Unfortunately the built in consumer grade protections against unsafe content found on mobile devices are completely ineffective against the pace at which new phishing domains are generated. They are particularly useless against the kind of targeted attacks used against organizations.

Corrata doesn’t just rely on industry threat intelligence. As a mobile security specialist we generate our own proprietary intelligence and combine it with machine learning assisted techniques to spot malicious attacks, including mfa bypass attempts, before the competition.

We’re on a mission

We’re here to stop every existing and emerging threat to your mobile workforce and business. Explore our Use Cases to find out more about the powerful and proactive protection we provide.

  • Phishing protection

  • Anti-malware

  • Dangerous applications

  • AiTM Protection

  • Vulnerability management

  • Web filtering

  • smishing-content-img

    use case

    Phishing protection

    Every day employees are being targeted with mobile phishing attacks which leverage SMS, QR codes, messaging apps and social media to harvest credentials, steal authentication cookies and more.

    Learn more
  • malware-content-img

    use case


    Sophisticated malware such as the notorious Pegasus and its clones are being used to undermine the built in security of both iOS and Android making sensitive content accessible to bad actors.

    Learn more
  • integration-content-img

    use case

    Dangerous applications

    Even applications downloaded from official app stores can represent a threat to information security. Understand how Corrata identifies such risks and provides the tools you need to counter them.

    Learn more
  • wifi-content-img

    use case

    AiTM Protection

    In today’s cloud centric world most enterprise data travels over networks which are fundamentally insecure. Corrata provides the protection you need to ensure that your data remains private.

    Learn more
  • security-content-img

    use case

    Vulnerability management

    Good device security posture is critical to reducing risk. Corrata monitors the settings and activity on your employees’ devices, assessing their security status and prompting end users to remedy any issues found.

    Learn more
  • privacy-content-img

    use case

    Web filtering

    Blocking access to categories of content which are risky or against your organization’s acceptable use policy is an essential step for mobile security. Corrata provides robust, privacy sensitive web filtering tailored to your organization’s needs.

    Learn more