85% of data breaches start with
a successful phishing attack. On mobile SMS phishing is the most common threat - used to harvest credentials and to gain access to target accounts bypassing 2FA.
Because these phishing messages are delivered directly by your mobile operator they bypass your organisation’s defenses - and without Corrata you are completely unprotected.
And it's not just text messages: WhatsApp, Slack and Microsoft Teams are among the communications and collaboration platforms cybercriminals seek to exploit.
How Corrata protects against phishing
Corrata protects against phishing by blocking suspicious links detected by our specialized mobile phishing threat intelligence.
Corrata delivers protection which is 3 times more effective than the competition. In addition to blocking domains based on DNS filtering, Corrata also implements a range of enhanced protections, listed below, which go beyond our competitors.
Enhanced phising protections
Protecting against zero-day attacks.
Corrata uses a range of techniques to assess the threat level associated with previously unseen domains. Domains which are assessed as risky are quarantined until their reputations can be established.
Blocking IP address ranges used by phishing tool kits.
90% of phishing attacks are delivered using toolkits. By blocking access to the servers hosting the phishing infrastructure Corrata renders these toolkits ineffective.
Blocking website builder platforms with high phishing incidence.
Cyberciminals often avoid detection by using legitimate web platforms to host their phishing sites. A number of website builder platforms are known to host a large number of phishing sites.
Corrata gives customers the ability to block access to any content hosted on the most abused platforms.
Detection based on Server Name Indicator as well as Domain names.
Privacy concerns are leading more and more end users to ‘hide’ their DNS requests using DNS over https (DOH) or DNS over tls (DOT). To address this Corrata has developed a unique capability to establish server domains using the Server Name Indicator (SNI) protocol.
Specialist threat intelligence.
Traditional phishing threat intelligence focuses on email. As a result many mobile security solutions lack reliable, timely intelligence on mobile attacks. Corrata augments traditional threat intelligence with threat research focused on smishing and other mobile specific threats.
85% of phishing on mobile takes place outside email therefore bypassing your email security protections. And employees are notably less vigilant when using mobile due to its convenience and informality.
Unfortunately the built in consumer grade protections against unsafe content found on mobile devices are completely ineffective against the pace at which new phishing domains are generated. They are particularly useless against the kind of targeted attacks used against organizations.
Corrata doesn’t just rely on industry threat intelligence. As a mobile security specialist we generate our own proprietary intelligence and combine it with machine learning assisted techniques to spot malicious attacks before the competition.
We’re on a mission
We’re here to stop every existing and emerging threat to your mobile workforce and business. Explore our Use Cases to find out more about the powerful and proactive protection we provide.
Every day employees are being targeted with smishing messages designed to harvest credentials, steal authentication cookies and gather personal information for social engineering attacks.Learn more
Sophisticated malware such as the notorious Pegasus and its clones are being used to undermine the built in security of both iOS and Android making sensitive content accessible to bad actors.Learn more
Even applications downloaded from official app stores can represent a threat to information security. Understand how Corrata identifies such risks and provides the tools you need to counter them.Learn more
In today’s cloud centric world most enterprise data travels over networks which are fundamentally insecure. Corrata provides the protection you need to ensure that your data remains private.Learn more
Good device security posture is critical to reducing risk. Corrata monitors the settings and activity on your employees’ devices, assessing their security status and prompting end users to remedy any issues found.Learn more
Blocking access to categories of content which are risky or against your organization’s acceptable use policy is an essential step for mobile security. Corrata provides robust, privacy sensitive web filtering tailored to your organization’s needs.Learn more