Use Case

Vulnerability Management

A total of 899 iOS and Android vulnerabilities were patched in 2022. Keeping your devices up to date and replacing any that are obsolete is only the start. Poor security configuration can also leave your organization vulnerable.

vulnerability-management-hero-img

Mobile devices running unpatched versions of Android or iOS leave you exposed to a wider range of threats than necessary. This includes risks from iOS vulnerabilities, Android vulnerabilities, iOS exploits, and Android exploits.

Sophisticated malware will take advantage of such devices, especially those with out of date Android versions or out of date iOS versions, to gain access to critical systems and steal enterprise data. Good device hygiene is table stakes, and this involves patching Android devices, patching iOS devices, keeping Android up to date, and keeping iOS up to date.

security-content-img

How Corrata reduces risk from insecure devices

Corrata’s approach to vulnerability management comes in three parts:

Real-time Monitoring: Corrata monitors the security status of devices in real-time, calculating a security score which provides a simple-to-understand summary of the devices’ security posture. This includes monitoring for iOS zero day and Android zero day vulnerabilities.

Isolation of Insecure Devices: Corrata provides an automated process to isolate insecure devices, especially those with mobile device vulnerabilities.

User Alerts: The Corrata App alerts the end user to any misconfigurations and provides a simple interface to remedy any issues identified, including guidance on addressing iOS vulnerability and Android vulnerability.

score-fair-new-img

Automatic monitoring and remediation of Android & iOS vulnerabilities

  • check-icon

    Establish individual device Security Score

    At a glance understand the security posture of individual devices and your device fleet

    Corrata’s unique security score gives you a simple to understand indicator of the health of each device. Ongoing monitoring of the key security indicators on the device enables an assessment of the vulnerability of the device to threats. Security score is based on a combination of operating system status, device configuration and malware status.

  • check-icon

    Isolate insecure devices

    Devices below a specified threshold can be quarantined until vulnerabilities are addressed

    By denying insecure devices access to business applications the impact of poor security configurations can be mitigated. When users update their devices and correct misconfigured settings, access to applications is re-enabled. As this is automated there is no requirement for IT Admin resources in managing this process.

score-bad-new
  • check-icon

    Guided remediation

    Making it easy for users to fix vulnerabilities

    The Corrata App highlights poor security configurations for the user and guides them through the remediation process. Changing insecure settings, updating out of date operating systems and removing potentially harmful apps is made easy with an intuitive user interface.

  • check-icon

    Conditional access policies

    Enabling a graduated response to device insecurities

    Devices with insecure settings which are of low concern can continue to access lower risk applications while those with severe vulnerabilities can be completely isolated from the internet. Corrata can integrate with your Identity Provider to enable conditional access.

FAQ’s

The objective of vulnerability management is to reduce the risk of data breaches by fostering good security hygiene across the fleet of devices that employees use to access business applications. This starts by establishing the security posture of devices (are they running up to date software, do they have passcodes set etc.) and then making it easy for employees to remedy any insecurities found.

When Corrata is initially deployed, out of date operating systems and apps, malware, absence of passcodes, and disabled security settings are among the most frequently found vulnerabilities. In rare cases devices will be found to have been jailbroken or rooted.

Corrata scans the key security settings and establishes a security score for each employee device. The Corrata app provides employees with details of the factors driving the score and guided support in resolving any issues. Admins also have access to this score and can set rules which will quarantine devices with serious unresolved vulnerabilities.

We’re on a mission

We’re here to stop every existing and emerging threat to your mobile workforce and business. Explore our Use Cases to find out more about the powerful and proactive protection we provide.

  • Smishing protection

  • Anti-malware

  • Dangerous applications

  • Man-in-the-Middle Protection

  • Vulnerability management

  • Web filtering

  • smishing-content-img
    dialog

    use case

    Smishing protection

    Every day employees are being targeted with smishing messages designed to harvest credentials, steal authentication cookies and gather personal information for social engineering attacks.

    Learn more
  • malware-content-img
    dialog

    use case

    Anti-malware

    Sophisticated malware such as the notorious Pegasus and its clones are being used to undermine the built in security of both iOS and Android making sensitive content accessible to bad actors.

    Learn more
  • integration-content-img
    dialog

    use case

    Dangerous applications

    Even applications downloaded from official app stores can represent a threat to information security. Understand how Corrata identifies such risks and provides the tools you need to counter them.

    Learn more
  • wifi-content-img
    dialog

    use case

    Man-in-the-Middle Protection

    In today’s cloud centric world most enterprise data travels over networks which are fundamentally insecure. Corrata provides the protection you need to ensure that your data remains private.

    Learn more
  • security-content-img
    dialog

    use case

    Vulnerability management

    Good device security posture is critical to reducing risk. Corrata monitors the settings and activity on your employees’ devices, assessing their security status and prompting end users to remedy any issues found.

    Learn more
  • privacy-content-img
    dialog

    use case

    Web filtering

    Blocking access to categories of content which are risky or against your organization’s acceptable use policy is an essential step for mobile security. Corrata provides robust, privacy sensitive web filtering tailored to your organization’s needs.

    Learn more