• Blog
  • Threat News
  • Glossary of terms
  • Partners
  • Login
logo
  • Why Corrata
  • Use Cases
    • dialog
      Smishing Protection
      Protect your users from the dangers of phishing over SMS and other messaging and collaboration apps.
    • disallow
      Malware Detection
      Learn how Corrata uses advanced techniques to detect even the most sophisticated malware.
    • integration
      Device Trust
      Ensure that only devices known to be secure can access your environment
    • wifi
      Adversary-in-the-Middle (AitM) Protection
      Protect your employee's communications from being intercepted on unsafe cellular or Wi-Fi connections
    • eye-icon
      Vulnerability Management
      Avoid the risk associated with devices which are running out of data operating systems or have poorly configurations.
    • check-icon
      Web Filtering
      Protect devices from malicious links and other risky content with robust and privacy sensitive web filtering.
  • Resources
    • case-studies
      Case studies
      Read about how a wide range of organizations are addressing mobile risk with Corrata
    • blog
      Blog
      Get up to date information on the key topics in mobile endpoint security
    • threat-news
      Threat news
      What you need to know to stay up to date with mobile threats
    • whitepapers-icon
      Whitepapers
      A selection of resources to help you navigate the world of mobile threat defence
    Children's hand in the cookie jar grabbing a cookie
    blog
    Blog
    MFA Bypass – Stealing Cookies Read more
  • About
  • Login

    Footer navigation

    Contact

    Blackrock Business Park,
    Level 3, Block 3 ‘The Arch’,
    Blackrock,
    Co. Dublin

    info@corrata.com

    Menu

    • Why Corrata
    • About Corrata
    • Try Corrata
    • Corrata`s Partners
    • Glossary

    Resources

    • Case Studies
    • News + Insights
    • Threat News
    • Whitepapers

    Use cases

    • Smishing Protection
    • Malware Detection
    • Device Trust
    • Man-in-the-Middle (MitM) Protection
    • Vulnerability Management
    • Web Filtering
    • Dangerous Applications

    Technical details

    • Network traffic inspection
    • Employee buy-in
    • Deployment and integration

    Newsletter

    Get regular mobile security insights from the experts.

      white-logo
      corrata 2025 all rights reserved
      • Privacy & cookie policy
      • Terms

      Try
      Corrata

      Give us a few details and one of our team will be in touch.

        If you are an existing customer looking for support please email support@corrata.com

        This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.

        | Privacy & Cookie Policy

        Corrata
        Powered by  GDPR Cookie Compliance
        Privacy Overview

        This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

        Strictly Necessary Cookies

        Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

        If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

        Cookie Policy

        More information about our Cookie Policy