• Blog
  • Glossary of terms
  • Partners
  • Login
logo
  • Why Corrata
  • Use Cases
    • dialog
      Mobile Phishing Protection
      Protect your users from the dangers of phishing over SMS and other messaging and collaboration apps.
    • disallow
      Spyware Detection
      Learn how Corrata uses advanced techniques to detect even the most sophisticated spyware.
    • check-icon
      Data Loss Prevention
      Protect from data loss, ShadowAI risks, unsanctioned SaaS, and ad tracking - securing sensitive data on phones and tablets.
    • integration
      Device Trust
      Ensure that only devices known to be secure can access your environment
    • eye-icon
      Vulnerability Management
      Avoid the risk associated with devices which are running out of data operating systems or have poorly configurations.
    • wifi
      Adversary-in-the-Middle (AitM) Protection
      Protect your employee's communications from being intercepted on unsafe cellular or Wi-Fi connections
  • Resources
    • case-studies
      Case studies
      Read about how a wide range of organizations are addressing mobile risk with Corrata
    • blog
      Blog
      Get up to date information on the key topics in mobile endpoint security
    • whitepapers-icon
      Whitepapers
      A selection of resources to help you navigate the world of mobile threat defence
    • threat-news
      Webinars
    graphic with code and physical damage made to it
    blog
    Blog
    An Overview of Data Loss Prevention (DLP) Read more
  • About
  • Login

    Footer navigation

    Contact

    Blackrock Business Park,
    Level 3, Block 3 ‘The Arch’,
    Blackrock,
    Co. Dublin

    info@corrata.com

     

     

    ISO 27001 Certification

    Menu

    • Why Corrata
    • About Corrata
    • Try Corrata
    • Corrata`s Partners
    • Glossary

    Resources

    • Case Studies
    • Whitepapers

    Use cases

    • Mobile Phishing Protection
    • Spyware Detection
    • Device Trust
    • Man-in-the-Middle (MitM) Protection
    • Vulnerability Management
    • Dangerous Applications

    Technical details

    • Network traffic inspection
    • Employee buy-in
    • Deployment and integration

    Newsletter

    Get regular mobile security insights from the experts.

      white-logo
      corrata 2026 all rights reserved
      • Privacy & cookie policy
      • Terms

      Try
      Corrata

      Give us a few details and one of our team will be in touch.

        If you are an existing customer looking for support please email support@corrata.com

        This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.

        | Privacy & Cookie Policy

        Corrata
        Powered by  GDPR Cookie Compliance
        Privacy Overview

        This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

        Strictly Necessary Cookies

        Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

        Cookie Policy

        More information about our Cookie Policy