My main use case for Corrata is threat detection and response for our employee mobile phones and tablets. We are most concerned about social engineering attacks targeting our employees because we're involved in very high-value transactions, so an example of the type of threat we're trying to counter would be a receipt of a WhatsApp message with a phishing link embedded in the message. We use Corrata to detect that threat and then to block any attempt by an employee to click on that malicious link. We also use Corrata for two other important things. First is to make sure that all of the communications between our employee devices and our enterprise systems are properly encrypted. And the second is to ensure that the devices that our employees are using have not been in any way compromised by malware.
My main use case for Corrata is threat detection and response for our employee mobile phones and tablets. We are most concerned about social engineering attacks targeting our employees because we're involved in very high-value transactions, so an example of the type of threat we're trying to counter would be a receipt of a WhatsApp message with a phishing link embedded in the message. We use Corrata to detect that threat and then to block any attempt by an employee to click on that malicious link. We also use Corrata for two other important things. First is to make sure that all of the communications between our employee devices and our enterprise systems are properly encrypted. And the second is to ensure that the devices that our employees are using have not been in any way compromised by malware.