C8 Secure enters partnership with Corrata
By Dave Sawyer, Last updated Mar 20, 2024
C8 Secure (a Continent 8 company), a provider of comprehensive, multi-layered cybersecurity solutions that focus on threat prevention, has entered into an agreement with Corrata, a mobile endpoint security solution provider that offers complete protection against any mobile threat.
Through this agreement, C8 Secure has launched its Mobile Protect solution, a C8 Secure managed service which incorporates Corrata’s unique technology with other mobile centric security capabilities.
The solution protects employee devices, strengthening mobile endpoints against contemporary security threats, ensuring safe access to corporate data while respecting personal usage.
Mobile Protect provides a complete defence against mobile threats, such as detecting and disabling malware, blocking smishing attacks, protecting WiFi communications and vulnerability management.
It complements the company’s SafeBait solution which simulates social engineering and phishing campaigns, a managed service that offers customized phishing defense solutions.
Patrick Gardner, Managing Partner at C8 Secure, a Continent 8 company, comments: “Mobile devices are an essential tool for today’s modern business, making this a huge target for cyber criminals.”
“In 2022 alone, 46% of organisations suffered a mobile-related security breach, so it is essential that businesses are securing these devices.”
“We are thrilled to be working with Corrata to develop our Mobile Protect solution which enables businesses to protect all iOS and Android devices from cyber attacks, safeguarding their employees from malicious actors.”
Dylan Fermoyle, VP at Corrata, comments: “We are delighted to partner with C8 Secure. Their track record in providing high-touch managed security services to marquee customers aligns directly with Corrata’s mission to provide the best possible protection to the mobile workspace.”
C8 Secure leverages a comprehensive, multi-layered solution focused on threat prevention versus detection. This includes SIEM/SOC capabilities, EDR and MDR protection and DDoS and WAAP solutions.