Millions of devices feed Coronet’s threat intelligence database which includes connectivity and infrastructure security risks, threats and attacks. Such threats include:
Wireless Phishing, Honey Pot, Evil Twin, VPN Gap, ARP Poisoning (like Ettercap), compromised routers, attack equipment, traffic re-routing and MITM attacks among many others.
The data is compiled into a quarterly report that can bedownloaded here .
Why should you care?
If your company is using cloud based applications (e.g. office365, Dropbox, Salesforce and many others) and allows users to connect from any device (BYOD), and you do not have millions of dollars to purchase enterprise grade security, then your data and cloud applications are fully exposed.
What can you do?
Join now the millions of users that use Coronet for free: Coronet makes enterprise grade security available for every business. It's cloud based, so you need to install nothing on premises, takes less than 20min to configure, and it is FREE, forever.