logo
logo
  • Products & Solutions
    • Products
      • Private Access
      • Threat Defense
      • Data Policy
      • Hotspot Protect
      • Wandera Security Suite
    • Solutions
      • Application Access
      • Conditional Access
      • Content Filtering
      • SaaS Application Security
      • Secure Remote Working
      • Alternative to Tunnel for Microsoft Endpoint Manager
      • Unmanaged Devices/BYOD
      • Zero Day Phishing
      • App Intelligence
      • Shadow IT Control
      • Malware Detection
      • Zero Trust Network Access (ZTNA)
    • Integrations
      • Ecosystem Integrations
      • Microsoft
      • VMware
      • Cybereason
    • Wandera Security Cloud
      • Overview
      • Global Network
      • Unified Policy
      • MI:RIAM Threat Intelligence
      • Deployment Options
      • Secure Access Service Edge (SASE)
  • Why Wandera
  • Insights
    • Gartner Market Guide for ZTNA
    • Threat Research
    • Customer Stories
    • Research & Reports
    • Blog
  • Company
    • About
    • Board
    • Partners
    • Press
    • Careers
  • Login
  • Contact
  • Try Wandera
  • Search

App and Data Leaks

April 15, 2019

Is it dangerous for White House personnel to use their personal phones?


Avatarby Tyler Harris

December 19, 2018

Top 5 Types of Sideloaded Apps and the Risks They Pose


Avatarby Matt Urwin

November 19, 2018

Six tips for safe shopping on Black Friday and Cyber Monday


Liarna La Porta by Liarna La Porta

August 30, 2018

Play Riches: the Google Play app leaking credentials and distributing adware


Avatarby Nell Campbell

April 30, 2018

Music streaming app Qobuz discovered leaking data


Liarna La Porta by Liarna La Porta

April 3, 2018

What are app leaks and how do I know if my apps are leaking data?


Liarna La Porta by Liarna La Porta

February 21, 2018

What are app permissions – a look into Android app permissions


Avatarby Michelle Base-Bursey

February 7, 2018

Strava’s privacy zones have been revealing users’ hidden locations


Liarna La Porta by Liarna La Porta

November 28, 2017

Skyscape threat: a sickening amount of health data at risk


Avatarby Nell Campbell

October 26, 2017

App Insights: Wandera provide unrivaled visibility with new feature


Avatarby Michelle Base-Bursey

  • 1
  • 2
  • 3

Wandera Security Suite

  • Private Access
  • Threat Defense
  • Data Policy
  • Wandera Security Suite

Use Cases & Capabilities

  • Application Access
  • Conditional Access
  • Unmanaged Devices/BYOD
  • Secure Remote Working
  • Zero Day Phishing
  • Content Filtering
  • App Intelligence
  • Shadow IT Control
  • Malware Detection

Integrations

  • Ecosystem Integrations
  • Microsoft
  • VMware
  • Cybereason

Wandera Security Cloud

  • Overview
  • Global network
  • Unified Policy
  • MI:RIAM threat intelligence
  • Deployment Options
  • Secure Access Service Edge (SASE)

© 2021 Wandera. All rights reserved. Privacy Policy | EULA | Service Description

By continuing to use our website, you acknowledge the use of cookies.

Privacy Preference Center

Privacy Preferences

Privacy Policy

Required
You have read and agreed to our Privacy Policy.
Privacy Policy