logo
logo
  • Products & Solutions
    • Products
      • Private Access
      • Threat Defense
      • Data Policy
      • Hotspot Protect
      • Wandera Security Suite
    • Solutions
      • Application Access
      • Conditional Access
      • Unmanaged Devices/BYOD
      • Secure Remote Working
      • Zero Day Phishing
      • Content Filtering
      • App Intelligence
      • Shadow IT Control
      • Malware Detection
    • Integrations
      • Ecosystem Integrations
      • Microsoft
      • VMware
      • Cybereason
    • Wandera Security Cloud
      • Overview
      • Global Network
      • Unified Policy
      • MI:RIAM Threat Intelligence
      • Deployment Options
      • Secure Access Service Edge (SASE)
  • Why Wandera
  • Insights
    • Resources
      • Threat Research
      • Customer Stories
      • Research & Reports
      • Blog
    • Analyst Reports
      • Gartner Market Guide for ZTNA
      • Gartner Market Guide for MTD
  • Company
    • About
    • Board
    • Partners
    • Press
    • Careers
  • Login
  • Contact
  • Request a Demo
  • Search

data leak

August 13, 2019

British Airways sending vulnerable check-in links


Liarna La Porta by Liarna La Porta

June 26, 2018

New feature helps customers implement GDPR strategy on mobile


Avatarby Nell Campbell

April 30, 2018

Music streaming app Qobuz discovered leaking data


Liarna La Porta by Liarna La Porta

April 3, 2018

What are app leaks and how do I know if my apps are leaking data?


Liarna La Porta by Liarna La Porta

January 8, 2018

Open Wi-Fi risks: is it safe to connect to open and free networks?


Liarna La Porta by Liarna La Porta

November 28, 2017

Skyscape threat: a sickening amount of health data at risk


Avatarby Nell Campbell

September 13, 2017

E-mail hacking: why access to your account is as good as gold


Avatarby Michelle Base-Bursey

August 24, 2017

Inappropriate mobile activity – how serious is the problem?


Liarna La Porta by Liarna La Porta

July 6, 2017

Former internet giant fails to keep up with security trends


Avatarby Michelle Base-Bursey

February 28, 2017

Healthcare apps: The new frontier for security?


Avatarby Michelle Base-Bursey

  • 1
  • 2

Wandera Security Suite

  • Private Access
  • Threat Defense
  • Data Policy
  • Wandera Security Suite

Use Cases & Capabilities

  • Application Access
  • Conditional Access
  • Unmanaged Devices/BYOD
  • Secure Remote Working
  • Zero Day Phishing
  • Content Filtering
  • App Intelligence
  • Shadow IT Control
  • Malware Detection

Integrations

  • Ecosystem Integrations
  • Microsoft
  • VMware
  • Cybereason

Wandera Security Cloud

  • Overview
  • Global network
  • Unified Policy
  • MI:RIAM threat intelligence
  • Deployment Options
  • Secure Access Service Edge (SASE)

© 2021 Wandera. All rights reserved. Privacy Policy | EULA | Service Description

By continuing to use our website, you acknowledge the use of cookies.

Privacy Preference Center

Privacy Preferences

Privacy Policy

Required
You have read and agreed to our Privacy Policy.
Privacy Policy