What are the benefits?
Most important, save time and money by organizing phish simulation efforts by considering risk
What are the benefits?
Phishing attacks use email, pop-ups, or malicious websites to solicit personal information by posing as a trustworthy organization.
Example:
An attacker may send email seemingly from a reputable credit card company or financial
institution that requests account information, often suggesting that there is a problem.
When users respond with the requested information, attackers can use it to gain access to
the accounts.
It uses genuine-looking content such as images, texts, logos, or even mirrors the legitimate website to entice visitors to enter their account or financial information .
The essential step in phishing response is “Detection and Identification” followed by Containment, Eradication, and Recovery. The objective of the SecurePhish, a phishing simulator is to enhance the ability of users to “Detect and Identify” phishing emails. SecurePhish educates users in discovering telltale signs within emails.
Offering | SmartPhish | ProtectPhish | SecurePhish |
Smart Phish | |||
Smart Phish – Develop Risk Based Profile | Y | Y | |
Smart phishing campaigns - Design Smart risk-based testing campaigns | Y | Y | |
Smart template creation | Y | Y | |
Website Smart cloning tool | Y | Y | |
Protect Phish | |||
Real time detect and protect phish | Y | ||
Mobile phishing protection | Y | ||
Browser phishing protection | Y | ||
Campaigns | |||
Smart Groups identification | Y | Y | |
Random target selection | Y | Y | |
Variable Campaigns | Y | Y | |
Smart Template Campaigns | Y | Y | |
Statistical Sampling | Y | Y | |
Smart User Drive Test | Y | Y | |
Reports | |||
Branded Reports | Y | Y | |
Print & Export Reports | Y | Y | |
Schedule Realtime Email Alerts for Campaigns | Y | Y | |
Basic and Advanced Reporting | Y | Y | |
Interactive Reports | Y | Y | |
Reporting API | Y | Y | |
Training | |||
Built-in training content (Free Awareness Training) | Y | Y | |
Security pointers to enhance continues learning process | Y | Y | |
Proprietary content | Y | Y | |
Learning activities and knowledge checks followed by final assessment | Y | Y | |
KillPhish button – Just a click to report phish | Y | Y | |
Integration | |||
Active directory integration (ADI) | Y | Y | |
Fractional Risk Office | Y | Y | |
Support | |||
Email, Phone and Resources | Y | Y | |
Social Engineering | |||
Social Engineering Services | Y | Y | |
Advanced Training | |||
SecuRetain Training (Advanced training courses) | Y | Y |