Likelihood to Recommend Cofense PhishMe is an excellent solution for scenarios where it will be sold as a managed service. I believe that PhishMe is too expensive for many clients and instead would benefit from the economies of scale where an MSSP sells it as part of a whole service, which offers the analysts and reporting included. PhishMe is excellent for training and awareness of Phishing, but shouldn't replace mandatory training for new joiners or yearly refreshers, it should only be used as an additional training option.
Read full review It is easy to use with sufficient documentation on how to use the tools for end users or newbies. Experienced testers will find it easy to customise and configure the test cases. Just wished that I could have taken up a course on using this tool in my study days so that I could had explored more and improved my familiarity with the tool, unlike when working where access and time to explore the other features of the tool is limited
Read full review Pros It gives clear-cut segregation of different parts of an email, header, text and HTML body, URL, attachments, HTML preview and some analytical insight like "similar reports." This distinctive approach actually helps reduce data overload during an analysis. The URLs captured here pass through an automatic reputation check [in our case VirusTotal] and add a tag of the reputation. If it is a well-known bad URL the tag helps us take the decision fast. For creating automation rules on the reported emails the "Recipes" section is really helpful. We can create easy recipes [or rules ] to handle a huge flow of reports and also we can create more sophisticated rules depending on the Cyber intelligence feed to catch the really bad currently less known attack attempts by malicious emails. The "Threat Indicators" section is also useful to use as a threat intelligence source to check the URLs for their maliciousness. Read full review Scanning our network for new or existing vulnerable systems. Automation of manual tests and exploits to allow what used to be days of effort to be squeezed into hours. Metasploit has become an integral part in our validation of new systems before their inclusion in our production network. Read full review Cons Completely switching to the new UI - Most is redesigned, but some old elements remain Ability to spoof known brands - limited in scope now and you are not allowed to use fully "convincing" campaigns that we are seeing in the wild Ability to own and manage own domains - right now adding a new company domain requires a ticket, allow us to add/verify ourselves Read full review Have encountered issues with updating especially after moving from BackTrack to Kali. Sometimes it gets a little buggy, but that's a rare occurrence. Read full review Usability Its built with UX in mind and is aimed at non-tech people, to ensure that almost everyone can run the campaign. But if we go deeper - sometimes you will need an HTML editor or support in order to figure out some advanced edits you might want to add in your scenarios.
Read full review Support Rating I have not had to use their support for pretty much anything. The software works well, and is very intuitive. I would imagine their support would be rather basic as there is not too much that can go wrong with a report phishing button, and if it were I would probably consider a different software.
Read full review We don't use it.
Read full review Online Training It's a must, even if you are never going to use the tool. Cofense aims to provide phishing training first and tool second.
Read full review Implementation Rating There are some hiccups, but there are meant to be, when you implement something in a large scale enterprise.
Read full review Alternatives Considered Cofense PhishMe was the first choice for us as the user interface as well as their bundle package with
Cofense Triage and Vision has helped the organisation to alleviate the overall security awareness posture. The other vendors did not provide a vast range of phishing scenarios as compared to Cofense PhishMe platform.
Read full review Metasploit is an all around good suite of tools to test and validate potential vulnerabilites. Other tools have bits and pecies such as
Nmap , Nessus,
Burp Suite , etc. but Metasploit can function in the same way but more.
Read full review Return on Investment Recipes in the system are capable of handling almost 2x what an analyst does, which cuts down the efforts [of] an analyst and provides more time for accurate strategies. With roughly 90% false positives coming through, the remaining 10% of true positives need as much attention as they can get for the full investigation and analysis. 1,500 or more phishing messages can come through in a given week and the amount of time/employees required to review this without a tool like Cofense is surely beyond [the] expected/anticipated budget. Read full review If you prevent an attack you will save a lot of money. There is a free version that has a lot of useful exploits. You can run it in an open source OS. Read full review ScreenShots Cofense PhishMe Screenshots