Features
Top Performing Features
Role-based user permissions
Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.
Category average: 8.7
Training Content Library
A pre-built library of security awareness training content that can be used immediately.
Category average: 8.5
Industry-Specific Security Training
Security training can be tailored based on industry-specific requirements, such as HIPAA, PCI DSS, GDPR, etc.
Category average: 7.4
Individualized Security Training Plans
Training can be tailored to individual employees based on previous training, role, or assessed vulnerability.
Category average: 8
Security
This component helps a company minimize the security risks by controlling access to the software and its data, and encouraging best practices among users.
Role-based user permissions
Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.
Category average: 8.7
Security Awareness Training
Common features of security awareness training products.
Training Content Library
A pre-built library of security awareness training content that can be used immediately.
Category average: 8.5
Industry-Specific Security Training
Security training can be tailored based on industry-specific requirements, such as HIPAA, PCI DSS, GDPR, etc.
Category average: 7.4
Individualized Security Training Plans
Training can be tailored to individual employees based on previous training, role, or assessed vulnerability.
Category average: 8
Phishing Simulations
Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.
Category average: 9.1