Features
Top Performing Features
Phishing Simulations
Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.
Category average: 9.1
Single sign-on capability
The software system supports a centralized authentication mechanism allowing the user to access multiple systems with a single, centrally managed password.
Category average: 9.2
Role-based user permissions
Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.
Category average: 8.7
Security Reporting
Reports available may include statistics on phishing simulations, training completion, etc.
Category average: 8.6
Security
This component helps a company minimize the security risks by controlling access to the software and its data, and encouraging best practices among users.
Single sign-on capability
The software system supports a centralized authentication mechanism allowing the user to access multiple systems with a single, centrally managed password.
Category average: 9.2
Role-based user permissions
Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.
Category average: 8.7
Security Awareness Training
Common features of security awareness training products.
Training Content Library
A pre-built library of security awareness training content that can be used immediately.
Category average: 8.5
Multilingual Training Content
Training content is available in multiple languages.
Category average: 8.2
Training Gamification
Training content is available in a gamified format.
Category average: 7.9
Industry-Specific Security Training
Security training can be tailored based on industry-specific requirements, such as HIPAA, PCI DSS, GDPR, etc.
Category average: 7.4
Individualized Security Training Plans
Training can be tailored to individual employees based on previous training, role, or assessed vulnerability.
Category average: 8
Phishing Simulations
Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.
Category average: 9.1
Security Reporting
Reports available may include statistics on phishing simulations, training completion, etc.
Category average: 8.6
Integration with Security Tech Stack
The product integrates with other security tools, such as a SIEM or SOAR platform, and may provide alerts for potential breaches.
Category average: 8.5