TrustRadius: an HG Insights company

KnowBe4 Security Awareness Training

Score9.1 out of 10

1,147 Reviews and Ratings

Features

Top Performing Features

  • Phishing Simulations

    Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.

    Category average: 9.1

  • Single sign-on capability

    The software system supports a centralized authentication mechanism allowing the user to access multiple systems with a single, centrally managed password.

    Category average: 9.2

  • Role-based user permissions

    Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.

    Category average: 8.7

  • Security Reporting

    Reports available may include statistics on phishing simulations, training completion, etc.

    Category average: 8.6

Security

This component helps a company minimize the security risks by controlling access to the software and its data, and encouraging best practices among users.

  • Single sign-on capability

    The software system supports a centralized authentication mechanism allowing the user to access multiple systems with a single, centrally managed password.

    Category average: 9.2

  • Role-based user permissions

    Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.

    Category average: 8.7

Security Awareness Training

Common features of security awareness training products.

  • Training Content Library

    A pre-built library of security awareness training content that can be used immediately.

    Category average: 8.5

  • Multilingual Training Content

    Training content is available in multiple languages.

    Category average: 8.2

  • Training Gamification

    Training content is available in a gamified format.

    Category average: 7.9

  • Industry-Specific Security Training

    Security training can be tailored based on industry-specific requirements, such as HIPAA, PCI DSS, GDPR, etc.

    Category average: 7.4

  • Individualized Security Training Plans

    Training can be tailored to individual employees based on previous training, role, or assessed vulnerability.

    Category average: 8

  • Phishing Simulations

    Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.

    Category average: 9.1

  • Security Reporting

    Reports available may include statistics on phishing simulations, training completion, etc.

    Category average: 8.6

  • Integration with Security Tech Stack

    The product integrates with other security tools, such as a SIEM or SOAR platform, and may provide alerts for potential breaches.

    Category average: 8.5