Best Cyber Awareness Solution
April 21, 2022

Best Cyber Awareness Solution

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Barracuda Security Awareness Training (formerly Barracuda Phishline)

Our main purpose for using Phishline was to reduce the amount of times our users accept and open Phishing emails. Emails from Support and executives were not cutting it. Phishline helped us identify problem users and to provide training to them directly. It has helped us immensely!
  • Barracuda Phishline was very helpful in identifying the problem areas in our staff
  • Reporting help raise managements awareness
  • Easily monitor the individual user behaviour and access any security risks
  • Navigation of the application could be greatly improved upon
  • Setup documentation to be lacking
  • Technical support is helpful but I would like to be able to do more without contacting them
  • Strong services expertise
  • Product roadmap and future vision
  • Product functionality and performance
  • Improve compliance & risk management
Overall the products are very similar however as Barracuda offers a one-stop shop for email security and awareness training this is better preferred from an IT Admin Perspective

Do you think Barracuda Security Awareness Training delivers good value for the price?

Yes

Are you happy with Barracuda Security Awareness Training's feature set?

Yes

Did Barracuda Security Awareness Training live up to sales and marketing promises?

Yes

Did implementation of Barracuda Security Awareness Training go as expected?

Yes

Would you buy Barracuda Security Awareness Training again?

Yes

Outside of doing group based training with multiple individuals, Phishline fits every scenario for Awareness Training that is needed within my Organisation

Barracuda Security Awareness Training Feature Ratings

Training Content Library
8
Multilingual Training Content
7
Training Gamification
10
Industry-Specific Security Training
5
Individualized Security Training Plans
7
Phishing Simulations
5
Security Reporting
10
Integration with Security Tech Stack
6
Role-based user permissions
8
Single sign-on capability
8