Train the human firewall with this product included in your Total Email Protection
May 01, 2022

Train the human firewall with this product included in your Total Email Protection

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Barracuda Security Awareness Training (formerly Barracuda Phishline)

We use Barracuda Security Awareness Training to protect our brand against impersonation attacks. We see that there are attacked phishing emails sent with our brand to our customers to harvest money. We want to protect our customers by sending out phishing campaigns to create awareness.
  • Easy to create address books
  • Templates are already available in the library
  • Training campaigns are easy to send out
  • Not always a very fast interface
  • Sometimes difficult to find the right menus
  • Administration interface is quite difficult
  • Protect our customers against targeted phishing mails
  • Set up training campaigns
  • Train the human firewall
  • Our customers are aware of possible attacks
  • Users are aware of what they have to pay attention to
  • Possible attacks can be prevented
Barracuda Security Awareness Training from Barracuda Networks was already included in our TEP environment.

Do you think Barracuda Security Awareness Training delivers good value for the price?

Yes

Are you happy with Barracuda Security Awareness Training's feature set?

Yes

Did Barracuda Security Awareness Training live up to sales and marketing promises?

Yes

Did implementation of Barracuda Security Awareness Training go as expected?

Yes

Would you buy Barracuda Security Awareness Training again?

Yes

The perfect product to create training phishing campaigns. It is already included with the famous Barracuda TEP product used for email gateway (anti-spam).

Barracuda Security Awareness Training Feature Ratings

Training Content Library
7
Multilingual Training Content
6
Training Gamification
7
Industry-Specific Security Training
6
Individualized Security Training Plans
7
Phishing Simulations
8
Security Reporting
7
Integration with Security Tech Stack
7
Role-based user permissions
7
Single sign-on capability
6