Cofense PhishMe became our 'Catch of the Day'
May 01, 2020
Cofense PhishMe became our 'Catch of the Day'
Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with Cofense PhishMe
Our company is using Cofense PhishMe across the entire organization as part of a larger security awareness program that has been designed to give end users the tools and knowledge to recognize clear and present dangers. The email inbox is one of the easiest vectors that an external actor can access as email addresses are typically published in multiple places online. Cofense PhishMe is being used to address the real world problem of users not recognizing legitimate vs. fake or malicious email.
Pros
- PhishMe scenarios are based on real-world examples of malicious email reported through one of their other product offerings; Phishing Defense Center (PDC)
- Scenarios have the ability to be easily customized and changed to suit the needs of your own organization to make them more relevant. This increases the chance of a click or attachment opening providing a teachable moment with more users.
- Console is easy to navigate and use for all levels of technical ability. Not everyone on our team is technically inclined, however, the interface is easy to understand and obtain information from allowing everyone who uses it to be comfortable.
- Reporting capabilities from completed scenarios is quite good as long as you provide the detail on users during initial import or sync.
Cons
- There is only the ability to run one Playbook at a time. For larger enterprises that may have more than one organization they wish to target in different ways, this is a limitation that requires some clever workarounds.
- Despite the efforts of reporting and statistics to remove false clicks and multiple clicks from the same users, there are several times we have had to analyze raw data exports in Excel to verify (and correct) our final metrics for scenarios. Not a deal-breaker, however, does require a time investment.
- Adding/removing users to the PhishMe instance requires a ticket to be submitted to Support. There is no method in the instance for us to do this at our company.
- After conducting just two scenarios as of the time of this review, we have already achieved a 50% increase in phishing email reports, and a 70% reduction in phishing clicks/attachment opens. We expect that trend to continue.
- The metrics we've generated from the PhishMe solution have provided us insight into user behavior and highlighted pockets of risk in the world where additional and targeted security awareness training would be more beneficial.
- PhishMe gave us the data to backup requests for monetary recognition awards (e.g. fastest clickers, top reporters, etc.) from executive management.
Our previously used product was SANS ACLP. This wasn't an altogether horrible product and for the time we used it the purpose for its use was served. We had multiple issues though with how this product delivered emails, captured clicks, and generated reporting once the campaigns were completed. There just wasn't enough robustness in the reporting for our needs.
Comments
Please log in to join the conversation