Great and easy to maintain product
April 06, 2022

Great and easy to maintain product

Steinar Heijkoop | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Infosec IQ

We use it for security awareness between our users. I am responsible to add all the users and make sure they follow up the training. It is easy to add users and maintain them. When we chase on people that did not follow the training we sometimes get feedback that they do not understand the training because of a language barrier. That is the only thing we struggle with.
  • Easy way to maintain users
  • Easy to add new users
  • Support multiple languages
  • Video for different levels of employees
  • People are more aware of security risks.
So far I did not use the support yet.

Do you think Infosec IQ delivers good value for the price?

Yes

Are you happy with Infosec IQ's feature set?

Yes

Did Infosec IQ live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Infosec IQ go as expected?

I wasn't involved with the implementation phase

Would you buy Infosec IQ again?

Yes

It works very good for our company because it is easy to maintain and easy to keep track of people who followed the trainings. We can add and remove people very easily and can keep track of the trainings. Because of this, we are able to chase users that did not follow their training yet and can make sure the company is aware of security risks.
I did not make use of this yet.
I did not purchase the product
We are a multiple language company. Not all our colleagues are speaking English so that is hard sometimes.
It is easy for us to maintain the users and add or remove new people.

Also our IT users need to follow the training. The feedback we receive from them is that the video's are not needed for them.

Infosec IQ Feature Ratings

Training Content Library
8
Multilingual Training Content
7
Training Gamification
8
Industry-Specific Security Training
8
Individualized Security Training Plans
8
Phishing Simulations
7
Security Reporting
9
Integration with Security Tech Stack
8
Role-based user permissions
8
Single sign-on capability
8