Infosec IQ Review
June 14, 2022

Infosec IQ Review

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Infosec IQ

We use it to simulate phishing emails as well as security training. We want to make sure our employees are alert and aware of any potential security risks that may come through regular forms of communication. We send out monthly training videos as well as regular phishing simulations to keep people vigilant.
  • Simulated phishing emails
  • Security training
  • Maintaining alertness
  • Phish notify plugin could be polished more, it currently does not delete or archive successful phishing reports
  • Phishing simulation
  • Security training
  • Reporting on who has fallen for a phishing attempt
  • It has made people more cautious when opening emails
  • Sometimes the phishing attempts are too accurate and result in people asking if real emails are phishing. This is a win actually because it ensures that people aren't too trusting with their emails.
  • Monthly training ensures people are up to date on security practices
I have not used or evaluated any other tools

Do you think Infosec IQ delivers good value for the price?

Not sure

Are you happy with Infosec IQ's feature set?

Yes

Did Infosec IQ live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Infosec IQ go as expected?

I wasn't involved with the implementation phase

Would you buy Infosec IQ again?

Yes

Infosec IQ is very good at simulating phishing emails and ensuring that people are cautious when opening emails. Additionally, the training videos are easily digestible. It makes it easy to make sure that your employees are up to date on the latest security risks. It also helps ensure that people remain vigilant throughout their day-to-day processes.

Infosec IQ Feature Ratings

Training Content Library
8
Multilingual Training Content
8
Training Gamification
8
Industry-Specific Security Training
8
Individualized Security Training Plans
8
Phishing Simulations
9
Security Reporting
8
Role-based user permissions
7
Single sign-on capability
8