Good value for money.
June 12, 2022

Good value for money.

Anonymous | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User

Overall Satisfaction with PhishingBox

We use it in the company to train new workers as part of their onboarding process. For us is super important to let them know that email is one of the biggest threads when speaking about malware. The important thing to remember is that at the end the human is the last step of the chain and always the weakest
  • Training new employees.
  • Keep our workforce trained with new challenges regularly.
  • We get the latest templates of new phishing attacks what help us to stay ahead.
  • While most of the examples are good there are a few that are quite obvious.
  • The pricing could be a little bit lower for the type of software.
  • The template creator sometimes has glitches.
  • To be able to train people on what to see when checking phishing emails.
  • The editor is good for learners.
  • The library of templates is huge with real attack examples.
  • Well basically to have people trained is the most positive impact of the software.
  • The template library makes our employees know about different types of phishing attacks.
  • The ROI is clear, avoiding a phishing attack is enough to pay the software.

Do you think PhishingBox delivers good value for the price?

Yes

Are you happy with PhishingBox's feature set?

Yes

Did PhishingBox live up to sales and marketing promises?

Yes

Did implementation of PhishingBox go as expected?

Yes

Would you buy PhishingBox again?

Yes

Basically for training purposes is what we've been using it for. I understand that for expert people this program would not be much help but for the vast majority of new workers that we receive at the company is pretty well suited. The editor is good because we let the students train by creating templates.

PhishingBox Feature Ratings

Training Content Library
7
Multilingual Training Content
6
Training Gamification
8
Industry-Specific Security Training
6
Individualized Security Training Plans
8
Phishing Simulations
8
Security Reporting
8
Integration with Security Tech Stack
6
Role-based user permissions
6
Single sign-on capability
6