What are the benefits?
Most important, save time and money by organizing phish simulation efforts by considering risk
What are the benefits?
Phishing attacks use email, pop-ups, or malicious websites to solicit personal information by posing as a trustworthy organization.
Example:
An attacker may send email seemingly from a reputable credit card company or financial
institution that requests account information, often suggesting that there is a problem.
When users respond with the requested information, attackers can use it to gain access to
the accounts.
It uses genuine-looking content such as images, texts, logos, or even mirrors the legitimate website to entice visitors to enter their account or financial information .
The essential step in phishing response is “Detection and Identification” followed by Containment, Eradication, and Recovery. The objective of the SecurePhish, a phishing simulator is to enhance the ability of users to “Detect and Identify” phishing emails. SecurePhish educates users in discovering telltale signs within emails.
| Offering | SmartPhish | ProtectPhish | SecurePhish |
| Smart Phish | |||
| Smart Phish – Develop Risk Based Profile | Y | Y | |
| Smart phishing campaigns - Design Smart risk-based testing campaigns | Y | Y | |
| Smart template creation | Y | Y | |
| Website Smart cloning tool | Y | Y | |
| Protect Phish | |||
| Real time detect and protect phish | Y | ||
| Mobile phishing protection | Y | ||
| Browser phishing protection | Y | ||
| Campaigns | |||
| Smart Groups identification | Y | Y | |
| Random target selection | Y | Y | |
| Variable Campaigns | Y | Y | |
| Smart Template Campaigns | Y | Y | |
| Statistical Sampling | Y | Y | |
| Smart User Drive Test | Y | Y | |
| Reports | |||
| Branded Reports | Y | Y | |
| Print & Export Reports | Y | Y | |
| Schedule Realtime Email Alerts for Campaigns | Y | Y | |
| Basic and Advanced Reporting | Y | Y | |
| Interactive Reports | Y | Y | |
| Reporting API | Y | Y | |
| Training | |||
| Built-in training content (Free Awareness Training) | Y | Y | |
| Security pointers to enhance continues learning process | Y | Y | |
| Proprietary content | Y | Y | |
| Learning activities and knowledge checks followed by final assessment | Y | Y | |
| KillPhish button – Just a click to report phish | Y | Y | |
| Integration | |||
| Active directory integration (ADI) | Y | Y | |
| Fractional Risk Office | Y | Y | |
| Support | |||
| Email, Phone and Resources | Y | Y | |
| Social Engineering | |||
| Social Engineering Services | Y | Y | |
| Advanced Training | |||
| SecuRetain Training (Advanced training courses) | Y | Y |