{"global":{"lastError":{},"locale":"de","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"en":"Partnership program","ru":"Партнерская программа","_type":"localeString"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"_type":"localeString","en":"Partners-vendors","ru":"Партнеры-производители"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"_type":"localeString","en":"Supplied products","ru":"Поставляемые продукты"},"vendored-products":{"_type":"localeString","en":"Produced products","ru":"Производимые продукты"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"en":"Events schedule","ru":"Pасписание событий","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"en":"Company presentation","ru":"Презентация компании","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"translations":{"ru":"Компания","_type":"localeString","en":"Company"},"name":"title"},{"name":"description","translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"}},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"knowbe4":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[{"id":1142,"title":"KnowBe4 for Abax","description":"<b>Brief Summary.</b> European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement that can be easily relayed back to the company’s Board.\r\n<b>Business and Technical Challenges.</b> With ABAX swiftly growing from a start-up of five people to over 400 staff after just ten years, Espen Otterstad head of IT and acting CISO at ABAX realised that “people were probably one of the largest vulnerabilities” when it came to the security of the business. Furthermore, as the company was expanding with new owners taking over, ABAX was receiving a lot of media attention, appearing in a number of new articles. With the extra attention, Otterstad noticed that phishing attempts were on the rise and “employees were opening emails they perhaps shouldn’t be opening.” In addition, while information security was paramount, Otterstad also recognised that wading through long reports was not going to have the desired impact when it came to translating the security culture to the Board and management team. Therefore, he also needed clear and precise metrics to share with the Board and be able to demonstrate improvements or conversely, areas for improvements.\r\n<b>The Solution.</b> In order to fulfil the requirements of measuring the security culture baseline for ABAX—while being able to deliver a concise KPI measurement for the Board and management team—Otterstad initiated conversation with Kai Roer, CEO of CLTRe, now a KnowBe4 company. CLTRe helps companies manage and gauge security culture with a comprehensive toolkit and Security Culture Framework that uses a scientific approach to scope security across seven dimensions, resulting in a detailed insight into how different teams and business units compare.\r\n<b>Results and Benefits.</b> With many cybersecurity implementations, the theoretical cost savings were huge for ABAX, particularly before and after the advent of GDPR, Otterstad explained. “Using CLTRe was not only absolutely necessary, but also a good investment,” he said.","alias":"knowbe4-dlja-abax","roi":0,"seo":{"title":"KnowBe4 for Abax","keywords":"","description":"<b>Brief Summary.</b> European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement tha","og:title":"KnowBe4 for Abax","og:description":"<b>Brief Summary.</b> European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement tha"},"deal_info":"","user":{"id":8773,"title":"Abax","logoURL":"https://old.roi4cio.com/uploads/roi/company/abax.png","alias":"abax","address":"","roles":[],"description":" ABAX, a Norwegian company started in 2009, is currently the fastest growing telematics company in Europe with a presence in the Nordics, Netherlands and UK. ABAX manages 270,000 account subscriptions for 30,000 customers under its fleet management, driver behaviour monitoring and vehicle/container tracking services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.abax.com/uk","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Abax","keywords":"","description":" ABAX, a Norwegian company started in 2009, is currently the fastest growing telematics company in Europe with a presence in the Nordics, Netherlands and UK. ABAX manages 270,000 account subscriptions for 30,000 customers under its fleet management, driver beh","og:title":"Abax","og:description":" ABAX, a Norwegian company started in 2009, is currently the fastest growing telematics company in Europe with a presence in the Nordics, Netherlands and UK. ABAX manages 270,000 account subscriptions for 30,000 customers under its fleet management, driver beh","og:image":"https://old.roi4cio.com/uploads/roi/company/abax.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":158,"title":"Norway","name":"NOR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1144,"title":"KnowBe4 for Alliance for Strong Families and Communities","description":"With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching their security posture with a highly-trained human firewall.\r\nNow that the Alliance has had its one-year anniversary with KnowBe4, the organization has increased the complexity of its simulated phishing tests and incorporated immediate trainings for users who mistakenly fall for a spoof. “KnowBe4 has allowed us to mature our program and build up that human firewall we wanted with security skills that really work. The Phish Alert Button tunes us in to actual threats in the wild and helps us create custom phishing templates that are very realistic. Our goal this year is to make our tests harder because we know that hackers don’t just send attachments or bad links. They start conversations and social engineer people; we are working with KnowBe4 to train our users to not respond to emails, to avoid smishing and vishing threats and more,” says Lukaszewski.\r\nIncreasing awareness about security practices and protocols were the main goals of the Alliances’ SAT program with KnowBe4. Lukaszewski and Mueller, however, had a broader vision that KnowBe4 has proven very helpful in achieving. “We understand that part of the role of our IT department is to help keep our organization secure. For us to really embrace a culture of security, we have to drive communication between our users and our IT department. KnowBe4 has proven to be very effective in helping us drive rapport and trust between these two groups and foster a stronger security culture internally,” said Mueller.\r\nTo achieve this goal, Mueller and Lukaszewski asked their users to phone IT directly if they failed a simulated phishing test. Mueller stated, “KnowBe4’s platform already alerts IT if a test is failed, but we want to promote good behaviors and get our users to understand that if something goes wrong in the real world, they must call IT right away. IT is not going to yell at them if they make a mistake; IT is going to help them solve the problem and protect the organization.” This approach also creates an environment that encourages users to not cover it up if they do mistakenly click a bad link or respond to a phishing email.\r\nWith their users regularly being sent phishing tests and receiving both automatic remedial and scheduled trainings, Mueller and Lukaszewski can appreciate the usability of the KnowBe4 platform. According to Mueller, “KnowBe4 makes it simple to do really important and complex trainings that build up an organization’s security posture. The usability of the platform is very strong; we are able to create custom templates very easily and challenge our users even more. And we love the fact that KnowBe4 consistently adds new content so we can keep our trainings and our simulated tests fresh. KnowBe4 has been a wonderful partner and one that we expect to continue working with for a long time.”","alias":"knowbe4-dlja-alliance-for-strong-families-and-communities","roi":0,"seo":{"title":"KnowBe4 for Alliance for Strong Families and Communities","keywords":"","description":"With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching ","og:title":"KnowBe4 for Alliance for Strong Families and Communities","og:description":"With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching "},"deal_info":"","user":{"id":8774,"title":"Alliance for Strong Families and Communities","logoURL":"https://old.roi4cio.com/uploads/roi/company/alliance.png","alias":"alliance-for-strong-families-and-communities","address":"","roles":[],"description":" The Alliance for Strong Families and Communities is a strategic action network that works with and through its network of social sector leaders to achieve a healthy and equitable society, ensuring policies and systems provide equal access and opportunity for health and well-being, economic opportunity, educational success, and safety and security. The organization serves as an incubator for learning and innovation to generate new solutions to society’s toughest problems and aggregates the very best sector knowledge. It also accelerates change through dynamic leadership development and collective action.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://alliance1.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Alliance for Strong Families and Communities","keywords":"","description":" The Alliance for Strong Families and Communities is a strategic action network that works with and through its network of social sector leaders to achieve a healthy and equitable society, ensuring policies and systems provide equal access and opportunity for ","og:title":"Alliance for Strong Families and Communities","og:description":" The Alliance for Strong Families and Communities is a strategic action network that works with and through its network of social sector leaders to achieve a healthy and equitable society, ensuring policies and systems provide equal access and opportunity for ","og:image":"https://old.roi4cio.com/uploads/roi/company/alliance.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":3,"title":"Afghanistan","name":"AFG"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1140,"title":"KnowBe4 for education institution","description":"<b>The Challenge.</b> In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve as compared to the public sector. While there are professional consortiums raising awareness of technology and security, unfortunately educational tech departments are often not aggressively staffed nor have the appropriate budget and resources.\r\nDon Ringelestein, CETL, Director of Technology at District 129, knew he needed to put more emphasis on security and phishing. This became even more of a priority in 2016 when District 129 fell victim to a DDoS attack that included weekly attacks and lasted nearly two months. With so much of the District relying on the internet, this was highly problematic for them to operate efficiently and showcased the dire need for improving its cybersecurity hygiene. At the same time, phishing attacks were increasingly plastered all over the news—including a nearby school district that fell victim to a phishing attack and divulged all social security numbers of its staff.\r\nRingelestein recognized that he needed to ramp up security and phishing, particularly in terms of end-user training. However, like many IT pros, he didn’t know exactly where to start in terms of creating a customized security awareness program that would be effective for District 129.\r\n<b>The Results.</b> As a result of working with KnowBe4, District 129 saw very dramatic and favorable results in only a short time. In a five-month period, monthly phishing rates dropped from 27% to .03 percent. “These results are stunning—we were thrilled to see how quickly the training yielded results,” said Ringelestein. Not only is the staff far more cautious, but teachers have responded very favorably and are open to the opportunity to educate themselves on phishing—tools that they can use even beyond the workplace.\r\n<b>Successful Outcomes</b>\r\n<ul> <li>Phish-prone percentage dropped from 27% to .03% in 5 months</li> <li>More security-aware culture among staff</li> <li>Positive teacher engagement with training content</li> <li>Phishing and training campaigns reinforced cautious vetting of emails</li> </ul>","alias":"knowbe4-dlja-uchebnogo-zavedenija","roi":0,"seo":{"title":"KnowBe4 for education institution","keywords":"","description":"<b>The Challenge.</b> In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve as compared to the public sector. While there are professional consortiums raising awareness","og:title":"KnowBe4 for education institution","og:description":"<b>The Challenge.</b> In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve as compared to the public sector. While there are professional consortiums raising awareness"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1138,"title":"KnowBe4 for financial institution","description":"<b>The Problem.</b> We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had been localized to the IT Dept and our Risk Management team. On a management level we knew what could go wrong, but we did not have a company wide awareness and we were not sure what we needed. We had basic security training in place as part of new employee onboarding and a yearly mandatory test. Employees could do a refresher course if needed, but we were limited to that.\r\nSome of our clients are now starting to require Security Awareness Training for their vendors as part of their audit process. These requirements do not specify the granularity needed, so we were still faced with a lack of clarity on what we needed and which method would be most effective and fulfill audit requirements.\r\nWhen we found KnowBe4, it was a perfect fit. We knew we had to have something that allowed us to do phishing tests on the staff, record training and results and be able to report on the results. KnowBe4 was able to do all this in an easy to use fashion, saving IT from having to do a lot of extra work. Our prior efforts would take a couple of weeks to do as a project and were nowhere near as fine tuned as KnowBe4 allowed us to get.\r\n<b>Getting Started.</b> Getting started was an easy process. We did a couple of calls and were walked through the process of importing addresses and setting up the way we wanted it, learning the reporting features and so forth. Once we were set up, we decided to do a baseline Phishing Security Test to see how many of our staff were phish-prone. Our results showed phishing was a far bigger situation than I had envisioned. We ran the test and got a staggering 39% phish-prone percent.\r\n<b>Training.</b> Due to the high percentage of clicks off our initial testing, we made Kevin Mitnick Security Awareness Training mandatory for staff and included it as part of any new employee training. The managers are required to do the 40 minute version and staff are given the option of doing the 15 minute version or the 40 minute version. We also have a group we put through the training in a classroom setting with the documentation as some computers do not have sound options. We are able to easily track who does the training and who completes it for compliance reporting.\r\n<b>Ongoing Phishing Tests.</b> Once we did the training, subsequent phishing tests dropped to zero as staff were darn sure they were not going to fall for a phishing test. We then started to explore some of the templates and customizable options and decided to use these to be a bit more “crafty” in our attempts. We got a few to respond and click but the general trend of clicks is continuing down with staff much more focused and able to avoid phishing attacks.","alias":"knowbe4-dlja-finansovogo-uchrezhdenija","roi":0,"seo":{"title":"KnowBe4 for financial institution","keywords":"","description":"<b>The Problem.</b> We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had been localized to the IT Dept and our Risk Management team. On a management level we knew what could go","og:title":"KnowBe4 for financial institution","og:description":"<b>The Problem.</b> We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had been localized to the IT Dept and our Risk Management team. On a management level we knew what could go"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1130,"title":"KnowBe4 for Irish Cattle Breeding Federation","description":"<b>Business and Technical Challenges.</b> With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed that the culture of security awareness at ICBF and Sheep Ireland was not progressing as it should. On the contrary, it was almost non-existent. “There was no security awareness within the company when I started,” Jonathan said. Passwords weren’t being changed regularly, and “everybody knew everybody else’s password.” He also noticed the click-through rate on phishing links was particularly high, as people would frequently log into their colleagues’ email and open a phishing link out of curiosity. However, despite their best efforts, they never won that free iPad that was promised.\r\n<b>The Resolution.</b> At the beginning of 2018, frustrated by employee apathy and limited by the constraints of a tedious training package, Jonathan was determined to find a training option that fit ICBF and Sheep Ireland’s needs without exceeding the current budget laid out by the organisation. Resolute to reduce the time spent chasing up workers across ten different departments, Jonathan aimed to provide security awareness to the entire organisation without the added hassle.\r\nFor Jonathan, research for a new security training service began with the Gartner Magic Quadrant and KnowBe4 immediately stood out at the forefront of security awareness providers in both leadership and vision. There were several other contenders, but he recalled that it was “a hassle” trying to get into contact with a local reseller, as most of them had offices overseas, making it difficult to conduct business across different time zones. He found that being able to do business with a company on the same schedule was a luxury often taken for granted, particularly in the realm of IT security.\r\n<b>Result and Benefits.</b> The results for ICBF and Sheep Ireland were simple, while it can be difficult to provide concrete metrics of success, the organisation noticed a “reduction of overall IT security threats”. The KnowBe4 training at ICBF and Sheep Ireland “has equipped staff with the tools needed to acknowledge IT security threats inside and outside the organisation.” While it can be difficult to provide a definitive metric for successful security awareness, one simple way of proving success is by measuring staff engagement with the training. Since implementing KnowBe4, Jonathan noticed that IT security had become a topic amongst colleagues as their attitude towards cybersecurity evolved.\r\n<i>“Staff were having light-bulb moments when they see or hear of security threats. They feel enabled to analyse threats and empowered to make informed decisions when faced with a threat.”</i>","alias":"knowbe4-dlja-irlandskoi-federacii-razvedenija-krupnogo-rogatogo-skota","roi":0,"seo":{"title":"KnowBe4 for Irish Cattle Breeding Federation","keywords":"","description":"<b>Business and Technical Challenges.</b> With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed th","og:title":"KnowBe4 for Irish Cattle Breeding Federation","og:description":"<b>Business and Technical Challenges.</b> With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed th"},"deal_info":"","user":{"id":8768,"title":"Irish Cattle Breeding Federation (ICBF)","logoURL":"https://old.roi4cio.com/uploads/roi/company/icbf.png","alias":"irlandskaja-federacija-razvedenija-krupnogo-rogatogo-skota-icbf","address":"","roles":[],"description":" The Irish Cattle Breeding Federation (ICBF) is a non-profit organisation charged with providing cattle breeding information services to the Irish dairy and beef industries. The organisation was set up in 1998 to benefit the agri-food industry, farmers, and wider Irish communities through genetic gain, ensuring sustainable breeding. ICBF is a world leader in cattle genomics and has about 90 employees across two physical sites.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.icbf.com/wp/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Irish Cattle Breeding Federation (ICBF)","keywords":"","description":" The Irish Cattle Breeding Federation (ICBF) is a non-profit organisation charged with providing cattle breeding information services to the Irish dairy and beef industries. The organisation was set up in 1998 to benefit the agri-food industry, farmers, and wi","og:title":"Irish Cattle Breeding Federation (ICBF)","og:description":" The Irish Cattle Breeding Federation (ICBF) is a non-profit organisation charged with providing cattle breeding information services to the Irish dairy and beef industries. The organisation was set up in 1998 to benefit the agri-food industry, farmers, and wi","og:image":"https://old.roi4cio.com/uploads/roi/company/icbf.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1132,"title":"KnowBe4 for Mayflower Theatre","description":"<b>Business and Technical Challenges.</b> With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top priority for all; and despite having a robust and resilient infrastructure in place, Paul Thompson, IT Manager at Mayflower Theatre, knew that more needed to be done. He said, <i>“we wanted to train and educate users about the various aspects of cybersecurity, from how to structure passwords, to spotting phishing emails.”</i> Many are still unaware of the different cyberattacks that are currently out in the world, so Paul and his team wanted to take a proactive approach to mitigating these threats by raising awareness about common risks like phishing emails and scams involving fraudulent websites.\r\n<b>The Resolution.</b> The prime objective for Paul was to build the general cybersecurity awareness of the employees at Mayflower Theatre. While some IT managers may want to review and test various security platforms before deciding on the right fit, Paul took a more direct approach when he came across the KnowBe4 platform, saying, “for the offering and the price, it was sufficiently unique to anything else I had seen in the market.”\r\n<b>Results and Benefits.</b> It’s a matter of when, not if, when an organisation will suffer a cyberattack and Paul is more than aware of this fact. However, it’s more about the reduction of risk for him. Whether employees come across real phishing emails or ones manufactured to test their skills, Paul explained how the staff were excited when they did come across one before flagging to the IT department. It’s this sort of reaction KnowBe4 was designed for, to get users motivated about security and for Paul, this is where the ROI has been most evident. Having KnowBe4 is an insurance policy in his eyes, saying, “I can absolutely say that we have received generic as well as targeted phishing emails aimed at people in the organisation and, because of the training, we have avoided an incident to date. Having a wide range of cybersecurity training deployed to the number of users that we have to cover a number of issues has been largely beneficial and very cost efficient.”\r\n<b>Future Plans.</b> Currently, Mayflower Theatre has 110 members using the KnowBe4 platform, but the expectation for Paul is to upgrade to the platinum subscription to give all staff members access due to the positive results he’s seen since 2017.","alias":"knowbe4-dlja-teatra-mehiflauehr","roi":0,"seo":{"title":"KnowBe4 for Mayflower Theatre","keywords":"","description":"<b>Business and Technical Challenges.</b> With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top priority for all; and despite having a robust and resilient infrastructure in place, Paul Thomp","og:title":"KnowBe4 for Mayflower Theatre","og:description":"<b>Business and Technical Challenges.</b> With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top priority for all; and despite having a robust and resilient infrastructure in place, Paul Thomp"},"deal_info":"","user":{"id":8769,"title":"Mayflower Theatre","logoURL":"https://old.roi4cio.com/uploads/roi/company/mayflower_thatre.png","alias":"teatr-mehiflauehr","address":"","roles":[],"description":" Mayflower Theatre is a 2,300 seated theatre based in Southampton, UK, making it the third largest by seating capacity outside of London and the largest in the South of England. Having first opened in 1928, it was originally called the Empire Theatre and recently celebrated its 90th birthday. The Theatre has consistently entertained an audience of half a million every year. The theatre estimates to have 80 full-time staff as well as an additional 240 employees who are hired on a voluntary, annualised and contracted basis.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.mayflower.org.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Mayflower Theatre","keywords":"","description":" Mayflower Theatre is a 2,300 seated theatre based in Southampton, UK, making it the third largest by seating capacity outside of London and the largest in the South of England. Having first opened in 1928, it was originally called the Empire Theatre and recen","og:title":"Mayflower Theatre","og:description":" Mayflower Theatre is a 2,300 seated theatre based in Southampton, UK, making it the third largest by seating capacity outside of London and the largest in the South of England. Having first opened in 1928, it was originally called the Empire Theatre and recen","og:image":"https://old.roi4cio.com/uploads/roi/company/mayflower_thatre.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1134,"title":"KnowBe4 for Softcat","description":"<b>Challenge.</b> The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness programme was conducted on an ad hoc basis. Any training was typically implemented during the induction period, when new employees first joined the business. On top of being infrequent, training would often be missed due to a lack of time or getting lost in the long to-do lists that accompany starting a new job. Secondly, the field in which Softcat operates requires that employees work with a vast number of third parties. Indeed, at present, the company has upwards of 12,300 long-standing customers and at least a thousand partners. It also receives as many as 50,000 inbound emails a day. In other words, a quarter of a million inbound emails per working week! Solely considering the sheer number of clients and partners, as well as the immense influx of emails, the risks of a phishing attack are heightened multi-fold. One of the principal problems that Softcat has observed in the market is the compromise of business emails. On numerous occasions, a third-party suffers a phishing attack and the account becomes compromised. The account then sends out malicious emails to its contacts, including Softcat. At this stage, the risk is very high as the email appears to originate from a legitimate, known contact.\r\n<b>Implementation.</b> The implementation of KnowBe4’s training programme could easily be described as seamless as well. Under the sole supervision of an apprentice, Softcat was able to have the programme up and running in less than two months. Whenever a roadblock was hit, the customer relationship manager at KnowBe4 was quick to provide support. Indeed, Mark praised KnowBe4’s customer service as “second-to-none”, giving more time to the senior IT personnel to focus on other, more pressing jobs.\r\n<b>Results.</b> KnowBe4’s training content range as well as customisation options are among the most advantageous aspects of the service to Softcat. That, plus the frequent reminders and ease of use, allows Softcat’s employees to be efficiently made aware of the risks of operating online in the modern day. The fact that the programme runs without a huge administrative overhead is especially appreciated by Mark and his team of four, who have a heavy workload as it is. In the near future, Mark plans to build a phishing campaign that closely mimics the business email compromises that he sees occurring from within the supply chain. The great selection of email templates available through the KnowBe4 platform, as well as the option to customise templates will be beneficial in this process. The main goal for Mark going forward is to significantly reduce the baseline of 12%.\r\n<i>“The more that employees are able to identify a phishing email, the more effectively and swiftly the IT team can spin off a workflow to neutralise the threat and safeguard the company’s cybersecurity.”</i> – Mark Overton Head of IT Security, Softcat","alias":"knowbe4-dlja-softcat","roi":0,"seo":{"title":"KnowBe4 for Softcat","keywords":"","description":"<b>Challenge.</b> The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness programme was conducted on an ad hoc basis. Any training was typically implemented during the induct","og:title":"KnowBe4 for Softcat","og:description":"<b>Challenge.</b> The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness programme was conducted on an ad hoc basis. Any training was typically implemented during the induct"},"deal_info":"","user":{"id":8770,"title":"Softcat (user)","logoURL":"https://old.roi4cio.com/uploads/roi/company/softcat.png","alias":"softcat-polzovatel","address":"","roles":[],"description":" With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. Its team of over 1,300 employees in offices across Britain and Ireland, help clients find the right software for their needs, provide expert advice and support organisations through full infrastructure transformations. Formerly known as Software Catalogue, Softcat went public on the London Stock Exchange in 2015 and has since been promoted to the FTSE 250 Index.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.softcat.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Softcat (user)","keywords":"","description":" With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. It","og:title":"Softcat (user)","og:description":" With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. It","og:image":"https://old.roi4cio.com/uploads/roi/company/softcat.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1136,"title":"KnowBe4 for Telkom","description":"Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at risk of fraud, theft and infiltration, this level of training is critical to ensure corporate compliance to privacy/data protection laws and individual security.\r\n<b>Challenge.</b> For Telkom, it was critical that the training offering not only meet budget requirements, but that it be as extensive and engaging as possible. It had to change the culture of thinking within the company and provide employees with the tools they needed to remain aware outside of the organisation as well. Three key elements comprised the cybersecurity training process: the learning platform, the baseline phishing assessment (phishing simulator), and the Phish Alert Button (PAB). The learning content was developed for the South African audience and included focused and relevant information that didn’t bombard the users. The training had to be short, smart and targeted so that employees could take the training sessions in under 10 minutes.\r\n<b><i>“We wanted our employees to think twice with every click. The first test saw a number of people fail and we plan on running a second test later in the process.”</i></b>\r\n<b>Results.</b> The KnowBe4 engagement was a complete success for Telkom SA, introducing relevant and targeted training materials to a wide-ranging and diverse employee pool and achieving impressive engagement targets. KnowBe4 worked closely with Telkom to customise the offering and create a training platform that worked within their specific requirements and goals.","alias":"knowbe4-dlja-telkom","roi":0,"seo":{"title":"KnowBe4 for Telkom","keywords":"","description":"Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at r","og:title":"KnowBe4 for Telkom","og:description":"Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at r"},"deal_info":"","user":{"id":8771,"title":"Telkom","logoURL":"https://old.roi4cio.com/uploads/roi/company/telkom.png","alias":"telkom","address":"","roles":[],"description":" We serve a large range of business and residential customers, and have all the key components of true convergence, enabling us to offer integrated voice, data, fixed, mobile, IT and data centre solutions. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.telkom.co.za/today/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Telkom","keywords":"","description":" We serve a large range of business and residential customers, and have all the key components of true convergence, enabling us to offer integrated voice, data, fixed, mobile, IT and data centre solutions. ","og:title":"Telkom","og:description":" We serve a large range of business and residential customers, and have all the key components of true convergence, enabling us to offer integrated voice, data, fixed, mobile, IT and data centre solutions. ","og:image":"https://old.roi4cio.com/uploads/roi/company/telkom.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":235,"title":"South Africa","name":"ZAF"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1146,"title":"KnowBe4 for TXT e-solutions","description":"<b>Challenge.</b> Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is very well aware of the problems that organizations can face with social engineering attacks, which is why educating employees about the dangers is so important.\r\n<b>Implementation.</b> Having a security awareness training provider that delivers a wide variety of content is far less expensive than what they thought. Also, the efforts required to manage the platform are much less than what they expected. The value of having employees trained on security topics far exceeds the minimal cost of purchasing the KnowBe4 platform. TXT e-solutions even made KnowBe4’s security awareness training a requirement for all employees. And the IT has received feedback from a few of the employees within the company on the effectiveness of the simulated phishing campaigns. Now, employees come up to the IT Support Team to double check suspicious looking emails before clicking on them, which helps to more effectively block real spam sources.\r\n<b>Results.</b> TXT e-solutions saw a significant drop in their Phish-Prone Percentage from 17.4% to 0.7% over a period of five months. \r\n<b><i>“In order to fight an ongoing threat of phishing, we have adopted the KnowBe4 security awareness platform to educate our users about phishing and anti-phishing techniques, use security protection and report suspicious activities. By doing so, we have reduced exposure to fraud and identity theft. The most effective fix to phishing is training and KnowBe4 is the right tool for it. Phishing and training campaigns have proven to be effective; we have fewer users clicking on phishing emails since the beginning. You can easily change the difficulty levels of the email campaigns for your more experienced users. KnowBe4 helps us to raise awareness of social engineering attacks. Great company; good pricing; solid training. Highly recommended.”</i></b> – Azamat Uzhangaliyev\r\n<b>Successful Outcomes</b>\r\n<ul> <li>A drop in Phish-Prone Percentage from 17.4% to 0.7% in five months</li> <li>KnowBe4's offerings were far less expensive than what they thought</li> <li>Employees now come to the IT Support Team to double check suspicious looking emails before clicking on them</li> </ul>","alias":"knowbe4-dlja-txt-e-solutions","roi":0,"seo":{"title":"KnowBe4 for TXT e-solutions","keywords":"","description":"<b>Challenge.</b> Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is ver","og:title":"KnowBe4 for TXT e-solutions","og:description":"<b>Challenge.</b> Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is ver"},"deal_info":"","user":{"id":8775,"title":"TXT e-solutions","logoURL":"https://old.roi4cio.com/uploads/roi/company/txt.png","alias":"txt-e-solutions","address":"","roles":[],"description":"TXT e-solutions is a multi-national software provider specializing in advanced solutions for aerospace and aviation, automotive and transport and fintech industries. Its customers include market leaders such as Airbus, Boeing, Bombardier, Leonardo, Lufthansa, Pirelli, Safran and Vodafone Automotive. TXT e-solutions was founded in 1989 and has been listed in the STAR segment of the Italian Stock Exchange since July 2000. They employ more than 700 staff at their Milan headquarters and its subsidiaries in Italy, Germany, France, Switzerland, the UK and the US. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.txtgroup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TXT e-solutions","keywords":"","description":"TXT e-solutions is a multi-national software provider specializing in advanced solutions for aerospace and aviation, automotive and transport and fintech industries. Its customers include market leaders such as Airbus, Boeing, Bombardier, Leonardo, Lufthansa, ","og:title":"TXT e-solutions","og:description":"TXT e-solutions is a multi-national software provider specializing in advanced solutions for aerospace and aviation, automotive and transport and fintech industries. Its customers include market leaders such as Airbus, Boeing, Bombardier, Leonardo, Lufthansa, ","og:image":"https://old.roi4cio.com/uploads/roi/company/txt.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"vendorImplementations":[{"id":1142,"title":"KnowBe4 for Abax","description":"<b>Brief Summary.</b> European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement that can be easily relayed back to the company’s Board.\r\n<b>Business and Technical Challenges.</b> With ABAX swiftly growing from a start-up of five people to over 400 staff after just ten years, Espen Otterstad head of IT and acting CISO at ABAX realised that “people were probably one of the largest vulnerabilities” when it came to the security of the business. Furthermore, as the company was expanding with new owners taking over, ABAX was receiving a lot of media attention, appearing in a number of new articles. With the extra attention, Otterstad noticed that phishing attempts were on the rise and “employees were opening emails they perhaps shouldn’t be opening.” In addition, while information security was paramount, Otterstad also recognised that wading through long reports was not going to have the desired impact when it came to translating the security culture to the Board and management team. Therefore, he also needed clear and precise metrics to share with the Board and be able to demonstrate improvements or conversely, areas for improvements.\r\n<b>The Solution.</b> In order to fulfil the requirements of measuring the security culture baseline for ABAX—while being able to deliver a concise KPI measurement for the Board and management team—Otterstad initiated conversation with Kai Roer, CEO of CLTRe, now a KnowBe4 company. CLTRe helps companies manage and gauge security culture with a comprehensive toolkit and Security Culture Framework that uses a scientific approach to scope security across seven dimensions, resulting in a detailed insight into how different teams and business units compare.\r\n<b>Results and Benefits.</b> With many cybersecurity implementations, the theoretical cost savings were huge for ABAX, particularly before and after the advent of GDPR, Otterstad explained. “Using CLTRe was not only absolutely necessary, but also a good investment,” he said.","alias":"knowbe4-dlja-abax","roi":0,"seo":{"title":"KnowBe4 for Abax","keywords":"","description":"<b>Brief Summary.</b> European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement tha","og:title":"KnowBe4 for Abax","og:description":"<b>Brief Summary.</b> European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement tha"},"deal_info":"","user":{"id":8773,"title":"Abax","logoURL":"https://old.roi4cio.com/uploads/roi/company/abax.png","alias":"abax","address":"","roles":[],"description":" ABAX, a Norwegian company started in 2009, is currently the fastest growing telematics company in Europe with a presence in the Nordics, Netherlands and UK. ABAX manages 270,000 account subscriptions for 30,000 customers under its fleet management, driver behaviour monitoring and vehicle/container tracking services.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.abax.com/uk","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Abax","keywords":"","description":" ABAX, a Norwegian company started in 2009, is currently the fastest growing telematics company in Europe with a presence in the Nordics, Netherlands and UK. ABAX manages 270,000 account subscriptions for 30,000 customers under its fleet management, driver beh","og:title":"Abax","og:description":" ABAX, a Norwegian company started in 2009, is currently the fastest growing telematics company in Europe with a presence in the Nordics, Netherlands and UK. ABAX manages 270,000 account subscriptions for 30,000 customers under its fleet management, driver beh","og:image":"https://old.roi4cio.com/uploads/roi/company/abax.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":158,"title":"Norway","name":"NOR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1144,"title":"KnowBe4 for Alliance for Strong Families and Communities","description":"With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching their security posture with a highly-trained human firewall.\r\nNow that the Alliance has had its one-year anniversary with KnowBe4, the organization has increased the complexity of its simulated phishing tests and incorporated immediate trainings for users who mistakenly fall for a spoof. “KnowBe4 has allowed us to mature our program and build up that human firewall we wanted with security skills that really work. The Phish Alert Button tunes us in to actual threats in the wild and helps us create custom phishing templates that are very realistic. Our goal this year is to make our tests harder because we know that hackers don’t just send attachments or bad links. They start conversations and social engineer people; we are working with KnowBe4 to train our users to not respond to emails, to avoid smishing and vishing threats and more,” says Lukaszewski.\r\nIncreasing awareness about security practices and protocols were the main goals of the Alliances’ SAT program with KnowBe4. Lukaszewski and Mueller, however, had a broader vision that KnowBe4 has proven very helpful in achieving. “We understand that part of the role of our IT department is to help keep our organization secure. For us to really embrace a culture of security, we have to drive communication between our users and our IT department. KnowBe4 has proven to be very effective in helping us drive rapport and trust between these two groups and foster a stronger security culture internally,” said Mueller.\r\nTo achieve this goal, Mueller and Lukaszewski asked their users to phone IT directly if they failed a simulated phishing test. Mueller stated, “KnowBe4’s platform already alerts IT if a test is failed, but we want to promote good behaviors and get our users to understand that if something goes wrong in the real world, they must call IT right away. IT is not going to yell at them if they make a mistake; IT is going to help them solve the problem and protect the organization.” This approach also creates an environment that encourages users to not cover it up if they do mistakenly click a bad link or respond to a phishing email.\r\nWith their users regularly being sent phishing tests and receiving both automatic remedial and scheduled trainings, Mueller and Lukaszewski can appreciate the usability of the KnowBe4 platform. According to Mueller, “KnowBe4 makes it simple to do really important and complex trainings that build up an organization’s security posture. The usability of the platform is very strong; we are able to create custom templates very easily and challenge our users even more. And we love the fact that KnowBe4 consistently adds new content so we can keep our trainings and our simulated tests fresh. KnowBe4 has been a wonderful partner and one that we expect to continue working with for a long time.”","alias":"knowbe4-dlja-alliance-for-strong-families-and-communities","roi":0,"seo":{"title":"KnowBe4 for Alliance for Strong Families and Communities","keywords":"","description":"With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching ","og:title":"KnowBe4 for Alliance for Strong Families and Communities","og:description":"With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching "},"deal_info":"","user":{"id":8774,"title":"Alliance for Strong Families and Communities","logoURL":"https://old.roi4cio.com/uploads/roi/company/alliance.png","alias":"alliance-for-strong-families-and-communities","address":"","roles":[],"description":" The Alliance for Strong Families and Communities is a strategic action network that works with and through its network of social sector leaders to achieve a healthy and equitable society, ensuring policies and systems provide equal access and opportunity for health and well-being, economic opportunity, educational success, and safety and security. The organization serves as an incubator for learning and innovation to generate new solutions to society’s toughest problems and aggregates the very best sector knowledge. It also accelerates change through dynamic leadership development and collective action.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://alliance1.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Alliance for Strong Families and Communities","keywords":"","description":" The Alliance for Strong Families and Communities is a strategic action network that works with and through its network of social sector leaders to achieve a healthy and equitable society, ensuring policies and systems provide equal access and opportunity for ","og:title":"Alliance for Strong Families and Communities","og:description":" The Alliance for Strong Families and Communities is a strategic action network that works with and through its network of social sector leaders to achieve a healthy and equitable society, ensuring policies and systems provide equal access and opportunity for ","og:image":"https://old.roi4cio.com/uploads/roi/company/alliance.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":3,"title":"Afghanistan","name":"AFG"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1140,"title":"KnowBe4 for education institution","description":"<b>The Challenge.</b> In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve as compared to the public sector. While there are professional consortiums raising awareness of technology and security, unfortunately educational tech departments are often not aggressively staffed nor have the appropriate budget and resources.\r\nDon Ringelestein, CETL, Director of Technology at District 129, knew he needed to put more emphasis on security and phishing. This became even more of a priority in 2016 when District 129 fell victim to a DDoS attack that included weekly attacks and lasted nearly two months. With so much of the District relying on the internet, this was highly problematic for them to operate efficiently and showcased the dire need for improving its cybersecurity hygiene. At the same time, phishing attacks were increasingly plastered all over the news—including a nearby school district that fell victim to a phishing attack and divulged all social security numbers of its staff.\r\nRingelestein recognized that he needed to ramp up security and phishing, particularly in terms of end-user training. However, like many IT pros, he didn’t know exactly where to start in terms of creating a customized security awareness program that would be effective for District 129.\r\n<b>The Results.</b> As a result of working with KnowBe4, District 129 saw very dramatic and favorable results in only a short time. In a five-month period, monthly phishing rates dropped from 27% to .03 percent. “These results are stunning—we were thrilled to see how quickly the training yielded results,” said Ringelestein. Not only is the staff far more cautious, but teachers have responded very favorably and are open to the opportunity to educate themselves on phishing—tools that they can use even beyond the workplace.\r\n<b>Successful Outcomes</b>\r\n<ul> <li>Phish-prone percentage dropped from 27% to .03% in 5 months</li> <li>More security-aware culture among staff</li> <li>Positive teacher engagement with training content</li> <li>Phishing and training campaigns reinforced cautious vetting of emails</li> </ul>","alias":"knowbe4-dlja-uchebnogo-zavedenija","roi":0,"seo":{"title":"KnowBe4 for education institution","keywords":"","description":"<b>The Challenge.</b> In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve as compared to the public sector. While there are professional consortiums raising awareness","og:title":"KnowBe4 for education institution","og:description":"<b>The Challenge.</b> In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve as compared to the public sector. While there are professional consortiums raising awareness"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1138,"title":"KnowBe4 for financial institution","description":"<b>The Problem.</b> We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had been localized to the IT Dept and our Risk Management team. On a management level we knew what could go wrong, but we did not have a company wide awareness and we were not sure what we needed. We had basic security training in place as part of new employee onboarding and a yearly mandatory test. Employees could do a refresher course if needed, but we were limited to that.\r\nSome of our clients are now starting to require Security Awareness Training for their vendors as part of their audit process. These requirements do not specify the granularity needed, so we were still faced with a lack of clarity on what we needed and which method would be most effective and fulfill audit requirements.\r\nWhen we found KnowBe4, it was a perfect fit. We knew we had to have something that allowed us to do phishing tests on the staff, record training and results and be able to report on the results. KnowBe4 was able to do all this in an easy to use fashion, saving IT from having to do a lot of extra work. Our prior efforts would take a couple of weeks to do as a project and were nowhere near as fine tuned as KnowBe4 allowed us to get.\r\n<b>Getting Started.</b> Getting started was an easy process. We did a couple of calls and were walked through the process of importing addresses and setting up the way we wanted it, learning the reporting features and so forth. Once we were set up, we decided to do a baseline Phishing Security Test to see how many of our staff were phish-prone. Our results showed phishing was a far bigger situation than I had envisioned. We ran the test and got a staggering 39% phish-prone percent.\r\n<b>Training.</b> Due to the high percentage of clicks off our initial testing, we made Kevin Mitnick Security Awareness Training mandatory for staff and included it as part of any new employee training. The managers are required to do the 40 minute version and staff are given the option of doing the 15 minute version or the 40 minute version. We also have a group we put through the training in a classroom setting with the documentation as some computers do not have sound options. We are able to easily track who does the training and who completes it for compliance reporting.\r\n<b>Ongoing Phishing Tests.</b> Once we did the training, subsequent phishing tests dropped to zero as staff were darn sure they were not going to fall for a phishing test. We then started to explore some of the templates and customizable options and decided to use these to be a bit more “crafty” in our attempts. We got a few to respond and click but the general trend of clicks is continuing down with staff much more focused and able to avoid phishing attacks.","alias":"knowbe4-dlja-finansovogo-uchrezhdenija","roi":0,"seo":{"title":"KnowBe4 for financial institution","keywords":"","description":"<b>The Problem.</b> We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had been localized to the IT Dept and our Risk Management team. On a management level we knew what could go","og:title":"KnowBe4 for financial institution","og:description":"<b>The Problem.</b> We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had been localized to the IT Dept and our Risk Management team. On a management level we knew what could go"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1130,"title":"KnowBe4 for Irish Cattle Breeding Federation","description":"<b>Business and Technical Challenges.</b> With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed that the culture of security awareness at ICBF and Sheep Ireland was not progressing as it should. On the contrary, it was almost non-existent. “There was no security awareness within the company when I started,” Jonathan said. Passwords weren’t being changed regularly, and “everybody knew everybody else’s password.” He also noticed the click-through rate on phishing links was particularly high, as people would frequently log into their colleagues’ email and open a phishing link out of curiosity. However, despite their best efforts, they never won that free iPad that was promised.\r\n<b>The Resolution.</b> At the beginning of 2018, frustrated by employee apathy and limited by the constraints of a tedious training package, Jonathan was determined to find a training option that fit ICBF and Sheep Ireland’s needs without exceeding the current budget laid out by the organisation. Resolute to reduce the time spent chasing up workers across ten different departments, Jonathan aimed to provide security awareness to the entire organisation without the added hassle.\r\nFor Jonathan, research for a new security training service began with the Gartner Magic Quadrant and KnowBe4 immediately stood out at the forefront of security awareness providers in both leadership and vision. There were several other contenders, but he recalled that it was “a hassle” trying to get into contact with a local reseller, as most of them had offices overseas, making it difficult to conduct business across different time zones. He found that being able to do business with a company on the same schedule was a luxury often taken for granted, particularly in the realm of IT security.\r\n<b>Result and Benefits.</b> The results for ICBF and Sheep Ireland were simple, while it can be difficult to provide concrete metrics of success, the organisation noticed a “reduction of overall IT security threats”. The KnowBe4 training at ICBF and Sheep Ireland “has equipped staff with the tools needed to acknowledge IT security threats inside and outside the organisation.” While it can be difficult to provide a definitive metric for successful security awareness, one simple way of proving success is by measuring staff engagement with the training. Since implementing KnowBe4, Jonathan noticed that IT security had become a topic amongst colleagues as their attitude towards cybersecurity evolved.\r\n<i>“Staff were having light-bulb moments when they see or hear of security threats. They feel enabled to analyse threats and empowered to make informed decisions when faced with a threat.”</i>","alias":"knowbe4-dlja-irlandskoi-federacii-razvedenija-krupnogo-rogatogo-skota","roi":0,"seo":{"title":"KnowBe4 for Irish Cattle Breeding Federation","keywords":"","description":"<b>Business and Technical Challenges.</b> With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed th","og:title":"KnowBe4 for Irish Cattle Breeding Federation","og:description":"<b>Business and Technical Challenges.</b> With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed th"},"deal_info":"","user":{"id":8768,"title":"Irish Cattle Breeding Federation (ICBF)","logoURL":"https://old.roi4cio.com/uploads/roi/company/icbf.png","alias":"irlandskaja-federacija-razvedenija-krupnogo-rogatogo-skota-icbf","address":"","roles":[],"description":" The Irish Cattle Breeding Federation (ICBF) is a non-profit organisation charged with providing cattle breeding information services to the Irish dairy and beef industries. The organisation was set up in 1998 to benefit the agri-food industry, farmers, and wider Irish communities through genetic gain, ensuring sustainable breeding. ICBF is a world leader in cattle genomics and has about 90 employees across two physical sites.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.icbf.com/wp/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Irish Cattle Breeding Federation (ICBF)","keywords":"","description":" The Irish Cattle Breeding Federation (ICBF) is a non-profit organisation charged with providing cattle breeding information services to the Irish dairy and beef industries. The organisation was set up in 1998 to benefit the agri-food industry, farmers, and wi","og:title":"Irish Cattle Breeding Federation (ICBF)","og:description":" The Irish Cattle Breeding Federation (ICBF) is a non-profit organisation charged with providing cattle breeding information services to the Irish dairy and beef industries. The organisation was set up in 1998 to benefit the agri-food industry, farmers, and wi","og:image":"https://old.roi4cio.com/uploads/roi/company/icbf.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1132,"title":"KnowBe4 for Mayflower Theatre","description":"<b>Business and Technical Challenges.</b> With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top priority for all; and despite having a robust and resilient infrastructure in place, Paul Thompson, IT Manager at Mayflower Theatre, knew that more needed to be done. He said, <i>“we wanted to train and educate users about the various aspects of cybersecurity, from how to structure passwords, to spotting phishing emails.”</i> Many are still unaware of the different cyberattacks that are currently out in the world, so Paul and his team wanted to take a proactive approach to mitigating these threats by raising awareness about common risks like phishing emails and scams involving fraudulent websites.\r\n<b>The Resolution.</b> The prime objective for Paul was to build the general cybersecurity awareness of the employees at Mayflower Theatre. While some IT managers may want to review and test various security platforms before deciding on the right fit, Paul took a more direct approach when he came across the KnowBe4 platform, saying, “for the offering and the price, it was sufficiently unique to anything else I had seen in the market.”\r\n<b>Results and Benefits.</b> It’s a matter of when, not if, when an organisation will suffer a cyberattack and Paul is more than aware of this fact. However, it’s more about the reduction of risk for him. Whether employees come across real phishing emails or ones manufactured to test their skills, Paul explained how the staff were excited when they did come across one before flagging to the IT department. It’s this sort of reaction KnowBe4 was designed for, to get users motivated about security and for Paul, this is where the ROI has been most evident. Having KnowBe4 is an insurance policy in his eyes, saying, “I can absolutely say that we have received generic as well as targeted phishing emails aimed at people in the organisation and, because of the training, we have avoided an incident to date. Having a wide range of cybersecurity training deployed to the number of users that we have to cover a number of issues has been largely beneficial and very cost efficient.”\r\n<b>Future Plans.</b> Currently, Mayflower Theatre has 110 members using the KnowBe4 platform, but the expectation for Paul is to upgrade to the platinum subscription to give all staff members access due to the positive results he’s seen since 2017.","alias":"knowbe4-dlja-teatra-mehiflauehr","roi":0,"seo":{"title":"KnowBe4 for Mayflower Theatre","keywords":"","description":"<b>Business and Technical Challenges.</b> With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top priority for all; and despite having a robust and resilient infrastructure in place, Paul Thomp","og:title":"KnowBe4 for Mayflower Theatre","og:description":"<b>Business and Technical Challenges.</b> With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top priority for all; and despite having a robust and resilient infrastructure in place, Paul Thomp"},"deal_info":"","user":{"id":8769,"title":"Mayflower Theatre","logoURL":"https://old.roi4cio.com/uploads/roi/company/mayflower_thatre.png","alias":"teatr-mehiflauehr","address":"","roles":[],"description":" Mayflower Theatre is a 2,300 seated theatre based in Southampton, UK, making it the third largest by seating capacity outside of London and the largest in the South of England. Having first opened in 1928, it was originally called the Empire Theatre and recently celebrated its 90th birthday. The Theatre has consistently entertained an audience of half a million every year. The theatre estimates to have 80 full-time staff as well as an additional 240 employees who are hired on a voluntary, annualised and contracted basis.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.mayflower.org.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Mayflower Theatre","keywords":"","description":" Mayflower Theatre is a 2,300 seated theatre based in Southampton, UK, making it the third largest by seating capacity outside of London and the largest in the South of England. Having first opened in 1928, it was originally called the Empire Theatre and recen","og:title":"Mayflower Theatre","og:description":" Mayflower Theatre is a 2,300 seated theatre based in Southampton, UK, making it the third largest by seating capacity outside of London and the largest in the South of England. Having first opened in 1928, it was originally called the Empire Theatre and recen","og:image":"https://old.roi4cio.com/uploads/roi/company/mayflower_thatre.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1134,"title":"KnowBe4 for Softcat","description":"<b>Challenge.</b> The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness programme was conducted on an ad hoc basis. Any training was typically implemented during the induction period, when new employees first joined the business. On top of being infrequent, training would often be missed due to a lack of time or getting lost in the long to-do lists that accompany starting a new job. Secondly, the field in which Softcat operates requires that employees work with a vast number of third parties. Indeed, at present, the company has upwards of 12,300 long-standing customers and at least a thousand partners. It also receives as many as 50,000 inbound emails a day. In other words, a quarter of a million inbound emails per working week! Solely considering the sheer number of clients and partners, as well as the immense influx of emails, the risks of a phishing attack are heightened multi-fold. One of the principal problems that Softcat has observed in the market is the compromise of business emails. On numerous occasions, a third-party suffers a phishing attack and the account becomes compromised. The account then sends out malicious emails to its contacts, including Softcat. At this stage, the risk is very high as the email appears to originate from a legitimate, known contact.\r\n<b>Implementation.</b> The implementation of KnowBe4’s training programme could easily be described as seamless as well. Under the sole supervision of an apprentice, Softcat was able to have the programme up and running in less than two months. Whenever a roadblock was hit, the customer relationship manager at KnowBe4 was quick to provide support. Indeed, Mark praised KnowBe4’s customer service as “second-to-none”, giving more time to the senior IT personnel to focus on other, more pressing jobs.\r\n<b>Results.</b> KnowBe4’s training content range as well as customisation options are among the most advantageous aspects of the service to Softcat. That, plus the frequent reminders and ease of use, allows Softcat’s employees to be efficiently made aware of the risks of operating online in the modern day. The fact that the programme runs without a huge administrative overhead is especially appreciated by Mark and his team of four, who have a heavy workload as it is. In the near future, Mark plans to build a phishing campaign that closely mimics the business email compromises that he sees occurring from within the supply chain. The great selection of email templates available through the KnowBe4 platform, as well as the option to customise templates will be beneficial in this process. The main goal for Mark going forward is to significantly reduce the baseline of 12%.\r\n<i>“The more that employees are able to identify a phishing email, the more effectively and swiftly the IT team can spin off a workflow to neutralise the threat and safeguard the company’s cybersecurity.”</i> – Mark Overton Head of IT Security, Softcat","alias":"knowbe4-dlja-softcat","roi":0,"seo":{"title":"KnowBe4 for Softcat","keywords":"","description":"<b>Challenge.</b> The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness programme was conducted on an ad hoc basis. Any training was typically implemented during the induct","og:title":"KnowBe4 for Softcat","og:description":"<b>Challenge.</b> The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness programme was conducted on an ad hoc basis. Any training was typically implemented during the induct"},"deal_info":"","user":{"id":8770,"title":"Softcat (user)","logoURL":"https://old.roi4cio.com/uploads/roi/company/softcat.png","alias":"softcat-polzovatel","address":"","roles":[],"description":" With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. Its team of over 1,300 employees in offices across Britain and Ireland, help clients find the right software for their needs, provide expert advice and support organisations through full infrastructure transformations. Formerly known as Software Catalogue, Softcat went public on the London Stock Exchange in 2015 and has since been promoted to the FTSE 250 Index.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.softcat.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Softcat (user)","keywords":"","description":" With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. It","og:title":"Softcat (user)","og:description":" With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. It","og:image":"https://old.roi4cio.com/uploads/roi/company/softcat.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":74,"title":"United Kingdom","name":"GBR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1136,"title":"KnowBe4 for Telkom","description":"Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at risk of fraud, theft and infiltration, this level of training is critical to ensure corporate compliance to privacy/data protection laws and individual security.\r\n<b>Challenge.</b> For Telkom, it was critical that the training offering not only meet budget requirements, but that it be as extensive and engaging as possible. It had to change the culture of thinking within the company and provide employees with the tools they needed to remain aware outside of the organisation as well. Three key elements comprised the cybersecurity training process: the learning platform, the baseline phishing assessment (phishing simulator), and the Phish Alert Button (PAB). The learning content was developed for the South African audience and included focused and relevant information that didn’t bombard the users. The training had to be short, smart and targeted so that employees could take the training sessions in under 10 minutes.\r\n<b><i>“We wanted our employees to think twice with every click. The first test saw a number of people fail and we plan on running a second test later in the process.”</i></b>\r\n<b>Results.</b> The KnowBe4 engagement was a complete success for Telkom SA, introducing relevant and targeted training materials to a wide-ranging and diverse employee pool and achieving impressive engagement targets. KnowBe4 worked closely with Telkom to customise the offering and create a training platform that worked within their specific requirements and goals.","alias":"knowbe4-dlja-telkom","roi":0,"seo":{"title":"KnowBe4 for Telkom","keywords":"","description":"Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at r","og:title":"KnowBe4 for Telkom","og:description":"Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at r"},"deal_info":"","user":{"id":8771,"title":"Telkom","logoURL":"https://old.roi4cio.com/uploads/roi/company/telkom.png","alias":"telkom","address":"","roles":[],"description":" We serve a large range of business and residential customers, and have all the key components of true convergence, enabling us to offer integrated voice, data, fixed, mobile, IT and data centre solutions. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.telkom.co.za/today/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Telkom","keywords":"","description":" We serve a large range of business and residential customers, and have all the key components of true convergence, enabling us to offer integrated voice, data, fixed, mobile, IT and data centre solutions. ","og:title":"Telkom","og:description":" We serve a large range of business and residential customers, and have all the key components of true convergence, enabling us to offer integrated voice, data, fixed, mobile, IT and data centre solutions. ","og:image":"https://old.roi4cio.com/uploads/roi/company/telkom.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":235,"title":"South Africa","name":"ZAF"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1146,"title":"KnowBe4 for TXT e-solutions","description":"<b>Challenge.</b> Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is very well aware of the problems that organizations can face with social engineering attacks, which is why educating employees about the dangers is so important.\r\n<b>Implementation.</b> Having a security awareness training provider that delivers a wide variety of content is far less expensive than what they thought. Also, the efforts required to manage the platform are much less than what they expected. The value of having employees trained on security topics far exceeds the minimal cost of purchasing the KnowBe4 platform. TXT e-solutions even made KnowBe4’s security awareness training a requirement for all employees. And the IT has received feedback from a few of the employees within the company on the effectiveness of the simulated phishing campaigns. Now, employees come up to the IT Support Team to double check suspicious looking emails before clicking on them, which helps to more effectively block real spam sources.\r\n<b>Results.</b> TXT e-solutions saw a significant drop in their Phish-Prone Percentage from 17.4% to 0.7% over a period of five months. \r\n<b><i>“In order to fight an ongoing threat of phishing, we have adopted the KnowBe4 security awareness platform to educate our users about phishing and anti-phishing techniques, use security protection and report suspicious activities. By doing so, we have reduced exposure to fraud and identity theft. The most effective fix to phishing is training and KnowBe4 is the right tool for it. Phishing and training campaigns have proven to be effective; we have fewer users clicking on phishing emails since the beginning. You can easily change the difficulty levels of the email campaigns for your more experienced users. KnowBe4 helps us to raise awareness of social engineering attacks. Great company; good pricing; solid training. Highly recommended.”</i></b> – Azamat Uzhangaliyev\r\n<b>Successful Outcomes</b>\r\n<ul> <li>A drop in Phish-Prone Percentage from 17.4% to 0.7% in five months</li> <li>KnowBe4's offerings were far less expensive than what they thought</li> <li>Employees now come to the IT Support Team to double check suspicious looking emails before clicking on them</li> </ul>","alias":"knowbe4-dlja-txt-e-solutions","roi":0,"seo":{"title":"KnowBe4 for TXT e-solutions","keywords":"","description":"<b>Challenge.</b> Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is ver","og:title":"KnowBe4 for TXT e-solutions","og:description":"<b>Challenge.</b> Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is ver"},"deal_info":"","user":{"id":8775,"title":"TXT e-solutions","logoURL":"https://old.roi4cio.com/uploads/roi/company/txt.png","alias":"txt-e-solutions","address":"","roles":[],"description":"TXT e-solutions is a multi-national software provider specializing in advanced solutions for aerospace and aviation, automotive and transport and fintech industries. Its customers include market leaders such as Airbus, Boeing, Bombardier, Leonardo, Lufthansa, Pirelli, Safran and Vodafone Automotive. TXT e-solutions was founded in 1989 and has been listed in the STAR segment of the Italian Stock Exchange since July 2000. They employ more than 700 staff at their Milan headquarters and its subsidiaries in Italy, Germany, France, Switzerland, the UK and the US. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.txtgroup.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TXT e-solutions","keywords":"","description":"TXT e-solutions is a multi-national software provider specializing in advanced solutions for aerospace and aviation, automotive and transport and fintech industries. Its customers include market leaders such as Airbus, Boeing, Bombardier, Leonardo, Lufthansa, ","og:title":"TXT e-solutions","og:description":"TXT e-solutions is a multi-national software provider specializing in advanced solutions for aerospace and aviation, automotive and transport and fintech industries. Its customers include market leaders such as Airbus, Boeing, Bombardier, Leonardo, Lufthansa, ","og:image":"https://old.roi4cio.com/uploads/roi/company/txt.png"},"eventUrl":""},"supplier":{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""},"vendors":[{"id":5482,"title":"KnowBe4","logoURL":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png","alias":"knowbe4","address":"","roles":[],"description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Companys goal was to design the most powerful, yet easy-to-use platform available. Customers with businesses of all sizes can get the <span style=\"font-weight: bold; \">KnowBe4</span> platform deployed into production at least twice as fast as our competitors. \r\n<span style=\"font-weight: bold;\">KnowBe4</span> Customer Success team gets you going in no time, without the need for consulting hours.<br />Source: https://www.linkedin.com/company/knowbe4/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":""}],"products":[{"id":5896,"logo":false,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"alias":"knowbe4-enterprise-security-awareness-training","companyTypes":[],"description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":9,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{"5":{"id":5,"title":"Security Software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png","alias":"security-software"},"52":{"id":52,"title":"SaaS - software as a service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png","alias":"saas-software-as-a-service"},"718":{"id":718,"title":"IT Consulting","description":" In management, information technology consulting (also called IT consulting, computer consultancy, business and technology services, computing consultancy, technology consulting, and IT advisory) as a field of activity focuses on advising organizations on how best to use information technology (IT) in achieving their business objectives.\r\nThe IT consulting industry can be viewed as a Four-tier system:\r\n<ul><li>Professional services firms which maintain large professional workforces and command high bill rates.</li><li>Staffing firms, which place technologists with businesses on a temporary basis, typically in response to employee absences, temporary skill shortages and technical projects.</li><li>Independent consultants, who are self-employed or who function as employees of staffing firms (for US tax purposes, employed on Form W-2), or as independent contractors in their own right (for US tax purposes, on "1099").</li><li>Information Technology security consultants</li></ul>\r\nThere are different reasons why consultants are called in:\r\n<ul><li>To gain external, objective advice and recommendations</li><li>To gain access to the consultants' specialized expertise</li><li>Temporary help during a one-time project where the hiring of a permanent employee(s) is not required or necessary</li><li>To outsource all or part of the IT services from a specific company.</li></ul>\r\nThere is a relatively unclear line between management consulting and IT consulting. There are sometimes overlaps between the two fields, but IT consultants often have degrees in computer science, electronics, technology, or management information systems while management consultants often have degrees in accounting, economics, Industrial Engineering, finance, or a generalized MBA (Masters in Business Administration).\r\nAccording to the Institute for Partner Education & Development, IT consultants' revenues come predominantly from design and planning based consulting with a mixture of IT and business consulting. This is different from a systems integrator in that you do not normally take title to product. Their value comes from their ability to integrate and support technologies as well as determining product and brands. ","materialsDescription":"<span style=\"font-weight: bold; \">Who is an information technology (IT) consultant?</span>\r\nAn information technology consultant is a third-party service provider who is qualified to advise clients on the best use of IT to meet specific business requirements. IT consultants may work with a professional IT consultancy firm or as independent contractors. They may conduct a business needs assessment and develop an information systems solution that meets the organization's objectives.\r\nSome information technology consultants emphasize technical issues while others help organizations use IT to manage business processes. Still others specialize in a specific IT area such as information security.\r\nIT consultants need a deep knowledge of both business and information technology. A bachelor's degree in management information systems, computer science, or information science is the typical path into a technical consultancy career. IT certifications supplement this foundation with specialized technical training. Information technology degree and certification programs are available online to accommodate working IT professionals.\r\n<span style=\"font-weight: bold; \">What are the prerequisites and major obstacles?</span>\r\nOnce a business owner defined the needs to take a business to the next level, a decision maker will define a scope, cost and a time-frame of the project. The role of the IT consultancy company is to support and nurture the company from the very beginning of the project until the end, and deliver the project not only in the scope, time and cost but also with complete customer satisfaction.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Project scoping and planning</span></span>\r\nThe usual problem is that a business owner doesn't know the detail of what the project is going to deliver until it starts the process. In many cases, the incremental effort in some projects can lead to significant financial loss.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Business process and system design</span></span>\r\nThe scope of a project is linked intimately to the proposed business processes and systems that the project is going to deliver. Regardless of whether the project is to launch a new product range or discontinue unprofitable parts of the business, the change will have some impact on business processes and systems. The documentation of your business processes and system requirements are as fundamental to project scoping as an architects plans would be to the costing and scoping of the construction of a building.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Project management support</span></span>\r\nThe most successful business projects are always those that are driven by an employee who has the authority, vision and influence to drive the required changes in a business. It is highly unlikely that a business owner (decision maker or similar) will realize the changes unless one has one of these people in the employment. However, the project leadership role typically requires significant experience and skills which are not usually found within a company focused on day-to-day operations. Due to this requirement within more significant business change projects/programs, outside expertise is often sought from firms which can bring this specific skill set to the company.\r\n<span style=\"font-weight: bold;\">What are the skills of IT-consulting?</span>\r\nAn IT consultant needs to possess the following skills:\r\n<ul><li>Advisory skills</li><li>Technical skills</li><li>Business skills</li><li>Communication skills</li><li>Management skills</li><li>Advisory language skills</li><li>Business and management language skills</li><li>Technical language skills</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_Consulting.png","alias":"it-consulting"},"852":{"id":852,"title":"Network security","description":" Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.\r\nNetwork security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name — i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).\r\nOnce authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis. Newer systems combining unsupervised machine learning with full network traffic analysis can detect active network attackers from malicious insiders or targeted external attackers that have compromised a user machine or account.\r\nCommunication between two hosts using a network may be encrypted to maintain privacy.\r\nHoneypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker's methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots.","materialsDescription":" <span style=\"font-weight: bold;\">What is Network Security?</span>\r\nNetwork security is any action an organization takes to prevent malicious use or accidental damage to the network’s private data, its users, or their devices. The goal of network security is to keep the network running and safe for all legitimate users.\r\nBecause there are so many ways that a network can be vulnerable, network security involves a broad range of practices. These include:\r\n<ul><li><span style=\"font-weight: bold;\">Deploying active devices:</span> Using software to block malicious programs from entering, or running within, the network. Blocking users from sending or receiving suspicious-looking emails. Blocking unauthorized use of the network. Also, stopping the network's users accessing websites that are known to be dangerous.</li><li><span style=\"font-weight: bold;\">Deploying passive devices:</span> For instance, using devices and software that report unauthorized intrusions into the network, or suspicious activity by authorized users.</li><li><span style=\"font-weight: bold;\">Using preventative devices:</span> Devices that help identify potential security holes, so that network staff can fix them.</li><li><span style=\"font-weight: bold;\">Ensuring users follow safe practices:</span> Even if the software and hardware are set up to be secure, the actions of users can create security holes. Network security staff is responsible for educating members of the organization about how they can stay safe from potential threats.</li></ul>\r\n<span style=\"font-weight: bold;\">Why is Network Security Important?</span>\r\nUnless it’s properly secured, any network is vulnerable to malicious use and accidental damage. Hackers, disgruntled employees, or poor security practices within the organization can leave private data exposed, including trade secrets and customers’ private details.\r\nLosing confidential research, for example, can potentially cost an organization millions of dollars by taking away competitive advantages it paid to gain. While hackers stealing customers’ details and selling them to be used in fraud, it creates negative publicity and public mistrust of the organization.\r\nThe majority of common attacks against networks are designed to gain access to information, by spying on the communications and data of users, rather than to damage the network itself.\r\nBut attackers can do more than steal data. They may be able to damage users’ devices or manipulate systems to gain physical access to facilities. This leaves the organization’s property and members at risk of harm.\r\nCompetent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals.\r\n<span style=\"font-weight: bold;\">Why Do I Need Formal Education to Run a Computer Network?</span>\r\nEven the initial setup of security systems can be difficult for those unfamiliar with the field. A comprehensive security system is made of many pieces, each of which needs specialized knowledge.\r\nBeyond setup, each aspect of security is constantly evolving. New technology creates new opportunities for accidental security leaks, while hackers take advantage of holes in security to do damage as soon as they find them. Whoever is in charge of the network’s security needs to be able to understand the technical news and changes as they happen, so they can implement safety strategies right away.\r\nProperly securing your network using the latest information on vulnerabilities helps minimize the risk that attacks will succeed. Security Week reported that 44% of breaches in 2014 came from exploits that were 2-4 years old.\r\nUnfortunately, many of the technical aspects of network security are beyond those who make hiring decisions. So, the best way an organization can be sure that their network security personnel are able to properly manage the threats is to hire staff with the appropriate qualifications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_security.png","alias":"network-security"}},"branches":"Information Technology","companySizes":"501 to 1000 Employees","companyUrl":"https://www.knowbe4.com/","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"KnowBe4","keywords":"","description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:title":"KnowBe4","og:description":" <span style=\"font-weight: bold; \">KnowBe4</span> is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. \r\nPlatform is user-friendly and intuitive. It was built to sca","og:image":"https://old.roi4cio.com/uploads/roi/company/knowbe4.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"The VP Techno Labs International","partnershipLevel":"","countries":"","partnersType":""}],"vendoredProducts":[{"id":5896,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png","logo":true,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"supplierPartnersCount":1,"alias":"knowbe4-enterprise-security-awareness-training","companyTitle":"KnowBe4","companyTypes":["supplier","vendor"],"companyId":5482,"companyAlias":"knowbe4","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[{"id":5896,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png","logo":true,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"supplierPartnersCount":1,"alias":"knowbe4-enterprise-security-awareness-training","companyTitle":"KnowBe4","companyTypes":["supplier","vendor"],"companyId":5482,"companyAlias":"knowbe4","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}