{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"show-more-button":{"_type":"localeString","en":"Show more","ru":"Показать еще"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"en":"manufacturer","ru":"производитель","_type":"localeString"},"short-description":{"en":"Pitch","ru":"Краткое описание","_type":"localeString"},"i-use-it-popover":{"ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"_type":"localeString","en":"Product features","ru":"Особенности продукта"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"_type":"localeString","en":" Problems that solves","ru":"Проблемы которые решает"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнения","_type":"localeString"},"testing":{"en":"Testing","ru":"Тестирование","_type":"localeString"},"compare":{"en":"Compare with competitors","ru":"Сравнить с конкурентами","_type":"localeString"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"en":"Average deal size","ru":"Средний размер сделки","_type":"localeString"},"average-time":{"_type":"localeString","en":"Average deal closing time","ru":"Средний срок закрытия сделки"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"_type":"localeString","en":" Scheme of work","ru":"Схема работы"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"en":"Deployments with this product","ru":"Внедрения с этим продуктом","_type":"localeString"},"user-features":{"en":"User features","ru":"Особенности пользователей","_type":"localeString"},"job-roles":{"en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников","_type":"localeString"},"organizational-features":{"en":"Organizational Features","ru":"Организационные особенности","_type":"localeString"},"calculate-price":{"_type":"localeString","en":" Calculate product price","ru":"Рассчитать цену продукта"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"_type":"localeString","en":"Materials","ru":"Материалы"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"en":"or","ru":"или","_type":"localeString"},"program-sends-data":{"en":"Program Sends Data","_type":"localeString"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"configurator-content":{"_type":"localeString","en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"roi-calculator-content":{"_type":"localeString","en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString"},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнений","_type":"localeString"},"compare-with-competitive":{"_type":"localeString","en":" Compare with competitive","ru":"Сравнить с конкурентными"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"_type":"localeString","en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке."},"product-presentation":{"_type":"localeString","en":"Product presentation","ru":"Презентация продукта"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт","_type":"localeString"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"en":"Example product","ru":"Конкретный продукт","_type":"localeString"}},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"name":"title","translations":{"en":"Product","ru":"Продукт","_type":"localeString"}},{"name":"description","translations":{"_type":"localeString","en":"Product description","ru":"Описание продукта"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"cybeready-blast":{"id":5894,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg","logo":true,"schemeURL":"https://old.roi4cio.com/fileadmin/user_upload/img-22.jpg","scheme":true,"title":"CybeReady Blast","vendorVerified":0,"rating":"1.00","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybeready-blast","companyTitle":"CybeReady","companyTypes":["supplier","vendor"],"companyId":4066,"companyAlias":"cybeready","description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in many subsequent ones. The number of attacks that were launched or implemented using phishing is nothing to call, big names and grandiose amounts of losses. If you add fines for this to the loss of user data, these amounts often grow at times.</p>\r\n<p><span style=\"font-weight: bold;\">5 Reasons Your Security Awareness Program Needs Continuous Learning</span></p>\r\n<ul>\r\n<li>Because security awareness education is not a fire drill.</li>\r\n<li>Because the threat landscape is always changing.</li>\r\n<li>Because it’s the only way to truly assess how much your end-users are learning.</li>\r\n<li>Because people learn at different rates.</li>\r\n<li>Because you will learn what works and what doesn’t.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Complete Workforce Training</span></p>\r\n<p>Autonomus training platform continuously trains 100% of employees every month, year-round, using proven methodology and localized, customized content.</p>\r\n<p><span style=\"font-weight: bold;\">Advanced Automation</span></p>\r\n<p>Machine Learning-powered training selects and adjusts training to each employee, including adaptive difficulty level and frequency of training.</p>\r\n<p><span style=\"font-weight: bold;\">Just in Time (JIT) Learning</span></p>\r\n<p>Phishing simulations and short learning sessions in one integrative experience ensure learning ‘in the golden moment’ and eliminate friction with employees.</p>\r\n<p><span style=\"font-weight: bold;\">Guarantees Results</span></p>\r\n<p>Significant change in employee behavior towards cyber attacks: 83% reduction in Serial Clickers, 403% increase in employee resilience score.</p>\r\n<p><span style=\"font-weight: bold;\">Effortless</span></p>\r\n<p>Cybeready’s fully managed solution ensures results yet eliminates IT effort, so you can dedicate valuable resources to other, more challenging tasks.</p>","shortDescription":"The CybeReady’s award-winning solution guarantees to change employee behavior towards phishing attacks while eliminating IT overhead and reducing the total cost of ownership (TCO).","type":"Service","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CybeReady Blast","keywords":"","description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in ","og:title":"CybeReady Blast","og:description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},"eventUrl":"","translationId":5895,"dealDetails":{"avgPartnerDiscount":15,"dealProtection":1,"avgDealSize":15000,"dealSizeCurrency":"USD","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"It is necessary to send to the vendor data of 2 client administrators\r\nAsaf Goldberg | Director of Sales | asaf@cybeready.com","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[{"id":2463,"title":"Phishing simulation templates","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2465,"title":"Customized phishing simulation templates","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2467,"title":"Responsive campaigns - smart scheduling","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2469,"title":"Grouping","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2471,"title":"200 + domains","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2473,"title":"Department/Group Level Metrics and Indexing","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2475,"title":"Performance dashboard","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2477,"title":"Permissions based dashboard","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2479,"title":"CSV user upload","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2481,"title":"Active directory integration (push)","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2483,"title":"User score-based simulation","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2485,"title":"Customized domains","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2487,"title":"Automatic audience targeting","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2489,"title":"Risk-based campaigns","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2491,"title":"Templates","required":0,"type":"select","templateId":130,"value":"100+","options":["Yes","100+","500","500+","700","Нет"]},{"id":2493,"title":"Languages for simulation","required":0,"type":"select","templateId":130,"value":"35","options":["Yes","8","35","35+","36"]},{"id":2495,"title":"Customized landing page","required":0,"type":"select","templateId":130,"value":"by vendor","options":["Yes","by vendor","No"]},{"id":2497,"title":"Customized web forms","required":0,"type":"select","templateId":130,"value":"by vendor","options":["Yes","by vendor","No"]},{"id":2499,"title":"Levelized campaigns","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2501,"title":"Gartner 2019","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2503,"title":"Forrester 2020","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2505,"title":"Vishing","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2507,"title":"Smishing","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2509,"title":"Deployment","required":0,"type":"select","templateId":130,"value":"SaaS","options":["SaaS","SaaS/on-prem"]},{"id":2511,"title":"Campaign launch speed (1-5)","required":0,"type":"select","templateId":130,"value":"5","options":["1","2","3","4","5"]},{"id":2513,"title":"UI/UX (1-5)","required":0,"type":"select","templateId":130,"value":"5","options":["1","2","3","4","5"]},{"id":2515,"title":"Functionality (1-5)","required":0,"type":"select","templateId":130,"value":"3","options":["1","2","3","4","5"]},{"id":2517,"title":"Price Per User / Per Year","required":0,"type":"select","templateId":130,"value":"5-25$","options":["5-25$","8-29.5$","12-25$","24$-N/A"]},{"id":2519,"title":"Free Trial","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}}],"concurentProducts":[{"id":3677,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/cyberbit_logo.png","logo":true,"scheme":false,"title":"Cyberbit Range","vendorVerified":1,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cyberbit-range","companyTitle":"Cyberbit","companyTypes":["supplier","vendor"],"companyId":5133,"companyAlias":"cyberbit","description":"<span style=\"font-weight: bold;\">Security Teams are not Ready</span>\r\nEventually, your organization will be attacked. When this happens, your SOC team’s skillsets, including playbook knowledge, detection and investigation skills, teamwork and communication skills, and security tool operation, will be put to the test. However, conventional training courses do not prepare incident response teams for the intense experience of a cyberattack. SOC teams are unprepared and overwhelmed.<br /><br /><span style=\"font-weight: bold;\">Cyberbit Range: Simulating the Cyberattack Experience</span>\r\nCyberbit Range was created to address this critical gap. It introduces a new training approach by providing a hyper-realistic, virtual SOC environment, where your team can train in responding to real-world, simulated cyberattacks and dramatically improve their skills.<br /><br /><span style=\"font-weight: bold;\">Instant, Cloud-Based Training</span>\r\nYour SOC team’s time is precious. Their training needs to be accessible, so they can train before or after their shift without leaving the office. By training with Cyberbit Cloud Range, your team can log in anytime, anywhere, and start a simulated training session within minutes, either individually, or as a team.<br /><br /><span style=\"font-weight: bold;\">Cyber Range Simulated Training</span>\r\n<ul><li>Train Groups or Individuals</li></ul>\r\n<ul><li>Train Blue or Red Teams</li></ul>\r\n<ul><li>Train any Role From Tier-1 Analysts to Executives</li></ul>\r\n<ul><li>Guided or Independent Training with Automated Assessment</li></ul>\r\n<ul><li>Entry-Level to Complex Scenarios</li></ul>\r\n<ul><li>Cloud Based Access - Anytime, Anywhere</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Hyper Realistic Simulated Training </span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Real-World Network</span></span>\r\nA comprehensive virtualized network that includes application servers, database servers, email servers, switches, routers, and a simulated internet segment.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Real-World Security Tools</span></span>\r\nTrain your teams in a virtual SOC using market-leading security products: commercial SIEMs, firewalls, endpoint security systems and analysis tools, so your trainees can practice using the same tools they would use in real-life.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Real-World Simulated Attacks</span></span>\r\nChoose from an extensive catalog of simulated training scenarios, from entry-level to advanced, multi-stage attacks. Train individuals or teams, from tier-1 analysts to SOC managers and red teams. Attacks are simulated by an automated attack generator, running scenarios crafted by training experts, which means that SOC teams can train in elaborate attacks without the involvement of a red team. Cyberbit’s training scenarios are designed for multiple roles and aligned with NICE Cybersecurity Framework KSA’s.<br /><br /><br /><br /><br />","shortDescription":"Cyberbit Range is the most widely deployed Cyber Security Training and simulation platform","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cyberbit Range","keywords":"","description":"<span style=\"font-weight: bold;\">Security Teams are not Ready</span>\r\nEventually, your organization will be attacked. When this happens, your SOC team’s skillsets, including playbook knowledge, detection and investigation skills, teamwork and communication ski","og:title":"Cyberbit Range","og:description":"<span style=\"font-weight: bold;\">Security Teams are not Ready</span>\r\nEventually, your organization will be attacked. When this happens, your SOC team’s skillsets, including playbook knowledge, detection and investigation skills, teamwork and communication ski","og:image":"https://old.roi4cio.com/fileadmin/user_upload/cyberbit_logo.png"},"eventUrl":"","translationId":3678,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5896,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png","logo":true,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"supplierPartnersCount":1,"alias":"knowbe4-enterprise-security-awareness-training","companyTitle":"KnowBe4","companyTypes":["supplier","vendor"],"companyId":5482,"companyAlias":"knowbe4","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5902,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dcoya_Logo.png","logo":true,"scheme":false,"title":"Dcoya Behave","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"dcoya-behave","companyTitle":"Dcoya","companyTypes":["vendor"],"companyId":8753,"companyAlias":"dcoya","description":"<p><span style=\"font-weight: bold;\">HELP EMPLOYEES PRACTICE THE RIGHT CYBER BEHAVIORS</span></p>\r\n<p>Organizations like yours have implemented cybersecurity programs to train employees how to identify and avoid phishing, CEO fraud, and other social engineering attacks. And yet employees continue to fall victim to these scams, putting your business at risk. That’s because social engineering is designed to evoke an emotional response that makes the impulse to respond or “click” irresistible. To combat social engineering attacks like phishing, you need focus on employee behavior (emotional response) not just on employee knowledge (rational thinking).<br />Only Dcoya harnesses the power of machine learning, behavioral psychology best practices, and marketing methodologies to help employees learn and practice behaviors that will minimize cybersecurity mistakes.</p>\r\n<p><span style=\"font-weight: bold;\">PERSONALIZE ANTI-PHSIHING TRAINING FOR EVERY EMPLOYEE</span></p>\r\n<p>Practice makes perfect. But your SecOps don’t have the time to devote to individual training. With Dcoya Behave, every employee gets a personal cybersecurity training regimen automatically. Dcoya Behave simulates social engineering attacks, triggered automatically by employee real-time interactions with a phish, or by risk scores from past performance. These real-world phishing simulations test the cybersecurity savvy of your employees; give them opportunities to practice the right behavior; and enroll them automatically in refresher training as needed.</p>\r\n<p><span style=\"font-weight: bold;\">WITH DCOYA BEHAVE YOU GET</span></p>\r\n<ul>\r\n<li>Real-world, social engineering attacks based on the latest Dcoya intelligence; built-in and customized to imitate even the most devious attacks.</li>\r\n<li>Cognitive computing and ML algorithms to automate employee segmentation.</li>\r\n<li>Analysis of each keystroke in employee training sessions.</li>\r\n<li>Detailed {WHO} analytics on each employee’s behavior-changing journey.</li>\r\n<li>Automatic launch of simulated attacks to single employees and to groups of employees, with immediate analysis of results, and next-step recommendations.</li>\r\n<li>Automatic enrollment in refresher training for employees who need it.</li>\r\n</ul>","shortDescription":"Dcoya harnesses the power of machine learning, behavioral psychology best practices, marketing methodologies to help employees learn and practice behaviors that will minimize cybersecurity mistakes.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dcoya Behave","keywords":"","description":"<p><span style=\"font-weight: bold;\">HELP EMPLOYEES PRACTICE THE RIGHT CYBER BEHAVIORS</span></p>\r\n<p>Organizations like yours have implemented cybersecurity programs to train employees how to identify and avoid phishing, CEO fraud, and other social engineering","og:title":"Dcoya Behave","og:description":"<p><span style=\"font-weight: bold;\">HELP EMPLOYEES PRACTICE THE RIGHT CYBER BEHAVIORS</span></p>\r\n<p>Organizations like yours have implemented cybersecurity programs to train employees how to identify and avoid phishing, CEO fraud, and other social engineering","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dcoya_Logo.png"},"eventUrl":"","translationId":5903,"dealDetails":{"avgPartnerDiscount":25,"dealProtection":1,"avgDealSize":15000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Запросить демо https://dcoya.com/dcoya-behave/#","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5907,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Proofpoint.png","logo":true,"scheme":false,"title":"Proofpoint ThreatSim","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"proofpoint-threatsim","companyTitle":"Proofpoint","companyTypes":["vendor"],"companyId":2817,"companyAlias":"proofpoint","description":"<p>To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our <span style=\"font-weight: bold;\">ThreatSim®</span> Phishing Simulations help you assess users’ susceptibility to phishing and spear-phishing attacks, with email templates based on real phishing lures spotted “in the wild” by Proofpoint threat intelligence. We also offer CyberStrength® Knowledge Assessments, a powerful web-based tool that helps you measure users’ understanding of critical cybersecurity topics and track progress over time, driving continuous improvement.</p>\r\n<p><span style=\"font-weight: bold;\">ThreatSim®</span> tests your organization’s susceptibility to a variety of phishing and spear-phishing attacks. Unlike other phishing simulation tools, we provide Dynamic Threat Simulation phishing templates based on current lures spotted “in the wild” by Proofpoint’s industry-leading threat intelligence.</p>\r\n<p>With thousands of different phishing templates across 35+ languages and 13 categories—and more added each month — you can evaluate users on multiple threat types, including:</p>\r\n<ul>\r\n<li>Malicious attachments</li>\r\n<li>Embedded links</li>\r\n<li>Requests for personal data</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Wide Variety of Customizable Templates</span></p>\r\n<p>The ThreatSim phishing tool supports more than thousands of templates across more than 35 languages. Our variety of templates address three key testing factors: embedded links, requests for personal data, and attachment downloads (.pdf, .doc, .docx, .xlsx, and .html). Average failure rates calculated from assessments sent by all customers for each template are visible within the phishing tool, which allows administrators to gauge difficulty prior to campaign creation.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamic Threat Simulation</span></p>\r\n<p>Using real, “in-the-wild,” threat intelligence data from our Targeted Attack Protection, we deliver new ThreatSim phishing templates to help create simulated attacks that will challenge the user’s ability to respond to the most relevant threats. Administrators can customize the content in any template, or create their own. This flexibility allows organizations to quickly and easily create timely phishing tests that mimic threats seen in the wild and within their own networks.</p>\r\n<p><span style=\"font-weight: bold;\">Teachable Moments</span></p>\r\n<p>We strongly suggest that all employees who fall for a ThreatSim Phishing Simulation be automatically presented with an “intervention message” (which we like to call a Teachable Moment). By utilizing “just-in-time teaching” at the moment an employee interacts with a mock phishing email, Teachable Moments explain what happened, outline the dangers associated with real attacks, and give practical advice about avoiding future traps.<br />We offer several formats — including static and animated landing pages, short videos, and interactive challenges — for our Teachable Moments and allow you to tailor the message as you see fit. A selection of static landing pages is available in 17 languages, which allows your global employees to view key messages in their native languages. You can also opt to route clicks to your own internal messaging.</p>\r\n<p><span style=\"font-weight: bold;\">Auto-Enrollment</span></p>\r\n<p>We were the first-to-market with this time-saving and behavior changing feature that allows you to automatically assign follow-up training to anyone who falls for a ThreatSim Phishing Simulation. While you can still assign training to everyone, Auto-Enrollment allows you to quickly deliver targeted training to your most susceptible end users first. This approach can dramatically improve the efficiency of your program and engage those who need the most attention.</p>\r\n<p><span style=\"font-weight: bold;\">Multinational Support</span></p>\r\n<p>Multinational support allows administrators to deliver simulated attacks and Teachable Moments in dozens if languages which means you can assess your global employees in their native language.</p>\r\n<p><span style=\"font-weight: bold;\">PhishAlarm and PhishAlarm Analyzer</span></p>\r\n<p>Our PhishAlarm one-click email reporting tool is available to install at no cost. This email client add-in allows employees to report suspicious messages to your security and incident response teams with a single mouse click. We recommend adding our PhishAlarm Analyzer anti-phishing email analysis tool, which utilizes machine learning to prioritize emails reported via PhishAlarm and enables faster remediation of the most dangerous threats on your network.</p>\r\n<p><span style=\"font-weight: bold;\">System Click Exclusion</span></p>\r\n<p>System Click Exclusion is a feature built into ThreatSim that identifies and isolates phishing simulation interactions initiated by email protection tools. This patented approach ensures an accurate view of risky end user behaviors and enables productive and efficient security education programs.</p>\r\n<p><span style=\"font-weight: bold;\">What does this provide?</span></p>\r\n<ul>\r\n<li>Accuracy - A mechanism to ensure an accurate view of end user interactions (versus clicks from email gateways) in phishing simulations</li>\r\n<li>Intuitive UI - An easy-to-use interface for creating System Click Exclusion rules for multiple system interactions based upon IP address or user agent</li>\r\n<li>Reporting - Easily identify the interactions from systems instead of users to validate that all interactions are being captured</li>\r\n<li>Integration with TAP - A seamless experience for Targeted Attack Protection (TAP) customers because the customer’s email protection tool clicks are already systemically whitelisted through existing integration between the ThreatSim product and TAP</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Random Scheduling</span></p>\r\n<p>This option allows you to spread out the distribution of phishing simulations to minimize the impact to your email servers and IT helpdesk. Paired with the ability to use multiple simulated attack templates in a single assessment campaign, these functions reduce the chances that employees will figure out – and discuss – the phishing test, which helps provide the purest test of end-user susceptibility.</p>\r\n<p><span style=\"font-weight: bold;\">Valuable Business Intelligence</span></p>\r\n<p>ThreatSim provides extensive analytics and reporting about employee responses to various phishing attack scenarios. You’ll also know whether employees fell for an attack through a mobile phone, a tablet, or a computer; the browsers they were using; and their locations when they fell for the attack.</p>\r\n<p><span style=\"font-weight: bold;\">Weak Network Egress and Vulnerability Checks</span></p>\r\n<p>ThreatSim offers an optional Weak Network Egress function, which can help detect data egress from users’ PCs and, as a result, allow security personnel to identify and modify security controls to reduce potential threats. Administrators can also check for browser vulnerabilities with the capability to flag out-of-date (and potentially vulnerable) third-party plug-ins on end-user PCs.</p>","shortDescription":"Engage your end-users and arm them against real-world cyber attacks, using personalized cybersecurity training based on industry-leading threat intelligence.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Proofpoint ThreatSim","keywords":"","description":"<p>To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our <span style=\"font-weight: bold;\">ThreatSim®</span> Phishing Simulations help you","og:title":"Proofpoint ThreatSim","og:description":"<p>To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our <span style=\"font-weight: bold;\">ThreatSim®</span> Phishing Simulations help you","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Proofpoint.png"},"eventUrl":"","translationId":5908,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":0,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1174,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg","logo":true,"scheme":false,"title":"CybeReady","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybeready","companyTitle":"CybeReady","companyTypes":["supplier","vendor"],"companyId":4066,"companyAlias":"cybeready","description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to your employees on an ongoing basis. Employees’ reactions are tested using various methods and levels of deception.\r\nPhishing Readiness\r\nIt’s not how much effort you’ve put into training employees, how fast your servers are or how up-to-date your software may be. Cyber security awareness programs often fail because readiness is what matters most. Most organizations invest heavily in awareness programs that encourage employees to excel on tests and to keep security best practices in mind. Yet as readiness is skill-dependent and not awareness-dependent, most of these programs ultimately lead to high levels of awareness and regrettably low levels of performance. When it comes to phishing readiness, the true measurement is hindsight: did you know what to do, and did you react accordingly?\r\nInstant Deployment\r\nWe know that timing and context are of the essence. CybeReady’s training programs are fully customizable and ready for technical testing. Within 48 hours of a purchase order, your branded content and simulation suggestions will be ready for use. We deliver programs in your native language that are customized to fit the specific context of your industry and the regions in which your company operates. Once your program has launched, you’ll receive weekly ‘Readiness Reports’ that contain information on the automated operation and performance of your training programs, along with suggestions from our team.\r\nSmart Learning \r\nYou can only be assured of employees’ readiness with the most rigorous behavioral training, and that requires fully customized content–not templates. CybeReady specializes in highly convincing phishing attacks at varying levels of difficulty–from sector-specific, tailor-made messages to department and position-specific messages, to customer-branded, simulation-specific content that is linguistically and culturally adapted to your needs. With such realistic scenarios, you’ll be well equipped to prepare your employees for any hacker’s diverse approaches to phishing.","shortDescription":"Cyber Readiness: The state of being prepared to handle unexpected cyber events. Cyber readiness is achieved when people are adept at thwarting or minimizing the effect of an unexpected cyber attack.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":1,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CybeReady","keywords":"your, that, programs, training, readiness, levels, phishing, employees","description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to yo","og:title":"CybeReady","og:description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to yo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},"eventUrl":"","translationId":1175,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5904,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cofense_Logo.png","logo":true,"scheme":false,"title":"Cofense PhishMe","vendorVerified":0,"rating":"2.00","implementationsCount":17,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cofense-phishme","companyTitle":"Cofense","companyTypes":["supplier","vendor"],"companyId":5373,"companyAlias":"cofense","description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line of defense. Will they fall for a phish or report it? Cofense PhishMeTM educates them on the real attacks your company faces, transforming vulnerable targets into active defenders.</p>\r\n<p><span style=\"font-weight: bold;\">YOUR PROBLEM</span></p>\r\n<p>No matter how good your perimeter security, phishing emails still reach users and threaten to trigger breaches. The Cofense Phishing Defense CenterTM finds that 90% of user-reported emails are in environments using secure email gateways (SEGs). Every phishing email that reaches the user is an attack on your organization. When technology fails, users need to become human sensors and report phishing, so the SOC can remediate the threat. But how can users report if they don’t recognize today’s evolving attacks?</p>\r\n<p><span style=\"font-weight: bold;\">OUR SOLUTION</span></p>\r\n<p>Teach users to identify (real) phish. Cofense PhishMe educates users on the real phishing tactics your company faces. We leverage extensive research, threat intelligence, and front-line phishing defense resources that other providers lack. We believe that real phish are the real problem. Through experiential learning—simulations of current phishing threats — you’ll condition smarter email behavior, transforming vulnerable targets into an essential layer of defense.</p>\r\n<p><span style=\"font-weight: bold;\">Click Only:</span> A phishing email that urges the recipient to click on an embedded link.</p>\r\n<p><span style=\"font-weight: bold;\">Data Entry:</span> A phishing email with a link to a customized landing page that entices users to enter sensitive information.</p>\r\n<p><span style=\"font-weight: bold;\">Attachment-based:</span> A phishing email with seemingly legitimate attachments in a variety of file formats.</p>\r\n<p><span style=\"font-weight: bold;\">Double Barrel:</span> Patented technology that simulates conversational phishing techniques by sending two emails – one benign and one containing a malicious element – to train users on this tactic used by APT groups.<br />Benchmarking: A patented feature to conduct an identical scenario and receive an additional report that provides an anonymous comparison of your results with other Cofense customers or industry peers that ran the same scenario.</p>\r\n<p><span style=\"font-weight: bold;\">Highly Personalized:</span> Simulate advanced social engineering tactics by using specific public, known details about email recipients gathered from internal and public sources.</p>","shortDescription":"Cofense PhishMe simulates active phishing threats to condition smarter user behavior.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cofense PhishMe","keywords":"","description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line","og:title":"Cofense PhishMe","og:description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cofense_Logo.png"},"eventUrl":"","translationId":5906,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":12000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Request demo: https://go.cofense.com/live-demo/","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1906,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda PhishLine","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":3,"alias":"barracuda-phishline","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees into a layer of defense with Barracuda PhishLine.</p>\r\n<p>With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.</p>\r\n<p>Only PhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.</p>\r\n<p>Barracuda PhishLine trains users to understand and respond correctly to the latest phishing techniques, recognize subtle phishing clues, and prevent email fraud, data loss, and brand damage. It transforms employees into a powerful line of defense against damaging phishing attacks.</p>\r\n<p>This versatile, scalable, cloud-hosted SaaS solution includes hundreds of email and landing-pages templates, updated based on threat trends. Levelized training and gamification make it more effective by engaging employees.</p>\r\n<p><span style=\"font-weight: bold;\">Phishing Training</span></p>\r\n<p>Barracuda PhishLine uses advanced, automated education technology that includes simulation-based training, continuous testing, powerful reporting for administrators, and active incident response awareness.</p>\r\n<p><span style=\"font-weight: bold;\">Phishing Simulation</span></p>\r\n<p>Simulated phishing attacks are constantly updated to reflect the most recent and most common threats. Simulations are not limited to email, but also include voice, SMS, and portable-media (USB stick) attacks. Templates let you customize simulations.</p>\r\n<p><span style=\"font-weight: bold;\">Phishing Reporting</span></p>\r\n<p>Barracuda Phishline provides advanced analytics and reporting tools that enable you to identify how effective your training is and how users react to actual phishing attacks that may slip through other defenses.</p>\r\n<p><span style=\"font-weight: bold;\">Patented Simulations</span></p>\r\n<p>PhishLine's patented attack simulations train your employees to spot email threats that can compromise data and result in financial and reputational loss. A/B tests prevent users from receiving duplicate simulations.</p>\r\n<p><span style=\"font-weight: bold;\">Total Email Protection Portfolio</span></p>\r\n<p>PhishLine is part of Barracuda’s Total Email Protection portfolio, delivering truly comprehensive email security.</p>\r\n<p><span style=\"font-weight: bold;\">Curated Content</span></p>\r\n<p>PhishLine Content Center Marketplace™ provides dozens of simulation templates, landing pages, risk-assessment surveys, and other training content. New, customizable content is added daily, to reflect current threat trends.</p>\r\n<p><span style=\"font-weight: bold;\">Gamification</span></p>\r\n<p>PhishLine boosts user engagement with gamification. Videos, infographics, newsletters, and other materials supplement core training.</p>\r\n<p><span style=\"font-weight: bold;\">Levelized Programs</span></p>\r\n<p>As employees progress through their training program, the content constantly changes, challenging them to continuously improve their phishing detection and reporting skills.</p>\r\n<p><span style=\"font-weight: bold;\">PhishLine Concierge Service (Optional)</span></p>\r\n<p>PhishLine Concierge is an optional service that offloads the complex tasks of defining, configuring, executing, and analyzing your simulation campaigns to a dedicated consultant, to minimize your resource overhead.</p>","shortDescription":"Barracuda PhishLine - Fight phishing with continuous simulation and training\r\nTrain employees to understand the latest attack techniques, recognize subtle clues, and help stop email fraud, data loss","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda PhishLine","keywords":"","description":"<p>Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing expo","og:title":"Barracuda PhishLine","og:description":"<p>Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing expo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1907,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":27240,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[{"id":70,"title":"IT Security and Risk Management"},{"id":64,"title":"Chief IT Security Officer"},{"id":60,"title":"Chief Information Officer"}],"organizationalFeatures":["ISO 27001 Compliance","GDPR Compliance","IT Security Department in company","Web-based customer portal","Company branches in different countries"],"complementaryCategories":[],"solutions":["Risk of attacks by hackers","Decentralized IT systems","No IT security guidelines","Risk or Leaks of confidential information","Shortage of inhouse IT resources","High costs of IT personnel","Risk of data loss or damage"],"materials":[{"id":2249,"title":"","description":"CISO Toolkit","uri":"https://cybeready.com/ciso-toolkit"},{"id":2250,"title":"","description":"Playbook","uri":"https://cybeready.com/wp-content/uploads/PhishingSimulationsPlaybook.pdf"},{"id":2251,"title":"","description":"AWARD","uri":"https://cybeready.com/wp-content/uploads/CybeReady-Award-Write-Up.pdf"},{"id":2252,"title":"","description":"Four Common Mistakes in Employee Security Awareness Training","uri":"https://cybeready.com/wp-content/uploads/FourCommonMistakes-1.pdf"},{"id":2253,"title":"","description":"Overcoming Challenges in Multinational Phishing Simulations","uri":"https://cybeready.com/wp-content/uploads/OvercomingChallenges-1.pdf"},{"id":2254,"title":"","description":"Training for Gold","uri":"https://cybeready.com/training-for-gold"}],"useCases":[{"id":783,"title":"Complete Workforce Training","description":" Autonomous training platform continuously trains 100% of employees every month, year-round, using proven methodology and localized, customized content.","imageURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},{"id":784,"title":"Advanced Automation","description":" Machine Learning-powered training selects and adjusts training to each employee, including adaptive difficulty level and frequency of training.","imageURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},{"id":785,"title":"Just in Time (JIT)","description":"Learning Phishing simulations and short learning sessions in one integrative experience ensure learning ‘in the golden moment’ and eliminate friction with employees.","imageURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},{"id":786,"title":"Guarantees Results","description":" Significant change in employee behavior towards cyber attacks: 83% reduction in Serial Clickers, 403% increase in employee resilience score.","imageURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},{"id":787,"title":"Effortless","description":" Cybeready’s fully managed solution ensures results yet eliminates IT effort, so you can dedicate valuable resources to other, more challenging tasks.","imageURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"}],"best_practices":[],"values":["Manage Risks","Ensure Security and Business Continuity"],"implementations":[{"id":1121,"title":"CybeReady for Payoneer","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cybeready-dlja-payoneer/"},{"id":1124,"title":"CybeReady for Ayalon Insurance","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cybeready-dlja-ayalon-insurance/"},{"id":1126,"title":"CyberReady for the Israeli healthcare system","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cyberready-dlja-izrailskoi-sistemy-zdravookhranenija/"},{"id":1128,"title":"CybeReady for a leading academic institute","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cybeready-dlja-vedushchego-akademicheskogo-instituta/"}],"presenterCodeLng":"","productImplementations":[{"id":1121,"title":"CybeReady for Payoneer","description":" Yaron Weiss, Payoneer's VP Corporate Security and Global IT Operations, has been leading the company’s security efforts since 2014. With steady increase in phishing attacks, Weiss realized the high-risk potential from Payoneers’ insider threat - its employees. Before learning about CybeReady in 2016, Payoneer used a different phishing simulation solution for its 1.200 employees for just one year. That solution required resources and training expertise that Payoneer's IT team didn't have, and despite the considerable effort that went into the program it generated a total of two email campaigns in a full year. With random training efforts and no proper training methodology driving the process, employee behavior didn't seem to change.\r\n\r\n<b>The Solution.</b> When Weiss saw CybeReady's autonomous training platform product demo, he was immediately sold. “CybeReady’s solution addressed all the challenges ‘we were facing at the time.” he said, “itis fully managed and offers each employee continuous, training in their own inbox and their native language’. CybeReady utilizes a proven methodology, powered. by Machine Learning. It offers a minimum of 12 phishing simulations to each employee annually, and itis customized, localized and adaptive to each, employee’ performance. Weiss decided to switch to CybeReady within aweek. Getting started was fast and easy - CybeReady offers a cloud solution that takes three quick steps and a total of one hour to integrate: \f\r\n<ul> <li>Export the company's address book </li> <li>Whitelist a short list of domains</li> <li>Approve 1st campaign</li> </ul>\r\n<b>The Result.</b> Weiss started noticing the difference in employees’ behavior towards phishing attacks pretty quickly. Using CybeReady’s real-time customer dashboard, he looked at two main KPI\r\n<ul> <li> Employee Resilience Score - more than tripled within the first six months and increased by over 7x over the two years of training with CybeReady.</li> <li> Serial Clicker Rate - The Employee High Risk Group has converted to high performing as the % of serial clickers out of all employees was reduced to almost -0%.</li></ul>\r\nCybeReady also provides the Payoneer security team with weekly, monthly and quarterly reports they can easily share with Management. Payoneer's executives appreciate the robust business intelligence features and the ability to track progress. In addition to the progress seen “on the dashboard’, Weiss indicated that his team noticed change in employee behavior “in real life’: “We can actually see a correlation between the graphs and the results on the ground: When we run ‘red team’ drills, our employees now report phishing very quickly and you can see how this has become very important to them.” \r\nWeiss pinpoints the key factors to a successful employee training program from his experience: “I've been using phishing simulations for Payoneer employee training for three years now.” he said, ” and I can say that the most important factor to success is continuity - training each and every employee month after month consistently and repeatedly” In terms of ROI, the program has easily paid for itself. “We are paying the same as we did to the previous vendor, but getting significantly more value.” said Weiss. \f","alias":"cybeready-dlja-payoneer","roi":0,"seo":{"title":"CybeReady for Payoneer","keywords":"","description":" Yaron Weiss, Payoneer's VP Corporate Security and Global IT Operations, has been leading the company’s security efforts since 2014. With steady increase in phishing attacks, Weiss realized the high-risk potential from Payoneers’ insider threat - its employees","og:title":"CybeReady for Payoneer","og:description":" Yaron Weiss, Payoneer's VP Corporate Security and Global IT Operations, has been leading the company’s security efforts since 2014. With steady increase in phishing attacks, Weiss realized the high-risk potential from Payoneers’ insider threat - its employees"},"deal_info":"","user":{"id":8767,"title":"Payoneer","logoURL":"https://old.roi4cio.com/uploads/roi/company/Payoneer.jpg","alias":"payoneer","address":"","roles":[],"description":"In today’s borderless digital world, <b>Payoneer</b> enables millions of businesses and professionals from more than 200 countries and territories to connect with each other and grow globally through our cross-border payments platform. With Payoneer’s fast, flexible, secure and low-cost solutions, marketplaces, networks, businesses and professionals throughout the world can pay and get paid globally, as easily as they do locally. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.payoneer.com/ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Payoneer","keywords":"","description":"In today’s borderless digital world, <b>Payoneer</b> enables millions of businesses and professionals from more than 200 countries and territories to connect with each other and grow globally through our cross-border payments platform. With Payoneer’s fast, fl","og:title":"Payoneer","og:description":"In today’s borderless digital world, <b>Payoneer</b> enables millions of businesses and professionals from more than 200 countries and territories to connect with each other and grow globally through our cross-border payments platform. With Payoneer’s fast, fl","og:image":"https://old.roi4cio.com/uploads/roi/company/Payoneer.jpg"},"eventUrl":""},"supplier":{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""},"vendors":[{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1124,"title":"CybeReady for Ayalon Insurance","description":"An executive who leads security efforts from the Office of the CIO at Ayalon Insurance knows that exposure to hackers could lead to total catastrophe within seconds. <i>“In the past year, we’ve come to understand that it really doesn’t matter how many technology tools or system safeguards we have in place to defend ourselves; identifying a threat will ultimately fall upon a human being’s shoulders, every time. The firewall and antivirus blocking software we’ve put in place will work, of course. Eventually, however, if a hacker wants to find a way in, then he or she can by baiting our personnel in ways that unknowingly grant access to these criminals.”</i> Ahuvia explained.\r\n<b>The Result.</b> Once Ayalon Insurance began working with CybeReady, it was clear to Ahuvia that his staff were being tested using a very sophisticated, covert approach. “CybeReady’s learning pages are very effective,” Ahuvia noted. “By the statistics, we can see that people are paying attention; they’re reading the material. As for their performance in the simulations, it’s definitely improving over time. We can see very clearly that people are much less likely now to click on a phishing scam than they were before we began working with CybeReady. In fact, we can see that those who used to click on almost every phishing email they received have done a complete 180—they don’t click anything now.” \r\nIn cyber security, staying on top of the latest trends means having a distinct advantage over hackers. A deep understanding of the most recent phishing scams isn’t only helpful; it could mean the difference between a business being vulnerable or successfully thwarting an attack. “We’ve found that the CybeReady team is very knowledgeable about phishing scams happening all around the world; they’re bringing current practices to us before they’re arriving in our inboxes,” Ahuvia said. “When we hear of an attack that happens, we want to know that we already simulated it here and that people are not only aware, but trained to handle it.” ","alias":"cybeready-dlja-ayalon-insurance","roi":0,"seo":{"title":"CybeReady for Ayalon Insurance","keywords":"","description":"An executive who leads security efforts from the Office of the CIO at Ayalon Insurance knows that exposure to hackers could lead to total catastrophe within seconds. <i>“In the past year, we’ve come to understand that it really doesn’t matter how many technolo","og:title":"CybeReady for Ayalon Insurance","og:description":"An executive who leads security efforts from the Office of the CIO at Ayalon Insurance knows that exposure to hackers could lead to total catastrophe within seconds. <i>“In the past year, we’ve come to understand that it really doesn’t matter how many technolo"},"deal_info":"","user":{"id":5072,"title":"Ayalon Insurance","logoURL":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg","alias":"ayalon-insurance","address":"","roles":[],"description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies throughout Israel. The company is active in all areas of general insurance, life insurance and health insurance. The company has a staff of around 600 employees and the Group as a whole employs some 850 people.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ayalon Insurance","keywords":"","description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:title":"Ayalon Insurance","og:description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:image":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg"},"eventUrl":""},"supplier":{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""},"vendors":[{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1126,"title":"CyberReady for the Israeli healthcare system","description":"<i>Access to sensitive information has made the healthcare industry a preferred target for hackers. Training employees effectively against phishing methods remains the strongest line of defense. </i>\r\n<b>The Challenge.</b> An information security executive from a major countrywide healthcare network in Israel is all too familiar with this balancing act. He cites fraud as a major concern for his organization, as well as those of his peers in the industry. “We’re particularly concerned about the types of fraudulent activities that ultimately lead to transactions and money transfers taking place,” he said. “Cryptoware, or ransomware, as it is commonly called, is a virus that hackers use to encrypt all of the data on your hard drive. They then require organizations to pay a ransom in order to decrypt your information, effectively holding your files hostage.” Imagine this worst-case scenario for information security professionals: attacks rendering critical files inaccessible grind all business operations to a halt, leaving organizations with few options once attacked. \r\n<b>The Results.</b> “Our selection process involved testing three different systems. We eventually chose CybeReady, and here’s why: they not only increased our employees’ awareness, they offered a service that was unmatched by their competitors. CybeReady’s program runs on its own, which means that I don’t have to invest my time or that of my team in operating or configuring attacks. It literally involved zero effort on our part.” The company’s level of service was apparent even during the early days of the engagement. “Service from other vendors didn’t come close to this; what had previously taken me up to three weeks annually now involved little more than a few hours a month, at most. I knew that I could trust CybeReady, and have heard colleagues in the industry who chose them say the same.” The executive cautions others to consider the difference between training and awareness programs. “There are a number of phishing options that appear to have comparable training content and expertise. The differences are often only visible after several months of reports indicate a marked change in employee behavior. As CybeReady’s phishing attacks changed form over time, the organization’s employees responded more intelligently than they had before. Few other options, if any, also offer the availability and attention possible from CybeReady.” \r\n<i>“The level of employee engagement in our case was very high compared to other methods I used in the past.”</i>","alias":"cyberready-dlja-izrailskoi-sistemy-zdravookhranenija","roi":0,"seo":{"title":"CyberReady for the Israeli healthcare system","keywords":"","description":"<i>Access to sensitive information has made the healthcare industry a preferred target for hackers. Training employees effectively against phishing methods remains the strongest line of defense. </i>\r\n<b>The Challenge.</b> An information security executive fr","og:title":"CyberReady for the Israeli healthcare system","og:description":"<i>Access to sensitive information has made the healthcare industry a preferred target for hackers. Training employees effectively against phishing methods remains the strongest line of defense. </i>\r\n<b>The Challenge.</b> An information security executive fr"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""},"vendors":[{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":0,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1128,"title":"CybeReady for a leading academic institute","description":"<b>The Challenge.</b> While email as a mode of communication represents a major vulnerability for any organization, academic institutions are especially susceptible. Colleges and universities tend to be open organizations that involve many internal and external constituents, including but not limited to students, faculty staff, administration, researchers, alumni, vendors, contractors, the media and the community at large. When considering all of the audiences involved, and the hundreds of thousands of emails that are sent regularly, the risks from ever-more-deceptive social engineering techniques as well as masked viruses are naturally multiplied.\r\n<b>The Solution.</b> Ray (CIO) switched gears, looking for a fully managed service offering rather than handling all of the phishing training operations in-house. In engaging CybeReady, he found a service provider that truly made a difference in employee behavior ‘towards phishing attacks, and did all of the heavy lifting. “Their team has saved me a lot of time and effort from security administration here, and in our second year with them continues to do so,” he noted. What previously would take half of a workday to set up is now done automatically, as managers no longer have to spend hours preparing campaigns, selecting recipients or sending test messages. \f\r\n<b>The Result.</b> The university is currently in its 16th campaign, where it has seen a sharp decline (over x5) in ‘serial clickers’ (the organization's high-risk group) as well as those who only ‘occasionally take action with a phishing email. “at our request. CybeReady raised the difficulty of our latest campaign, and although the number of users who click has risen, we can see that overall, our faculty and administration are learning,” Ray said. “The system is definitely working and has generated much stronger awareness across the campus of email as a pervasive threat." “One of the other things I like about CybeReady's systems its comprehensive dashboard,” he added. “That I get all the info in one place where I can pull insights about our progress and any areas of weakness, which I use when making future campaign decisions. ","alias":"cybeready-dlja-vedushchego-akademicheskogo-instituta","roi":0,"seo":{"title":"CybeReady for a leading academic institute","keywords":"","description":"<b>The Challenge.</b> While email as a mode of communication represents a major vulnerability for any organization, academic institutions are especially susceptible. Colleges and universities tend to be open organizations that involve many internal and externa","og:title":"CybeReady for a leading academic institute","og:description":"<b>The Challenge.</b> While email as a mode of communication represents a major vulnerability for any organization, academic institutions are especially susceptible. Colleges and universities tend to be open organizations that involve many internal and externa"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""},"vendors":[{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"130":{"id":130,"title":"Cyber Security Training and Simulation"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}