{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"_type":"localeString","en":"deployment","ru":"внедрение"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"_type":"localeString","en":"Pitch","ru":"Краткое описание"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"en":"Testing","ru":"Тестирование","_type":"localeString"},"compare":{"ru":"Сравнить с конкурентами","_type":"localeString","en":"Compare with competitors"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":" Characteristics"},"transaction-features":{"en":"Transaction Features","ru":"Особенности сделки","_type":"localeString"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"en":"Average deal size","ru":"Средний размер сделки","_type":"localeString"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"_type":"localeString","en":"Deployments with this product","ru":"Внедрения с этим продуктом"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"en":" Roles of Interested Employees","ru":"Роли заинтересованных сотрудников","_type":"localeString"},"organizational-features":{"ru":"Организационные особенности","_type":"localeString","en":"Organizational Features"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"en":" Selling stories","ru":"Продающие истории","_type":"localeString"},"materials":{"_type":"localeString","en":"Materials","ru":"Материалы"},"about-product":{"en":"About Product","ru":"О продукте","_type":"localeString"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"ru":"Рассчитать ROI продукта","_type":"localeString","en":"Calculate Product ROI"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"en":"select product for presentation","ru":"выбрать продукт для презентации","_type":"localeString"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"_type":"localeString","en":"Videos","ru":"Видео"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнений"},"compare-with-competitive":{"en":" Compare with competitive","ru":"Сравнить с конкурентными","_type":"localeString"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"content":"website","name":"og:type"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Example product","ru":"Конкретный продукт"}},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"translations":{"_type":"localeString","en":"Product","ru":"Продукт"},"name":"title"},{"name":"description","translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"}},{"translations":{"_type":"localeString","en":"Product keywords","ru":"Ключевые слова продукта"},"name":"keywords"}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"dcoya-behave":{"id":5902,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dcoya_Logo.png","logo":true,"scheme":false,"title":"Dcoya Behave","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"dcoya-behave","companyTitle":"Dcoya","companyTypes":["vendor"],"companyId":8753,"companyAlias":"dcoya","description":"<p><span style=\"font-weight: bold;\">HELP EMPLOYEES PRACTICE THE RIGHT CYBER BEHAVIORS</span></p>\r\n<p>Organizations like yours have implemented cybersecurity programs to train employees how to identify and avoid phishing, CEO fraud, and other social engineering attacks. And yet employees continue to fall victim to these scams, putting your business at risk. That’s because social engineering is designed to evoke an emotional response that makes the impulse to respond or “click” irresistible. To combat social engineering attacks like phishing, you need focus on employee behavior (emotional response) not just on employee knowledge (rational thinking).<br />Only Dcoya harnesses the power of machine learning, behavioral psychology best practices, and marketing methodologies to help employees learn and practice behaviors that will minimize cybersecurity mistakes.</p>\r\n<p><span style=\"font-weight: bold;\">PERSONALIZE ANTI-PHSIHING TRAINING FOR EVERY EMPLOYEE</span></p>\r\n<p>Practice makes perfect. But your SecOps don’t have the time to devote to individual training. With Dcoya Behave, every employee gets a personal cybersecurity training regimen automatically. Dcoya Behave simulates social engineering attacks, triggered automatically by employee real-time interactions with a phish, or by risk scores from past performance. These real-world phishing simulations test the cybersecurity savvy of your employees; give them opportunities to practice the right behavior; and enroll them automatically in refresher training as needed.</p>\r\n<p><span style=\"font-weight: bold;\">WITH DCOYA BEHAVE YOU GET</span></p>\r\n<ul>\r\n<li>Real-world, social engineering attacks based on the latest Dcoya intelligence; built-in and customized to imitate even the most devious attacks.</li>\r\n<li>Cognitive computing and ML algorithms to automate employee segmentation.</li>\r\n<li>Analysis of each keystroke in employee training sessions.</li>\r\n<li>Detailed {WHO} analytics on each employee’s behavior-changing journey.</li>\r\n<li>Automatic launch of simulated attacks to single employees and to groups of employees, with immediate analysis of results, and next-step recommendations.</li>\r\n<li>Automatic enrollment in refresher training for employees who need it.</li>\r\n</ul>","shortDescription":"Dcoya harnesses the power of machine learning, behavioral psychology best practices, marketing methodologies to help employees learn and practice behaviors that will minimize cybersecurity mistakes.","type":"Service","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dcoya Behave","keywords":"","description":"<p><span style=\"font-weight: bold;\">HELP EMPLOYEES PRACTICE THE RIGHT CYBER BEHAVIORS</span></p>\r\n<p>Organizations like yours have implemented cybersecurity programs to train employees how to identify and avoid phishing, CEO fraud, and other social engineering","og:title":"Dcoya Behave","og:description":"<p><span style=\"font-weight: bold;\">HELP EMPLOYEES PRACTICE THE RIGHT CYBER BEHAVIORS</span></p>\r\n<p>Organizations like yours have implemented cybersecurity programs to train employees how to identify and avoid phishing, CEO fraud, and other social engineering","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dcoya_Logo.png"},"eventUrl":"","translationId":5903,"dealDetails":{"avgPartnerDiscount":25,"dealProtection":1,"avgDealSize":15000,"dealSizeCurrency":"USD","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Запросить демо https://dcoya.com/dcoya-behave/#","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[{"id":2463,"title":"Phishing simulation templates","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2465,"title":"Customized phishing simulation templates","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2467,"title":"Responsive campaigns - smart scheduling","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2469,"title":"Grouping","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2471,"title":"200 + domains","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2473,"title":"Department/Group Level Metrics and Indexing","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2475,"title":"Performance dashboard","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2477,"title":"Permissions based dashboard","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2479,"title":"CSV user upload","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2481,"title":"Active directory integration (push)","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2483,"title":"User score-based simulation","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2485,"title":"Customized domains","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2487,"title":"Automatic audience targeting","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2489,"title":"Risk-based campaigns","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2491,"title":"Templates","required":0,"type":"select","templateId":130,"value":"500","options":["Yes","100+","500","500+","700","Нет"]},{"id":2493,"title":"Languages for simulation","required":0,"type":"select","templateId":130,"value":"Yes","options":["Yes","8","35","35+","36"]},{"id":2495,"title":"Customized landing page","required":0,"type":"select","templateId":130,"value":"Yes","options":["Yes","by vendor","No"]},{"id":2497,"title":"Customized web forms","required":0,"type":"select","templateId":130,"value":"Yes","options":["Yes","by vendor","No"]},{"id":2499,"title":"Levelized campaigns","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2501,"title":"Gartner 2019","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2503,"title":"Forrester 2020","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2505,"title":"Vishing","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}},{"id":2507,"title":"Smishing","required":0,"type":"binary","templateId":130,"value":true,"options":{"values":null,"defaults":null}},{"id":2509,"title":"Deployment","required":0,"type":"select","templateId":130,"value":"SaaS/on-prem","options":["SaaS","SaaS/on-prem"]},{"id":2511,"title":"Campaign launch speed (1-5)","required":0,"type":"select","templateId":130,"value":"3","options":["1","2","3","4","5"]},{"id":2513,"title":"UI/UX (1-5)","required":0,"type":"select","templateId":130,"value":"3","options":["1","2","3","4","5"]},{"id":2515,"title":"Functionality (1-5)","required":0,"type":"select","templateId":130,"value":"4","options":["1","2","3","4","5"]},{"id":2517,"title":"Price Per User / Per Year","required":0,"type":"select","templateId":130,"value":"5-25$","options":["5-25$","8-29.5$","12-25$","24$-N/A"]},{"id":2519,"title":"Free Trial","required":0,"type":"binary","templateId":130,"value":"N/A","options":{"values":null,"defaults":null}}],"concurentProducts":[{"id":3677,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/cyberbit_logo.png","logo":true,"scheme":false,"title":"Cyberbit Range","vendorVerified":1,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cyberbit-range","companyTitle":"Cyberbit","companyTypes":["supplier","vendor"],"companyId":5133,"companyAlias":"cyberbit","description":"<span style=\"font-weight: bold;\">Security Teams are not Ready</span>\r\nEventually, your organization will be attacked. When this happens, your SOC team’s skillsets, including playbook knowledge, detection and investigation skills, teamwork and communication skills, and security tool operation, will be put to the test. However, conventional training courses do not prepare incident response teams for the intense experience of a cyberattack. SOC teams are unprepared and overwhelmed.<br /><br /><span style=\"font-weight: bold;\">Cyberbit Range: Simulating the Cyberattack Experience</span>\r\nCyberbit Range was created to address this critical gap. It introduces a new training approach by providing a hyper-realistic, virtual SOC environment, where your team can train in responding to real-world, simulated cyberattacks and dramatically improve their skills.<br /><br /><span style=\"font-weight: bold;\">Instant, Cloud-Based Training</span>\r\nYour SOC team’s time is precious. Their training needs to be accessible, so they can train before or after their shift without leaving the office. By training with Cyberbit Cloud Range, your team can log in anytime, anywhere, and start a simulated training session within minutes, either individually, or as a team.<br /><br /><span style=\"font-weight: bold;\">Cyber Range Simulated Training</span>\r\n<ul><li>Train Groups or Individuals</li></ul>\r\n<ul><li>Train Blue or Red Teams</li></ul>\r\n<ul><li>Train any Role From Tier-1 Analysts to Executives</li></ul>\r\n<ul><li>Guided or Independent Training with Automated Assessment</li></ul>\r\n<ul><li>Entry-Level to Complex Scenarios</li></ul>\r\n<ul><li>Cloud Based Access - Anytime, Anywhere</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Hyper Realistic Simulated Training </span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Real-World Network</span></span>\r\nA comprehensive virtualized network that includes application servers, database servers, email servers, switches, routers, and a simulated internet segment.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Real-World Security Tools</span></span>\r\nTrain your teams in a virtual SOC using market-leading security products: commercial SIEMs, firewalls, endpoint security systems and analysis tools, so your trainees can practice using the same tools they would use in real-life.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Real-World Simulated Attacks</span></span>\r\nChoose from an extensive catalog of simulated training scenarios, from entry-level to advanced, multi-stage attacks. Train individuals or teams, from tier-1 analysts to SOC managers and red teams. Attacks are simulated by an automated attack generator, running scenarios crafted by training experts, which means that SOC teams can train in elaborate attacks without the involvement of a red team. Cyberbit’s training scenarios are designed for multiple roles and aligned with NICE Cybersecurity Framework KSA’s.<br /><br /><br /><br /><br />","shortDescription":"Cyberbit Range is the most widely deployed Cyber Security Training and simulation platform","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cyberbit Range","keywords":"","description":"<span style=\"font-weight: bold;\">Security Teams are not Ready</span>\r\nEventually, your organization will be attacked. When this happens, your SOC team’s skillsets, including playbook knowledge, detection and investigation skills, teamwork and communication ski","og:title":"Cyberbit Range","og:description":"<span style=\"font-weight: bold;\">Security Teams are not Ready</span>\r\nEventually, your organization will be attacked. When this happens, your SOC team’s skillsets, including playbook knowledge, detection and investigation skills, teamwork and communication ski","og:image":"https://old.roi4cio.com/fileadmin/user_upload/cyberbit_logo.png"},"eventUrl":"","translationId":3678,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5894,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg","logo":true,"scheme":false,"title":"CybeReady Blast","vendorVerified":0,"rating":"1.00","implementationsCount":4,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybeready-blast","companyTitle":"CybeReady","companyTypes":["supplier","vendor"],"companyId":4066,"companyAlias":"cybeready","description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in many subsequent ones. The number of attacks that were launched or implemented using phishing is nothing to call, big names and grandiose amounts of losses. If you add fines for this to the loss of user data, these amounts often grow at times.</p>\r\n<p><span style=\"font-weight: bold;\">5 Reasons Your Security Awareness Program Needs Continuous Learning</span></p>\r\n<ul>\r\n<li>Because security awareness education is not a fire drill.</li>\r\n<li>Because the threat landscape is always changing.</li>\r\n<li>Because it’s the only way to truly assess how much your end-users are learning.</li>\r\n<li>Because people learn at different rates.</li>\r\n<li>Because you will learn what works and what doesn’t.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Complete Workforce Training</span></p>\r\n<p>Autonomus training platform continuously trains 100% of employees every month, year-round, using proven methodology and localized, customized content.</p>\r\n<p><span style=\"font-weight: bold;\">Advanced Automation</span></p>\r\n<p>Machine Learning-powered training selects and adjusts training to each employee, including adaptive difficulty level and frequency of training.</p>\r\n<p><span style=\"font-weight: bold;\">Just in Time (JIT) Learning</span></p>\r\n<p>Phishing simulations and short learning sessions in one integrative experience ensure learning ‘in the golden moment’ and eliminate friction with employees.</p>\r\n<p><span style=\"font-weight: bold;\">Guarantees Results</span></p>\r\n<p>Significant change in employee behavior towards cyber attacks: 83% reduction in Serial Clickers, 403% increase in employee resilience score.</p>\r\n<p><span style=\"font-weight: bold;\">Effortless</span></p>\r\n<p>Cybeready’s fully managed solution ensures results yet eliminates IT effort, so you can dedicate valuable resources to other, more challenging tasks.</p>","shortDescription":"The CybeReady’s award-winning solution guarantees to change employee behavior towards phishing attacks while eliminating IT overhead and reducing the total cost of ownership (TCO).","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CybeReady Blast","keywords":"","description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in ","og:title":"CybeReady Blast","og:description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},"eventUrl":"","translationId":5895,"dealDetails":{"avgPartnerDiscount":15,"dealProtection":1,"avgDealSize":15000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"It is necessary to send to the vendor data of 2 client administrators\r\nAsaf Goldberg | Director of Sales | asaf@cybeready.com","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5896,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png","logo":true,"scheme":false,"title":"KnowBe4 Enterprise Security Awareness Training","vendorVerified":0,"rating":"1.00","implementationsCount":9,"suppliersCount":0,"supplierPartnersCount":1,"alias":"knowbe4-enterprise-security-awareness-training","companyTitle":"KnowBe4","companyTypes":["supplier","vendor"],"companyId":5482,"companyAlias":"knowbe4","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks.</p>\r\n<p>SaaS subscription is priced per seat, per year. Offer Silver, Gold, Platinum or Diamond levels to meet your organization’s needs, comprised of three levels of training access and increasingly powerful features.</p>\r\n<ul>\r\n<li>The world's largest library of well over 1000+ security awareness training content items; including interactive modules, videos, games, posters and newsletters - with the Diamond level you get frequent, new fresh content.</li>\r\n<li>Translated phishing and training content in 30+ languages across phishing and training content, with support for localized learner experience in select languages.</li>\r\n<li>On-demand, engaging, interactive browser-based training.</li>\r\n<li>Brandable Content feature enables you to add branded custom content to the beginning and end of select KnowBe4 training modules.</li>\r\n<li>The learner experience offers optional gamification, with leaderboards and badges, to incentivize and motivate users to take their assigned training.</li>\r\n<li>Localized training interface option for your users! Currently available in 20+ local languages, your users can choose the language they are most comfortable with, helping deliver a more immersive training experience.</li>\r\n<li>Create multiple training campaigns as ongoing or with a completion date.</li>\r\n<li>Assessments help you identify users that have a higher proficiency in security in not only knowing the right thing to do but also actually doing the right thing as part of the security culture you’re trying to achieve in your organization.</li>\r\n<li>Automate enrollment and follow-up emails to “nudge” users.</li>\r\n<li>Allows you to create an effective “Human Firewall”.</li>\r\n<li>Hosted in our Cloud LMS, run the course in your own Learning Management System, or delivered as a Managed Service.</li>\r\n<li>Hints & Tips Security Awareness emails for compliance.</li>\r\n<li>Point-of-failure training auto-enrollment.</li>\r\n<li>Within one account, you can have multiple allowed domains (e.g. com, net, .org) and users can sign up with any of the domains associated to an account.</li>\r\n<li>Industry's largest full-time content development staff: 40+ people.</li>\r\n<li>Visible training results: Phish-prone percentage™ for whole organization graphed over time in your console for reporting.</li>\r\n<li>Enhanced Training Campaigns with \"\"relative enrollment duration\"\" feature.</li>\r\n<li>Certificate printing where users can view/download/print their own certificates after completing a course.</li>\r\n<li>Automatic SCORM delivery via console if you use your own LMS.</li>\r\n<li>Upload Your Own Content! You now have the option to upload your own SCORM-compliant training and video content in any language you choose, directly into your KnowBe4 account - at no extra cost!</li>\r\n<li>Extend training deadlines for overdue users.</li>\r\n</ul>","shortDescription":"KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"KnowBe4 Enterprise Security Awareness Training","keywords":"","description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:title":"KnowBe4 Enterprise Security Awareness Training","og:description":"<p>KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. More than 30,000 organizations worldwide are using it. You now have a way to better manage the urgent IT security problems of social engineerin","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Knowbe4_logo.png"},"eventUrl":"","translationId":5901,"dealDetails":{"avgPartnerDiscount":20,"dealProtection":1,"avgDealSize":13250,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Запросить демо \r\nhttps://info.knowbe4.com/kmsat-request-a-demo?hsCtaTracking=2af0f76d-67ca-4454-9896-5cb1da9b1f50%7C4c51c8e1-c8fb-4d68-9e13-dcfc91b72fbc","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5907,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Proofpoint.png","logo":true,"scheme":false,"title":"Proofpoint ThreatSim","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"proofpoint-threatsim","companyTitle":"Proofpoint","companyTypes":["vendor"],"companyId":2817,"companyAlias":"proofpoint","description":"<p>To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our <span style=\"font-weight: bold;\">ThreatSim®</span> Phishing Simulations help you assess users’ susceptibility to phishing and spear-phishing attacks, with email templates based on real phishing lures spotted “in the wild” by Proofpoint threat intelligence. We also offer CyberStrength® Knowledge Assessments, a powerful web-based tool that helps you measure users’ understanding of critical cybersecurity topics and track progress over time, driving continuous improvement.</p>\r\n<p><span style=\"font-weight: bold;\">ThreatSim®</span> tests your organization’s susceptibility to a variety of phishing and spear-phishing attacks. Unlike other phishing simulation tools, we provide Dynamic Threat Simulation phishing templates based on current lures spotted “in the wild” by Proofpoint’s industry-leading threat intelligence.</p>\r\n<p>With thousands of different phishing templates across 35+ languages and 13 categories—and more added each month — you can evaluate users on multiple threat types, including:</p>\r\n<ul>\r\n<li>Malicious attachments</li>\r\n<li>Embedded links</li>\r\n<li>Requests for personal data</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Wide Variety of Customizable Templates</span></p>\r\n<p>The ThreatSim phishing tool supports more than thousands of templates across more than 35 languages. Our variety of templates address three key testing factors: embedded links, requests for personal data, and attachment downloads (.pdf, .doc, .docx, .xlsx, and .html). Average failure rates calculated from assessments sent by all customers for each template are visible within the phishing tool, which allows administrators to gauge difficulty prior to campaign creation.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamic Threat Simulation</span></p>\r\n<p>Using real, “in-the-wild,” threat intelligence data from our Targeted Attack Protection, we deliver new ThreatSim phishing templates to help create simulated attacks that will challenge the user’s ability to respond to the most relevant threats. Administrators can customize the content in any template, or create their own. This flexibility allows organizations to quickly and easily create timely phishing tests that mimic threats seen in the wild and within their own networks.</p>\r\n<p><span style=\"font-weight: bold;\">Teachable Moments</span></p>\r\n<p>We strongly suggest that all employees who fall for a ThreatSim Phishing Simulation be automatically presented with an “intervention message” (which we like to call a Teachable Moment). By utilizing “just-in-time teaching” at the moment an employee interacts with a mock phishing email, Teachable Moments explain what happened, outline the dangers associated with real attacks, and give practical advice about avoiding future traps.<br />We offer several formats — including static and animated landing pages, short videos, and interactive challenges — for our Teachable Moments and allow you to tailor the message as you see fit. A selection of static landing pages is available in 17 languages, which allows your global employees to view key messages in their native languages. You can also opt to route clicks to your own internal messaging.</p>\r\n<p><span style=\"font-weight: bold;\">Auto-Enrollment</span></p>\r\n<p>We were the first-to-market with this time-saving and behavior changing feature that allows you to automatically assign follow-up training to anyone who falls for a ThreatSim Phishing Simulation. While you can still assign training to everyone, Auto-Enrollment allows you to quickly deliver targeted training to your most susceptible end users first. This approach can dramatically improve the efficiency of your program and engage those who need the most attention.</p>\r\n<p><span style=\"font-weight: bold;\">Multinational Support</span></p>\r\n<p>Multinational support allows administrators to deliver simulated attacks and Teachable Moments in dozens if languages which means you can assess your global employees in their native language.</p>\r\n<p><span style=\"font-weight: bold;\">PhishAlarm and PhishAlarm Analyzer</span></p>\r\n<p>Our PhishAlarm one-click email reporting tool is available to install at no cost. This email client add-in allows employees to report suspicious messages to your security and incident response teams with a single mouse click. We recommend adding our PhishAlarm Analyzer anti-phishing email analysis tool, which utilizes machine learning to prioritize emails reported via PhishAlarm and enables faster remediation of the most dangerous threats on your network.</p>\r\n<p><span style=\"font-weight: bold;\">System Click Exclusion</span></p>\r\n<p>System Click Exclusion is a feature built into ThreatSim that identifies and isolates phishing simulation interactions initiated by email protection tools. This patented approach ensures an accurate view of risky end user behaviors and enables productive and efficient security education programs.</p>\r\n<p><span style=\"font-weight: bold;\">What does this provide?</span></p>\r\n<ul>\r\n<li>Accuracy - A mechanism to ensure an accurate view of end user interactions (versus clicks from email gateways) in phishing simulations</li>\r\n<li>Intuitive UI - An easy-to-use interface for creating System Click Exclusion rules for multiple system interactions based upon IP address or user agent</li>\r\n<li>Reporting - Easily identify the interactions from systems instead of users to validate that all interactions are being captured</li>\r\n<li>Integration with TAP - A seamless experience for Targeted Attack Protection (TAP) customers because the customer’s email protection tool clicks are already systemically whitelisted through existing integration between the ThreatSim product and TAP</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Random Scheduling</span></p>\r\n<p>This option allows you to spread out the distribution of phishing simulations to minimize the impact to your email servers and IT helpdesk. Paired with the ability to use multiple simulated attack templates in a single assessment campaign, these functions reduce the chances that employees will figure out – and discuss – the phishing test, which helps provide the purest test of end-user susceptibility.</p>\r\n<p><span style=\"font-weight: bold;\">Valuable Business Intelligence</span></p>\r\n<p>ThreatSim provides extensive analytics and reporting about employee responses to various phishing attack scenarios. You’ll also know whether employees fell for an attack through a mobile phone, a tablet, or a computer; the browsers they were using; and their locations when they fell for the attack.</p>\r\n<p><span style=\"font-weight: bold;\">Weak Network Egress and Vulnerability Checks</span></p>\r\n<p>ThreatSim offers an optional Weak Network Egress function, which can help detect data egress from users’ PCs and, as a result, allow security personnel to identify and modify security controls to reduce potential threats. Administrators can also check for browser vulnerabilities with the capability to flag out-of-date (and potentially vulnerable) third-party plug-ins on end-user PCs.</p>","shortDescription":"Engage your end-users and arm them against real-world cyber attacks, using personalized cybersecurity training based on industry-leading threat intelligence.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Proofpoint ThreatSim","keywords":"","description":"<p>To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our <span style=\"font-weight: bold;\">ThreatSim®</span> Phishing Simulations help you","og:title":"Proofpoint ThreatSim","og:description":"<p>To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our <span style=\"font-weight: bold;\">ThreatSim®</span> Phishing Simulations help you","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Proofpoint.png"},"eventUrl":"","translationId":5908,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":0,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1174,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg","logo":true,"scheme":false,"title":"CybeReady","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cybeready","companyTitle":"CybeReady","companyTypes":["supplier","vendor"],"companyId":4066,"companyAlias":"cybeready","description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to your employees on an ongoing basis. Employees’ reactions are tested using various methods and levels of deception.\r\nPhishing Readiness\r\nIt’s not how much effort you’ve put into training employees, how fast your servers are or how up-to-date your software may be. Cyber security awareness programs often fail because readiness is what matters most. Most organizations invest heavily in awareness programs that encourage employees to excel on tests and to keep security best practices in mind. Yet as readiness is skill-dependent and not awareness-dependent, most of these programs ultimately lead to high levels of awareness and regrettably low levels of performance. When it comes to phishing readiness, the true measurement is hindsight: did you know what to do, and did you react accordingly?\r\nInstant Deployment\r\nWe know that timing and context are of the essence. CybeReady’s training programs are fully customizable and ready for technical testing. Within 48 hours of a purchase order, your branded content and simulation suggestions will be ready for use. We deliver programs in your native language that are customized to fit the specific context of your industry and the regions in which your company operates. Once your program has launched, you’ll receive weekly ‘Readiness Reports’ that contain information on the automated operation and performance of your training programs, along with suggestions from our team.\r\nSmart Learning \r\nYou can only be assured of employees’ readiness with the most rigorous behavioral training, and that requires fully customized content–not templates. CybeReady specializes in highly convincing phishing attacks at varying levels of difficulty–from sector-specific, tailor-made messages to department and position-specific messages, to customer-branded, simulation-specific content that is linguistically and culturally adapted to your needs. With such realistic scenarios, you’ll be well equipped to prepare your employees for any hacker’s diverse approaches to phishing.","shortDescription":"Cyber Readiness: The state of being prepared to handle unexpected cyber events. Cyber readiness is achieved when people are adept at thwarting or minimizing the effect of an unexpected cyber attack.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":1,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CybeReady","keywords":"your, that, programs, training, readiness, levels, phishing, employees","description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to yo","og:title":"CybeReady","og:description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to yo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CybeReady.jpg"},"eventUrl":"","translationId":1175,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5904,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cofense_Logo.png","logo":true,"scheme":false,"title":"Cofense PhishMe","vendorVerified":0,"rating":"2.00","implementationsCount":17,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cofense-phishme","companyTitle":"Cofense","companyTypes":["supplier","vendor"],"companyId":5373,"companyAlias":"cofense","description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line of defense. Will they fall for a phish or report it? Cofense PhishMeTM educates them on the real attacks your company faces, transforming vulnerable targets into active defenders.</p>\r\n<p><span style=\"font-weight: bold;\">YOUR PROBLEM</span></p>\r\n<p>No matter how good your perimeter security, phishing emails still reach users and threaten to trigger breaches. The Cofense Phishing Defense CenterTM finds that 90% of user-reported emails are in environments using secure email gateways (SEGs). Every phishing email that reaches the user is an attack on your organization. When technology fails, users need to become human sensors and report phishing, so the SOC can remediate the threat. But how can users report if they don’t recognize today’s evolving attacks?</p>\r\n<p><span style=\"font-weight: bold;\">OUR SOLUTION</span></p>\r\n<p>Teach users to identify (real) phish. Cofense PhishMe educates users on the real phishing tactics your company faces. We leverage extensive research, threat intelligence, and front-line phishing defense resources that other providers lack. We believe that real phish are the real problem. Through experiential learning—simulations of current phishing threats — you’ll condition smarter email behavior, transforming vulnerable targets into an essential layer of defense.</p>\r\n<p><span style=\"font-weight: bold;\">Click Only:</span> A phishing email that urges the recipient to click on an embedded link.</p>\r\n<p><span style=\"font-weight: bold;\">Data Entry:</span> A phishing email with a link to a customized landing page that entices users to enter sensitive information.</p>\r\n<p><span style=\"font-weight: bold;\">Attachment-based:</span> A phishing email with seemingly legitimate attachments in a variety of file formats.</p>\r\n<p><span style=\"font-weight: bold;\">Double Barrel:</span> Patented technology that simulates conversational phishing techniques by sending two emails – one benign and one containing a malicious element – to train users on this tactic used by APT groups.<br />Benchmarking: A patented feature to conduct an identical scenario and receive an additional report that provides an anonymous comparison of your results with other Cofense customers or industry peers that ran the same scenario.</p>\r\n<p><span style=\"font-weight: bold;\">Highly Personalized:</span> Simulate advanced social engineering tactics by using specific public, known details about email recipients gathered from internal and public sources.</p>","shortDescription":"Cofense PhishMe simulates active phishing threats to condition smarter user behavior.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cofense PhishMe","keywords":"","description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line","og:title":"Cofense PhishMe","og:description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cofense_Logo.png"},"eventUrl":"","translationId":5906,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":12000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"Request demo: https://go.cofense.com/live-demo/","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1906,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/barracuda_logo.png","logo":true,"scheme":false,"title":"Barracuda PhishLine","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":3,"alias":"barracuda-phishline","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees into a layer of defense with Barracuda PhishLine.</p>\r\n<p>With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.</p>\r\n<p>Only PhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.</p>\r\n<p>Barracuda PhishLine trains users to understand and respond correctly to the latest phishing techniques, recognize subtle phishing clues, and prevent email fraud, data loss, and brand damage. It transforms employees into a powerful line of defense against damaging phishing attacks.</p>\r\n<p>This versatile, scalable, cloud-hosted SaaS solution includes hundreds of email and landing-pages templates, updated based on threat trends. Levelized training and gamification make it more effective by engaging employees.</p>\r\n<p><span style=\"font-weight: bold;\">Phishing Training</span></p>\r\n<p>Barracuda PhishLine uses advanced, automated education technology that includes simulation-based training, continuous testing, powerful reporting for administrators, and active incident response awareness.</p>\r\n<p><span style=\"font-weight: bold;\">Phishing Simulation</span></p>\r\n<p>Simulated phishing attacks are constantly updated to reflect the most recent and most common threats. Simulations are not limited to email, but also include voice, SMS, and portable-media (USB stick) attacks. Templates let you customize simulations.</p>\r\n<p><span style=\"font-weight: bold;\">Phishing Reporting</span></p>\r\n<p>Barracuda Phishline provides advanced analytics and reporting tools that enable you to identify how effective your training is and how users react to actual phishing attacks that may slip through other defenses.</p>\r\n<p><span style=\"font-weight: bold;\">Patented Simulations</span></p>\r\n<p>PhishLine's patented attack simulations train your employees to spot email threats that can compromise data and result in financial and reputational loss. A/B tests prevent users from receiving duplicate simulations.</p>\r\n<p><span style=\"font-weight: bold;\">Total Email Protection Portfolio</span></p>\r\n<p>PhishLine is part of Barracuda’s Total Email Protection portfolio, delivering truly comprehensive email security.</p>\r\n<p><span style=\"font-weight: bold;\">Curated Content</span></p>\r\n<p>PhishLine Content Center Marketplace™ provides dozens of simulation templates, landing pages, risk-assessment surveys, and other training content. New, customizable content is added daily, to reflect current threat trends.</p>\r\n<p><span style=\"font-weight: bold;\">Gamification</span></p>\r\n<p>PhishLine boosts user engagement with gamification. Videos, infographics, newsletters, and other materials supplement core training.</p>\r\n<p><span style=\"font-weight: bold;\">Levelized Programs</span></p>\r\n<p>As employees progress through their training program, the content constantly changes, challenging them to continuously improve their phishing detection and reporting skills.</p>\r\n<p><span style=\"font-weight: bold;\">PhishLine Concierge Service (Optional)</span></p>\r\n<p>PhishLine Concierge is an optional service that offloads the complex tasks of defining, configuring, executing, and analyzing your simulation campaigns to a dedicated consultant, to minimize your resource overhead.</p>","shortDescription":"Barracuda PhishLine - Fight phishing with continuous simulation and training\r\nTrain employees to understand the latest attack techniques, recognize subtle clues, and help stop email fraud, data loss","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":9,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda PhishLine","keywords":"","description":"<p>Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing expo","og:title":"Barracuda PhishLine","og:description":"<p>Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing expo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/barracuda_logo.png"},"eventUrl":"","translationId":1907,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":27240,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":130,"title":"Cyber Security Training and Simulation"}],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[{"id":70,"title":"IT Security and Risk Management"},{"id":64,"title":"Chief IT Security Officer"},{"id":60,"title":"Chief Information Officer"}],"organizationalFeatures":["ISO 27001 Compliance","GDPR Compliance","IT Security Department in company","Web-based customer portal","Company branches in different countries"],"complementaryCategories":[],"solutions":["Risk of attacks by hackers","Decentralized IT systems","No IT security guidelines","Risk or Leaks of confidential information","Shortage of inhouse IT resources","High costs of IT personnel","Risk of data loss or damage"],"materials":[{"id":2259,"title":"","description":"DCOYA Behave","uri":"https://dcoya.com/dcoya-behave/"}],"useCases":[{"id":792,"title":"HYPER-PERSONAL CYBERSECURITY APPROACH","description":"One-size-fits-all security training programs have not succeeded in instilling cyber hygiene in most organizations. To thwart social engineering threats, every single employee needs to be informed and engaged in the fight. That’s why Dcoya makes cybersecurity hyper-personal.\r\nDcoya security programs factor in employee diversity, behavioral psychology, and marketing methodologies to make sure your message gets across and every employee is able to practice and perfect the right cybersecurity behaviors. They learn by doing. With Dcoya, the expertise and automation is built-in, so you don’t have to worry about acquiring new skills in domains like Behavioral Psychology, or devoting precious time and resources to new training programs.\r\nMost importantly, Dcoya does what other security awareness tools fail to do. Our learning methods target the relevant emotion and response centers of the brain, nurturing the cognitive behaviors we all need to resist the enticements of devious and evolving social engineering threats.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">AUTOMATION, AUTOMATION, AUTOMATION</span></span>\r\nDcoya packs its personal cybersecurity programs into a single platform that is fully automated, centrally managed, and operational out-of-the-box. Dcoya automates every step of your behavior-centric security program, from determining the diversity and awareness profile of each employee, to the creation of personal training programs, to real-time reporting. Automation is fueled by Dcoya machine learning and algorithms that learn from employee experiences and know how to bolster strengths and address shortcomings to help employees succeed. The result is a streamlined security organization that operates more efficiently and successfully to protect your business from social engineering threats.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">MACHINE LEARNING, BEST PRACTICES BUILT IN</span></span>\r\n<ul><li>Machine learning (ML) enables full automation of assessment and training processes</li><li>Training is based on behavioral psychology models that trigger relevant areas of the brain</li><li>Algorithms apply best practices in behavioral psychology and marketing methodologies automatically</li><li>Intelligent analysis, validation, prioritization and resolution of employee-reported social engineering attacks</li></ul>","imageURL":"https://old.roi4cio.com/fileadmin/user_upload/Dcoya_Logo.png"}],"best_practices":[],"values":["Manage Risks","Ensure Security and Business Continuity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"130":{"id":130,"title":"Cyber Security Training and Simulation"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}