{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"en":"User","ru":"Пользователь","_type":"localeString"},"partnership-vendors":{"_type":"localeString","en":"Partnership with vendors","ru":"Партнерство с производителями"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"_type":"localeString","en":"Partner status","ru":"Статус партнёра"},"country":{"en":"Country","ru":"Страна","_type":"localeString"},"partner-types":{"en":"Partner types","ru":"Типы партнеров","_type":"localeString"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"_type":"localeString","en":"number of employees","ru":"количество сотрудников"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"en":"Certification of technical specialists","ru":"Сертификация технических специалистов","_type":"localeString"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"en":"All countries","ru":"Все страны","_type":"localeString"},"supplied-products":{"en":"Supplied products","ru":"Поставляемые продукты","_type":"localeString"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString"},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"keepnet-labs":{"id":5480,"title":"Keepnet Labs","logoURL":"https://old.roi4cio.com/uploads/roi/company/keepnet.jpg","alias":"keepnet-labs","address":"","roles":[{"id":2,"type":"supplier"},{"id":3,"type":"vendor"}],"description":"<p data-start=\"0\" data-end=\"62\"><strong data-start=\"0\" data-end=\"60\">Keepnet's Extended Human Risk Management (xHRM) Platform</strong></p>\r\n<p data-start=\"64\" data-end=\"757\">Keepnet’s <strong data-start=\"74\" data-end=\"210\"><a href=\"https://keepnetlabs.com/blog/5-key-strategies-for-effective-human-risk-management-in-the-workplace\" target=\"_new\" data-start=\"76\" data-end=\"208\">Extended Human Risk Management</a></strong> (xHRM) platform is a robust cybersecurity solution designed to tackle the human element in corporate security. Given that human error contributes to a significant percentage of security breaches, Keepnet leverages cutting-edge technology and behavioral science to minimize risks from <strong data-start=\"495\" data-end=\"602\"><a href=\"https://keepnetlabs.com/blog/what-is-spear-phishing-and-how-to-prevent-it\" target=\"_new\" data-start=\"497\" data-end=\"600\">social engineering attacks</a></strong>, <strong data-start=\"604\" data-end=\"717\"><a href=\"https://keepnetlabs.com/blog/the-role-of-human-error-in-successful-cyber-security-breaches\" target=\"_new\" data-start=\"606\" data-end=\"715\">insider threats</a></strong>, and employee-driven vulnerabilities.</p>\r\n<p><strong data-start=\"762\" data-end=\"797\">AI-Powered Phishing Simulations</strong></p>\r\n<p data-start=\"801\" data-end=\"1779\">The platform provides a comprehensive <strong data-start=\"839\" data-end=\"916\"><a href=\"https://keepnetlabs.com/products/phishing-simulator\" target=\"_new\" data-start=\"841\" data-end=\"914\">Phishing Simulator</a></strong> that replicates real-world attack tactics, including <strong data-start=\"970\" data-end=\"1048\"><a href=\"https://keepnetlabs.com/blog/email-incident-response-101\" target=\"_new\" data-start=\"972\" data-end=\"1046\">email phishing</a></strong>, <strong data-start=\"1050\" data-end=\"1138\"><a href=\"https://keepnetlabs.com/products/smishing-simulator\" target=\"_new\" data-start=\"1052\" data-end=\"1136\">SMS-based phishing (smishing)</a></strong>, <strong data-start=\"1140\" data-end=\"1212\"><a href=\"https://keepnetlabs.com/products/vishing\" target=\"_new\" data-start=\"1142\" data-end=\"1210\">voice phishing (vishing)</a></strong>, <strong data-start=\"1214\" data-end=\"1300\"><a href=\"https://keepnetlabs.com/products/quishing-simulator\" target=\"_new\" data-start=\"1216\" data-end=\"1298\">QR code phishing (quishing)</a></strong>, <strong data-start=\"1302\" data-end=\"1422\"><a href=\"https://keepnetlabs.com/blog/guarding-the-gates-how-mfa-phishing-simulations-reinforce-digital-walls\" target=\"_new\" data-start=\"1304\" data-end=\"1420\">MFA phishing</a></strong>, and <strong data-start=\"1428\" data-end=\"1503\"><a href=\"https://keepnetlabs.com/products/callback-phishing\" target=\"_new\" data-start=\"1430\" data-end=\"1501\">callback phishing</a></strong>. These simulations enhance employees' ability to recognize and handle phishing threats, reducing overall risk exposure. The platform continuously evaluates human behavior, adapting training to align with evolving cyber threats, ensuring optimal relevance and effectiveness.</p>\r\n<p><strong data-start=\"1784\" data-end=\"1814\">Adaptive Security Training</strong></p>\r\n<p data-start=\"1818\" data-end=\"2537\">Keepnet delivers <strong data-start=\"1835\" data-end=\"1945\"><a href=\"https://keepnetlabs.com/blog/cyber-security-awareness-training-for-employees\" target=\"_new\" data-start=\"1837\" data-end=\"1943\">adaptive security training</a></strong> tailored to individual employees based on their roles, risk levels, and cognitive tendencies. This <strong data-start=\"2045\" data-end=\"2131\"><a href=\"https://keepnetlabs.com/products/awareness-educator\" target=\"_new\" data-start=\"2047\" data-end=\"2129\">Security Awareness Training</a></strong> ensures each employee receives training material aligned with their vulnerabilities and responsibilities. By fostering a security-first mindset through continuous education, the platform promotes a culture of proactive defense rather than just compliance-based learning. The engaging and interactive training modules drive long-term behavioral changes, strengthening organizational security from within.</p>\r\n<p><strong data-start=\"2542\" data-end=\"2573\">Automated Phishing Response</strong></p>\r\n<p data-start=\"2577\" data-end=\"3272\">Beyond prevention, the <strong data-start=\"2600\" data-end=\"2698\"><a href=\"https://keepnetlabs.com/blog/discovering-keepnet-labs-data-breaches-solutions\" target=\"_new\" data-start=\"2602\" data-end=\"2696\">xHRM platform</a></strong> prioritizes swift and effective <strong data-start=\"2731\" data-end=\"2807\"><a href=\"https://keepnetlabs.com/products/incident-responder\" target=\"_new\" data-start=\"2733\" data-end=\"2805\">phishing response</a></strong>. Employees can instantly report suspicious activities, prompting AI-driven analysis and automated threat mitigation. This automation enables security teams to neutralize threats <strong data-start=\"2986\" data-end=\"3006\">168 times faster</strong> than traditional methods, significantly narrowing the window of opportunity for cybercriminals. By streamlining phishing analysis and response, the platform relieves <strong data-start=\"3173\" data-end=\"3211\">Security Operations Centers (SOCs)</strong> of excessive manual workloads while increasing efficiency.</p>\r\n<p><strong data-start=\"3277\" data-end=\"3341\">Seamless Integration of Human, Technology, and Collaboration</strong></p>\r\n<p data-start=\"3345\" data-end=\"3930\">What sets Keepnet apart is its <strong data-start=\"3376\" data-end=\"3397\">holistic approach</strong> to cybersecurity, combining human intelligence, technology, and collaborative defense strategies. Its <strong data-start=\"3500\" data-end=\"3579\"><a href=\"https://keepnetlabs.com/products/threat-intelligence\" target=\"_new\" data-start=\"3502\" data-end=\"3577\">Threat Intelligence</a></strong> and <strong data-start=\"3584\" data-end=\"3653\"><a href=\"https://keepnetlabs.com/products/threat-sharing\" target=\"_new\" data-start=\"3586\" data-end=\"3651\">Threat Sharing</a></strong> solutions facilitate secure information exchange between trusted organizations, strengthening collective cyber defenses. This ensures that businesses are not left isolated in their security strategies but become part of a unified network working together to prevent attacks.</p>\r\n<p><strong data-start=\"3935\" data-end=\"3967\">Exclusive Security Solutions</strong></p>\r\n<p data-start=\"3971\" data-end=\"4193\">The <strong data-start=\"3975\" data-end=\"4097\"><a href=\"https://keepnetlabs.com/blog/5-key-strategies-for-effective-human-risk-management-in-the-workplace\" target=\"_new\" data-start=\"3977\" data-end=\"4095\">Keepnet platform</a></strong> includes innovative tools that provide a comprehensive approach to <strong data-start=\"4165\" data-end=\"4190\">human risk management</strong>:</p>\r\n<ul data-start=\"4195\" data-end=\"5148\">\r\n<li data-start=\"4195\" data-end=\"4386\"><strong data-start=\"4197\" data-end=\"4262\"><a href=\"https://keepnetlabs.com/products/vishing\" target=\"_new\" data-start=\"4199\" data-end=\"4260\">Vishing Simulator</a></strong> – Trains employees to detect and react to <strong data-start=\"4305\" data-end=\"4329\">voice-based phishing</strong> attacks, a growing method for stealing sensitive data.</li>\r\n<li data-start=\"4387\" data-end=\"4556\"><strong data-start=\"4389\" data-end=\"4466\"><a href=\"https://keepnetlabs.com/products/smishing-simulator\" target=\"_new\" data-start=\"4391\" data-end=\"4464\">Smishing Simulator</a></strong> – Helps employees identify fraudulent <strong data-start=\"4505\" data-end=\"4521\">SMS messages</strong> designed to compromise security.</li>\r\n<li data-start=\"4557\" data-end=\"4720\"><strong data-start=\"4559\" data-end=\"4636\"><a href=\"https://keepnetlabs.com/products/quishing-simulator\" target=\"_new\" data-start=\"4561\" data-end=\"4634\">Quishing Simulator</a></strong> – Educates employees on the risks of <strong data-start=\"4674\" data-end=\"4694\">QR code phishing</strong>, a rising cyber threat.</li>\r\n<li data-start=\"4721\" data-end=\"4934\"><strong data-start=\"4723\" data-end=\"4806\"><a href=\"https://keepnetlabs.com/products/callback-phishing\" target=\"_new\" data-start=\"4725\" data-end=\"4804\">Callback Simulator (TOAD)</a></strong> – Tests employees' responses to <strong data-start=\"4839\" data-end=\"4868\">callback phishing attacks</strong>, where attackers trick victims into returning fraudulent calls.</li>\r\n<li data-start=\"4935\" data-end=\"5148\"><strong data-start=\"4937\" data-end=\"5015\"><a href=\"https://keepnetlabs.com/products/threat-sharing\" target=\"_new\" data-start=\"4939\" data-end=\"5013\">Threat Sharing Platform</a></strong> – Allows organizations to share cyber threat intelligence <strong data-start=\"5074\" data-end=\"5089\">anonymously</strong>, improving security awareness while maintaining privacy.</li>\r\n</ul>\r\n<p><strong data-start=\"5153\" data-end=\"5179\">Proven Security Impact</strong></p>\r\n<p data-start=\"5183\" data-end=\"5407\">Organizations using Keepnet's <strong data-start=\"5213\" data-end=\"5332\"><a href=\"https://keepnetlabs.com/blog/5-key-strategies-for-effective-human-risk-management-in-the-workplace\" target=\"_new\" data-start=\"5215\" data-end=\"5330\">xHRM platform</a></strong> have reported <strong data-start=\"5347\" data-end=\"5375\">substantial improvements</strong> in their security resilience:</p>\r\n<ul data-start=\"5409\" data-end=\"5901\">\r\n<li data-start=\"5409\" data-end=\"5548\"><strong data-start=\"5411\" data-end=\"5447\">90% Reduction in Risky Behaviors</strong> – Organizations have significantly reduced high-risk employee actions that could lead to breaches.</li>\r\n<li data-start=\"5549\" data-end=\"5717\"><strong data-start=\"5551\" data-end=\"5584\">168x Faster Phishing Response</strong> – AI automation has dramatically improved <strong data-start=\"5627\" data-end=\"5703\"><a href=\"https://keepnetlabs.com/products/incident-responder\" target=\"_new\" data-start=\"5629\" data-end=\"5701\">incident response</a></strong> efficiency.</li>\r\n<li data-start=\"5718\" data-end=\"5901\"><strong data-start=\"5720\" data-end=\"5745\">95% Time Optimization</strong> – Automated security training and phishing simulations have reduced time spent on manual tasks, enabling security teams to focus on strategic priorities.</li>\r\n</ul>\r\n<p><strong data-start=\"5906\" data-end=\"5932\">Client Success Stories</strong></p>\r\n<p data-start=\"5936\" data-end=\"6027\">Keepnet’s impact is reflected in <strong data-start=\"5969\" data-end=\"5999\">real-world success stories</strong> from leading enterprises:</p>\r\n<ul data-start=\"6029\" data-end=\"6662\">\r\n<li data-start=\"6029\" data-end=\"6220\"><strong data-start=\"6031\" data-end=\"6052\">Pegasus Airlines:</strong> \"By prioritizing measurable <strong data-start=\"6081\" data-end=\"6102\">behavioral change</strong> rather than compliance-based training, we cut phishing risks by <strong data-start=\"6167\" data-end=\"6174\">90%</strong> and built a <strong data-start=\"6187\" data-end=\"6216\">stronger security culture</strong>.\"</li>\r\n<li data-start=\"6221\" data-end=\"6424\"><strong data-start=\"6223\" data-end=\"6245\">Vodafone SOC Team:</strong> \"Our SOC team <strong data-start=\"6260\" data-end=\"6297\">automates phishing email response</strong>, reducing analysis time by <strong data-start=\"6325\" data-end=\"6332\">95%</strong> and boosting threat detection rates to <strong data-start=\"6372\" data-end=\"6379\">99%</strong>, thanks to <strong data-start=\"6391\" data-end=\"6420\">20+ security integrations</strong>.\"</li>\r\n<li data-start=\"6425\" data-end=\"6662\"><strong data-start=\"6427\" data-end=\"6452\">ECI Managed Services:</strong> \"The <strong data-start=\"6458\" data-end=\"6488\">self-driving and autopilot</strong> features in <strong data-start=\"6501\" data-end=\"6580\"><a href=\"https://keepnetlabs.com/products/phishing-simulator\" target=\"_new\" data-start=\"6503\" data-end=\"6578\">phishing simulations</a></strong> and security training saved us <strong data-start=\"6612\" data-end=\"6619\">95%</strong> of the time, eliminating manual stress!\"</li>\r\n</ul>\r\n<p><strong data-start=\"6667\" data-end=\"6709\">Commitment to Continuous Cyber Defense</strong></p>\r\n<p data-start=\"6713\" data-end=\"7157\">Established in <strong data-start=\"6728\" data-end=\"6736\">2017</strong>, Keepnet’s cybersecurity roots trace back to the <strong data-start=\"6786\" data-end=\"6801\">early 2000s</strong>, driven by a mission to provide continuous protection against <strong data-start=\"6864\" data-end=\"6896\">human-targeted cyber threats</strong>. By incorporating human factors into cybersecurity strategies, Keepnet empowers security teams with <strong data-start=\"6997\" data-end=\"7080\">real-time threat detection, automated responses, and adaptive security training</strong>, ensuring robust cyber resilience against <strong data-start=\"7123\" data-end=\"7154\">ever-evolving cyber threats</strong>.</p>\r\n<p data-start=\"7159\" data-end=\"7803\">In summary, <strong data-start=\"7171\" data-end=\"7300\"><a href=\"https://keepnetlabs.com/blog/5-key-strategies-for-effective-human-risk-management-in-the-workplace\" target=\"_new\" data-start=\"7173\" data-end=\"7298\">Keepnet’s xHRM platform</a></strong> provides a <strong data-start=\"7312\" data-end=\"7360\">unified, AI-driven approach to cybersecurity</strong>, addressing human factors that contribute to security breaches. Through advanced <strong data-start=\"7442\" data-end=\"7521\"><a href=\"https://keepnetlabs.com/products/phishing-simulator\" target=\"_new\" data-start=\"7444\" data-end=\"7519\">phishing simulations</a></strong>, personalized <strong data-start=\"7536\" data-end=\"7612\"><a href=\"https://keepnetlabs.com/products/awareness-educator\" target=\"_new\" data-start=\"7538\" data-end=\"7610\">security training</a></strong>, <strong data-start=\"7614\" data-end=\"7637\">automated responses</strong>, and <strong data-start=\"7643\" data-end=\"7673\">collaborative intelligence</strong>, Keepnet enables organizations to <strong data-start=\"7708\" data-end=\"7745\">build resilient security cultures</strong> and <strong data-start=\"7750\" data-end=\"7800\">mitigate human-induced cyber risks effectively</strong>.</p>","companyTypes":["supplier","vendor"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":1,"categories":{"870":{"id":870,"title":"Cyber Security Training and Simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png","alias":"cyber-security-training-and-simulation"}},"companyUrl":"https://www.keepnetlabs.com/","countryCodes":["GBR"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Keepnet Labs","keywords":"","description":"<p data-start=\"0\" data-end=\"62\"><strong data-start=\"0\" data-end=\"60\">Keepnet's Extended Human Risk Management (xHRM) Platform</strong></p>\r\n<p data-start=\"64\" data-end=\"757\">Keepnet’s <strong data-start=\"74\" data-end=\"210\"><a href=\"https://keepnetlabs.co","og:title":"Keepnet Labs","og:description":"<p data-start=\"0\" data-end=\"62\"><strong data-start=\"0\" data-end=\"60\">Keepnet's Extended Human Risk Management (xHRM) Platform</strong></p>\r\n<p data-start=\"64\" data-end=\"757\">Keepnet’s <strong data-start=\"74\" data-end=\"210\"><a href=\"https://keepnetlabs.co","og:image":"https://old.roi4cio.com/uploads/roi/company/keepnet.jpg"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}