Overview
Engage your end users and arm them against real-world cyber attacks, using personalised security awareness training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right cybersecurity awareness training to the right people at the right time.
Our SaaS-based solutions and Continuous Training Methodology were developed by Wombat Security Technologies (acquired in March 2018) and born from research at the world-renowned Carnegie Mellon University. Using them, customers have reduced successful phishing attacks and malware infections by up to 90%.
Features and Benefits
Assess Users With Real-World Lures
To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organisation. Our ThreatSim® Phishing Simulations help you assess users’ susceptibility to phishing and spear-phishing attacks, with email templates based on real phishing lures spotted “in the wild” by Proofpoint threat intelligence. We also offer CyberStrength® Knowledge Assessments, a powerful web-based security awareness tool that helps you measure users’ understanding of critical cybersecurity topics and track progress over time, driving continuous improvement.


Train Your Last Line of Defence
Effective security awareness training turns your end users into a strong last line of defence against cyber attacks. To engage users and keep security top-of-mind, we offer a growing, continuously updated library of interactive cybersecurity training modules, videos, posters, images, and articles—all with consistent, actionable messaging suitable for global organisations. Our customisable cybersecurity education content covers a broad range of security risks, from phishing attacks to insider threats, and is available in 35+ languages. We also make it easy to alert your users to the most relevant phishing attacks and lures through our Attack Spotlight series—brief, timely content that teaches how to spot a current threat and avoid becoming a victim.
Cybersecurity Training Helps Stop Active Phishing Attacks
Knowledgeable users are key to identifying — and stopping — phishing attacks that slip through perimeter technology. Our PhishAlarm® button lets your users report suspicious messages with a single mouse click. A companion tool, PhishAlarm® Analyser prioritises reported phishing emails and improves incident response, reducing the window of risk associated with active phishing attacks. Both security awareness tools are integral to Proofpoint CLEAR (Closed-Loop Email Analysis and Response). This solution streamlines both end-user reporting and remediation tasks, reducing the time needed to neutralise an active threat from hours to minutes.


Measure Results, Share Insights
Our robust reporting tools help you identify areas of susceptibility, share results with stakeholders, and deliver targeted cybersecurity awareness training when and where it’s most needed. We offer responsive, easy-to-read reporting with a modern UI that makes it easy to benchmark, track, and trend user knowledge; evaluate progress; and gauge ROI. You can download and export data in several formats, and use the Automated Reporting feature to schedule automatic delivery of reports at regular intervals to yourself and others within your organisation.
Key Features
Multinational Support
Consistent cybersecurity training for global organisations, translated and localised into 35+ languages.
Integrations
Builds on existing infrastructure, from your LMS and email clients to perimeter defences.
Admin Features
Easy-to-use, purpose-built interface for efficient program management and monitoring.
Proven Methodology
Maximises security awareness training, learning, and retention through cyclical assessment, education, reinforcement, and measurement.
Accessibility
Cybersecurity training modules conform to the US Section 508 standard and WCAG 2.0 AA standard.
End-User Sync
Syncs with Microsoft Active Directory and Azure, automating user and group management tasks.
