Engage your end users and arm them against real-world cyber attacks, using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Our SaaS-based solutions and Continuous Training Methodology were developed by Wombat Security Technologies (acquired in March 2018) and born from research at the world-renowned Carnegie Mellon University. Using them, customers have reduced successful phishing attacks and malware infections by up to 90%.
Features and Benefits
Assess Users With Real-World Lures
To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our ThreatSim® Phishing Simulations help you assess users’ susceptibility to phishing and spear-phishing attacks, with email templates based on real phishing lures spotted “in the wild” by Proofpoint threat intelligence. We also offer CyberStrength® Knowledge Assessments, a powerful web-based tool that helps you measure users’ understanding of critical cybersecurity topics and track progress over time, driving continuous improvement.
Train Your Last Line of Defense
Effective security awareness training turns your end users into a strong last line of defense against cyber attacks. To engage users and keep security top-of-mind, we offer a growing, continuously updated library of interactive training modules, videos, posters, images, and articles—all with consistent, actionable messaging suitable for global organizations. Our customizable education content covers a broad range of security risks, from phishing attacks to insider threats, and is available in 35+ languages. We also make it easy to alert your users to the most relevant phishing attacks and lures through our Attack Spotlight series—brief, timely content that teaches how to spot a current threat and avoid becoming a victim.
Stop Active Phishing Attacks
Knowledgeable users are key to identifying — and stopping — phishing attacks that slip through perimeter technology. Our PhishAlarm® button lets your users report suspicious messages with a single mouse click. A companion tool, PhishAlarm® Analyzer prioritizes reported phishing emails and improves incident response, reducing the window of risk associated with active phishing attacks. Both tools are integral to Proofpoint CLEAR (Closed-Loop Email Analysis and Response). This solution streamlines both end-user reporting and remediation tasks, reducing the time needed to neutralize an active threat from hours to minutes.
Measure Results, Share Insights
Our robust reporting tools help you identify areas of susceptibility, share results with stakeholders, and deliver targeted training when and where it’s most needed. We offer responsive, easy-to-read reporting with a modern UI that makes it easy to benchmark, track, and trend user knowledge; evaluate progress; and gauge ROI. You can download and export data in several formats, and use the Automated Reporting feature to schedule automatic delivery of reports at regular intervals to yourself and others within your organization.
Consistent training for global organizations, translated and localized into 35+ languages.
Builds on existing infrastructure, from your LMS and email clients to perimeter defenses.
Easy-to-use, purpose-built interface for efficient program management and monitoring.
Maximizes learning and retention through cyclical assessment, education, reinforcement, and measurement.
Training modules conform to the US Section 508 standard and WCAG 2.0 AA standard.
Syncs with Microsoft Active Directory and Azure, automating user and group management tasks.