Our training modules are uniquely designed to?
change end user behavior
Who is the Owner (Cheif Hacker) of KnowBe4
Kevin Minidick
The Wombat AE
What does CLEAR stand for?
Closed Loop Email Analysis and Response
How many training modules do we currently offer?
44
Conceptual and procedural knowledge, immediate feedback, set the pace, training context, reinforce lessons, serve small bites make up what
Learning Science Principles
What is the length of KnowBe4's Security Awareness Training Video
What number of end users do you have to ask the pricing minimum and how what is the minimum?
100 users
$2,500-3,500
What Proofpoint products are included in the CLEAR solution?
PhishAlarm + TRAP
TAP is acceptable too
What is the cyberstrength assessment and it's benefits?
Knowledge based assessments used by an organization to determine what employees may need more training than others.
Can be used for auto enrollment
Used to help benchmark end user's knowledge overtime
Using our purpose-built tools and methodology, our customers have reduced successful phishing attacks and malware infections by up to
90%
What is KnowBe4's phishing remediation tool called?
PhishER
What is the golden rule to figuring out who to assign an opportunity to?
Account Owner Manager
Hover over the account owner to determine the manager, or use the wiki page to determine PFPT owner by territory, mailbox count, vertical
What is a key differentiate between CLEAR vs. PhishER / Triage?
What file format is required for implementation of SCORM Files into an LMS (verbatim)?
SCORM 1.2 or 2004 compliant
An end user education program is the backbone to this type of security approach
People Centric Approach
What is the best silver bullet against KnowBe4's content?
When is the only time you can book a demo with an MSP / Reseller?
if they disclose their client name and provide all qualifying info for a normal demo
CLEAR now uses what to scan reported emails as threats?
Proofpoint's TAP (threat intelligence network)
What PSAT Products are included in the Assess Pillar?
ThreatSim
Cyberstrength
What are the 4 steps of the continuous training methodology
Assess
Educate
Reinforce
Measure
What is the cost of customization?
$850
What are 2/4 commonly used fields used to remove Current Customers from Salesforce reports?
Account Status (Auto) =/ current customer or new customer
Wombat Phishing Customer = False
Wombat Training Customer = False
Probe Results =/ Proofpoint Essentials
Describe the benefit of CLEAR and how it works?
People Centric security model
automation
remediation
What is the proofpoint threat intelligence network?
Data collected through proofpoint's email gateway product (scanning 1/5th of the worlds emails)