Our training modules are designed to
Change end user behavior
Customers have the ability to randomize delivery times and templates to reduce this
Prairie dog effect
How many modules do we offer?
35+
This is the tool end users can use to report suspicious emails
Phish Alarm
PSAT is found in this sector of the magic quadrant
Leaders
Conceptual and procedural knowledge, immediate feedback, set the pace, training context, reinforce lessons, serve small bites make up what
Learning science principals
Our templates are inspired by these
Real threats from the wild
This feature allows customers to create their own content
Customization center
When an end user falls for a phish, they are presented with this
Teachable moment
CLEAR stand for...
Closed Loop Email Analysis and Response
Using our purpose-built tools and methodology, our customers have reduced successful phishing attacks and malware infections by up to
90%
This feature uses azure to automatically update the platforms directory
End user sync
This is a type of module which involves highly interactive components that engage the end user
Gamification
This provides a real time ranking of reported phishing emails
Phish Alarm Analyzer
Our solution integrates with LMS that are
Scorm 1.2 (2003) compliant
An end user education program is the backbone to this type of security approach
people centric
What is PAA
Enables admins to quickly review, decide, and act on reported threats
Where can employees engage with their training
ANYWHERE (mobile responsive)
Likely, suspicious, unlikely
How many consecutive years has PSAT been a GMQ leader
5 years
What are the 4 steps of the continuous training methodology
Assess, Educate, Reinforce, Measure
What 4 types of simulated threats do we offer
Link Based
Attachments
Data entry
USB
How many languages do we support
35+
What is the integrated solution that streamlines end user reporting and security response to phishing attacks
Closes Loop Email Analysis and Response
This is proofpoint's definition for people centric risk reduction
Identify who is being attacked and evaluate their ability to protect themselves