Features
Top Performing Features
Single sign-on capability
The software system supports a centralized authentication mechanism allowing the user to access multiple systems with a single, centrally managed password.
Category average: 9.3
Role-based user permissions
Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.
Category average: 8.4
Training Content Library
A pre-built library of security awareness training content that can be used immediately.
Category average: 8.7
Phishing Simulations
Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.
Category average: 9.1
Security
This component helps a company minimize the security risks by controlling access to the software and its data, and encouraging best practices among users.
Single sign-on capability
The software system supports a centralized authentication mechanism allowing the user to access multiple systems with a single, centrally managed password.
Category average: 9.3
Role-based user permissions
Permissions to perform actions or access or modify data are assigned to roles, which are then assigned to users, reducing complexity of administration.
Category average: 8.4
Security Awareness Training
Common features of security awareness training products.
Training Content Library
A pre-built library of security awareness training content that can be used immediately.
Category average: 8.7
Phishing Simulations
Administrators can run simulated phishing attacks to test the effectiveness of the training and assess vulnerabilities.
Category average: 9.1
Security Reporting
Reports available may include statistics on phishing simulations, training completion, etc.
Category average: 8.5
Integration with Security Tech Stack
The product integrates with other security tools, such as a SIEM or SOAR platform, and may provide alerts for potential breaches.
Category average: 8.2