Proofpoint Essentials Security Awareness Training
Security awareness for SMBs
Identify Risk
Identify who is being attacked and evaluate their ability to protect themselves. The solution identifies risk through Very Attacked People (VAP) reports, threat simulations, and knowledge assessments. VAP reports provide valuable data like who is clicking on known malicious content and is being targeted the most by attackers. Simulations can utilize templates from Proofpoint threat intelligence to ensure realistic measurements of user risk while knowledge assessments are fully customizable.
- CyberStrength® Knowledge Assessments
- ThreatSim SMS Simulations
- ThreatSim USB Simulations
- ThreatSim Phishing Simulations
- Very Attacked People (VAPs) Reports
Change Behavior
- Interactive Training Modules
- Program Materials for Administrators
- Security Awareness Materials, including posters, infographics, newsletters, and more
- Game-based Training Modules
- Video Training Modules
- Deliver targeted education driven by threat intelligence to the right users. Their education content is fully customizable and built using Learning Science Principles. This ensures that your users are engaged during the training to better retain these critical skills. Choose from a wide variety of content, including:
Reduce Exposure
- Threat Response Auto-Pull (TRAP)
- PhishAlarm Analyzer Threat Prioritization
- PhishAlarm Email Reporting Add-in
- Turn your employees into a strong last line of defense and make them part of your team. Empower them to report suspicious emails with the PhishAlarm® Email Add-In. Content from the messages is analyzed by Proofpoint threat intelligence, while the URLs and attachments are sandboxed for malicious content. Your administrators can choose to automatically remediate malicious messages and send the user who reported it customized feedback. This Closed-Loop Email Analysis and Response (CLEAR) solution includes:
Business Intelligence and Integrations
- Get the granular and high-level visibility you need into your users’ assessments, simulated attacks, and training assignments. They offer responsive, easy-to-read business intelligence with a modern UI.