Security awareness training | - High volume of CBT and video e-learning
- Generic, static
| - Medium volume of CBT and video e-learning
- Generic, static
| - High volume of CBT and video e-learning
- Adaptive security awareness training
- Role-based training automation
|
Customization | Add brand to introductory and concluding content slides - only for certain modules | - Basic branding of certain modules
- Add company logo limited to specific areas
| - Brand and customize all communications and training
- Add company logo everywhere
- Override the content (text) to align with organization’s specific policies and processes.
|
Gamification | | | - Gamified modules
- Leaderboards
- Cyber challenges
|
Drive engagement | - | - | - CyberIQ gamified portal rewarding engagement and secure behaviors
- Nudges
- Engagement measurement & analytics
|
Streamline training completion | Manager escalation and auto-reminders | - Manager escalation and auto-reminders
- Enforce training completion by restricting access to systems or applications for non-compliant users
| - Deploy manager escalation and auto-reminders
- Enforce training completion by restricting access to systems or applications for non-compliant users
- Train everyone everywhere, including users without corporate email addresses (e.g. front-line manufacturing)
|
Languages | - 34 languages
- Translation coverage varies from module to module
| - 35 languages
- Translation coverage varies from module to module
| - 35+ languages
- 100% translation coverage across all modules, notifications and nudges
- AI-powered translations of edits and overrides in real time
|
LMS integration | - All major LMS systems supported
- Only static, individual modules
- Retrieves limited completion status data
| - All major LMS systems supported
- Only static, individual modules
- Retrieves limited completion status data
| - All major LMS systems supported
- Individual modules and adaptive, automated campaigns
- Retrieves extensive data via telemetry
|
Human sensors | - | - | - Measure security policy compatibility and identify security friction
- 2-way employee feedback loop
- Insights into the effectiveness of security controls across the organization
|
Phishing simulator | QR codes, attachment, USB, URL click, credential capture | QR codes, attachment, USB, URL click, credential capture | - QR codes, attachment, URL click, credential capture
- Built on NIST Phish Scale
- AI-powered click root-cause analysis
- AI-powered phishing template creation
- Microsoft Teams simulations
|
Phishing remediation & response | - Phish report button with SOC forwarding & API integrations
- Monitor and remove or restore emails from user inboxes
| - Phish report button with SOC forwarding & API integrations
- Monitor and remove or restore emails from user inboxes
| - Phish report button with SOC forwarding & API integrations
- Respond to real-time threats with AI-powered threat intelligence.
|
Reporting capabilities | - Moderate phishing reporting accuracy
- Full API access
- Limited training and phishing analytics
| - Good phishing reporting accuracy
- Limited API access
- Limited training and phishing analytics
| - Accurate phishing reporting
- Full API access
- Extensive training, phishing and human risk management analytics
- Custom in-platform reporting (widgets)
|
Human risk intelligence | Limited risk scoring (6 human risk factors) | No risk scoring | - Comprehensive risk scoring (+20 human risk factors)
- Psychographic segmentation
- AI-powered insights
|
Automation | - Scheduled automated reminders
- Limited phishing simulation automation
| Scheduled automated reminders | - Scheduled automated reminders
- Dynamic content allocation engine
- Full training campaign automation
- Full phishing simulation automation
- User segmentation (dynamic groups & smart tags)
|
Customer support | - Dedicated CSM
- Technical support
- Managed service (extra cost)
| - Dedicated CSM
- Technical support
- Managed service (extra cost)
| - Dedicated CSM
- Technical support
- Managed service (extra cost)
- Human risk management expert
|
Integrations | - Identity providers & LMS systems
- With a limited number of security solutions
| - Identity providers & LMS systems
- Only with it’s own email security product
| - Identity providers & LMS systems
- With over 800 security systems
- Threat intelligence sources
|
G2 - Ease of Use | | | |
Gartner Peer Insights | | | |
Capterra | | - | |
Conditional access and security control automation | Email security / DLP rules | Email security / DLP rules | - Email security / DLP rules
- Human risk response rules across authentication, endpoint and web gateway
- Automate access restrictions
|
Product Direction | - Limited R&D, continuing to build on top of a legacy SAT & Phishing platform
- AI-bolt on
- Not recognized by Gartner for innovation
| - Limited R&D, continuing to build on top of a legacy SAT & Phishing platform
- No AI capabilities
- Not recognized by Gartner for innovation
| - World’s first AI-native human risk management platform
- Recognized by Gartner for innovation
- Built by CISOs for CISOs
|
Total (/ 100) | | | |