Find out how our AI-driven phishing simulations train every recipient based on his personal knowledge level.
Automated Phishing Simulations
Our comprehensive platform sends fully automated phishing simulations throughout the year, without the need for user intervention. No need to think about what kind of phishing attacks there are and how your organization can best educate and prepare its employees for each type.
Or check out our pricing page →
Create an account
Start the journey by creating a free account. You’ll be guided through the configuration phase by an easy-to-use wizard that helps us get to know you and better understand your organization.
Once the initial set-up is done, the real work begins: uploading recipients. This can be done manually, via mass file upload or through an API. You can decide whether or not to notify recipients about their admission to the program.
Excellent, we’re done! The platform will start sending out simulations within 24 hours to each recipient. Based on their responses, the types and send times of simulations are adapted for everyone by the smart algorithms.
You can read more about how it works for recipients here.
Advanced phishing simulations that are personalised for every recipient.
Create your own simulations using an advanced but easy-to-use editor.
A comprehensive library of over 5.000 unique phishing templates that is regularly updated.
Spear phishing, CEO fraud, NSFW, industry related, job related,… even smishing!
Keep an eye on the status of individual recipients and your organisation as a whole.
Automated simulations can be delivered in 3 languages: Dutch, English and French.
External validation and certifications
In addition to our extensive internal scanning and testing programs, we implement best practices to maintain full compliance and memberships.
Application servers and data are stored at google datacenters, which are, among others, SOC 1, SOC 2 and SOC 3 certified.
ISO 27001-compliant facilities
Application servers and data are stored at google datacenters, which are, among others, ISO 27001, ISO 27017.
All personal data is stored in SHA256 encrypted databases with rotating keys and is inaccessible to non-authorised personnel.
3rd party penetration test
Security testing is done on a continuous basis with the help of certified ethical hackers.
3000 Leuven, Belgium
Protect your organisation
Try out our platform for 14 days without any obligation!