Find out how our AI-driven phishing simulations train every recipient based on his personal knowledge level.
Automated Phishing Simulations
Our comprehensive platform sends phishing simulations in a fully automated way throughout the year, without having to intervene as an organization. No need to think about what kind of phishing attacks there are and how your organization can best educate its employees against them.
Or checkout our pricing page →
Create an account
Start the journey by creating a free account. You’ll be guided through the configuration phase by an easy-to-use wizard that helps us get to know you and your organization better.
Once the initial setup is done, the real work begins: uploading recipients. This can be done manually, via mass file upload or via an API. You can decide on whether or not to notify recipients about their admission to the program.
Excellent, we’re done! The algorithms will start sending out simulations within 24 hours to each recipient. Based on their response, the type and hour of simulations are adapted for everyone.
You can read more about how it works for recipients here.
Advanced phishing simulations that are personalised for every recipient.
Create your own simulations using an advanced but easy to use editor.
A daily-updated library of over 3.000 unique phishing templates.
Spear phishing, CEO fraud, NSFW, industry related, job related, …
… and even smishing!
Keep an eye on the status of all your recipients and your organization.
Automated simulations can be delivered in 3 languages: Dutch, English and French.
External validation and certifications
In addition to our extensive internal scanning and testing programs, we implement best practices to maintain full compliance and memberships.
Application servers and data are stored at google datacenters, which are among others SOC 1, SOC 2 and SOC 3 certified.
ISO 27001-compliant facilities
Application servers and data are stored at google datacenters, which are among others ISO 27001, ISO 27017.
All personal data is stored in SHA256 encrypted databases with rotating keys and is inaccessible to non-authorized personel.
3rd party penetration test
Security testing is done on a continuous basis with the help of certified ethical hackers.
3000 Leuven, Belgium
Protect your organisation
Train your employees for two weeks with automated phishing simulations that put your best to the test.