Our product explained

Find out how our AI-driven phishing simulations train every recipient based on his personal knowledge level.

Automated Phishing Simulations

Our comprehensive platform sends phishing simulations in a fully automated way throughout the year, without having to intervene as an organization. No need to think about what kind of phishing attacks there are and how your organization can best educate its employees against them.

Upload your users and we take care of educating them

Or checkout our pricing page →

STEP 1:

Create an account

When creating an account you are asked to enter some details about you and your company. No credit card details are asked when creating a trial account.

STEP 2:

Upload your users

Once you have confirmed that you are the owner of the domain, you can upload your colleagues into our SaaS solution. Data is stored in SHA256 encrypted databases with rotating keys and is inaccessible to non-authorized personnel. You can decide on whether or not to notify them about their admission.

STEP 3:

Start receiving phishing simulations

We start sending out the first phishing simulations. Based on their reaction to those simulations, we compile a personal phishing expertise profile for each employee. Our AI-driven phishing simulations are sent out to train each individual at their knowledge level and make them experts in detecting and reacting to phishing attacks.

Automated simulations

Our advanced phishing simulations always provide a safe and unique experience.

Manual simulations

Sometimes it is necessary to send emails with certain content that only relates to your company. Create a manual simulation with our advanced editor.

Fast setup

In just 10 minutes, your organisation is ready for its added level of protection.

Spear phishing

Spear phishing, CEO fraud, NSFW, industry related, job related, …

… and even smishing!

Advanced reporting

Keep an eye on the status of all your users and your organization.

3 Languages

Our simulations can be delivered in 3 languages: Dutch, English and French.

Powerful settings

Advanced settings give you the opportunity to make your experience even more personal.

Application-based phishing

Specify which applications should be excluded from our phishing simulations.

Email frequency (4 - 31 days)

Specify how many emails you want to send to your colleagues.

Custom landingpages

Define on which page your users have to arrive after clicking on a phishing url;

your intranet, a custom build page, …

24/7 Support

If you experience any issues, you can rely on our fantastic, personal support.

Unlimited locations & divisions

Our SaaS works for every type of company/organisation. Create locations & divisions. Max. number of users depends on your contract.

What does Phished look like?

Take a closer look at the pages that are being used the most.

    Recipient's week

    The program’s objective is to make phishing experts out of everyone, and this page allows you to track how it’s going on a per recipient basis.

    Ready to start using these functionalities?

    List with uploaded users

    Overview of all the recipients that where uploaded by the administrator. Number of recipients depends on your contract. Possibility to create as many administrators as the number of recipients.

    Import several users at once by using our bulk upload tool (XLSX or CSV format) or by using our API.

    Dashboard

    The start screen is specifically created so you immediately get an overview of all the most important metrics. 

     External validation and certifications

    In addition to our extensive internal scanning and testing programs, we implement best practices to maintain full compliance and memberships.

    SOC certification

    The application servers and data are stored at google datacenters, which are among others SOC 1, SOC 2 and SOC 3 certified.

    ISO 27001-compliant facilities

    The application servers and data are stored at google datacenters, which are among others ISO 27001, ISO 27017.

    SHA256 encryption

    All personal data is stored in SHA256 encrypted databases with rotating keys and is inaccessible to non-authorized personel.

    3rd party penetration test

    Security testing is done on a continuous basis with the help of certified ethical hackers.

    Industries

    We Serve a Variety of Businesses & Industries

    Our phishing awareness program can be used in every sector and every company. It complies with all sector-specific regulations. Cyber security awareness is necessary for every company, large or small.

    Or checkout our pricing page →

    Technology

    Higher Education

    Critical Infrastructure

    Legal & Professional Services

    Energy / Utilities

    Health Care

    Government

    Finance

    Juliette Lanoit - GDPR advisor

    Failure to protect customer data adequately already results in serious sanctions and fines under the current Data Protection Act (DPA) legislation. … A common data security breach is through what is known as phishing. To protect our company against these threats we started a trial and are using it fulltime now.

    Jeff Dawson - CISO

    Our 14-day trial enabled us to experience whether an automated phishing simulation system was the right choice for our company. I can only say that I was impressed by how little I had to do myself and what we were able to learn from the first simulations that were sent.

    Contact us

    +32 (0)53/31.97.55

    3000 Leuven, Belgium

    Protect your organisation

    Train your employees for two weeks with automated phishing simulations that put your best to the test.