Calculate human risk.
Empower the workforce.
Secure your business.
Security awareness training is broken.
Human Risk Management is the fix.
Humans are your strongest line of defence, but security awareness training alone won’t transform user behaviour.
Human Risk Management (HRM) is the one-stop solution for building a security-savvy workforce.
Understand user vulnerability to evolving cyber threats.
Strengthen user resilience with tailored training programs.
Measure the impact of training and combat future threats.
Reduce insider threats with user-tailored security awareness training
Learn enables your organisation to easily deploy continuous security awareness training in the most time-efficient and cost-effective way.
Packed with engaging training content, Learn crafts user-tailored programmes and eliminates repetitive admin tasks through automation – reducing insider threats, data breaches and ransomware, while meeting the demands of compliance standards such as GDPR and PCI.
Rapid deployment & automated admin
By enabling the 'AutoEnrol' feature, Learn launches your users' training instantly and manages admin tasks.
Deliver programmes unique to each user
Learn identifies initial user infosec vulnerabilities, then prioritises their courses to strengthen these areas first.
Library of infosec & compliance courses
Educate your users on an ever-growing library of information security and compliance-based courses.
Build courses unique to your organisation
Easily create custom courses unique to your business, all with Learn's unique 'Custom Course Builder'.
Video & Interactive Course Content
Keep your users engaged and maximise knowledge retention with video and interactive content.
Custom Reporting & Weekly Summaries
Assess different departments of your business and obtain weekly progress reports.
Assess user vulnerability to sophisticated phishing attacks
Phish automates regular phishing assessments alongside your users’ training programme, determining user risk towards common attacks while ensuring training effectiveness.
Your automated feature, AutoPhish, periodically deploys a range of common phishing attacks, tracking real-time compromised rates and highlighting key trends.
(Note – simulations can be automated or deployed manually)
Automate regular phishing simulations
Enable 'AutoPhish' and automate regular simulations (templates and frequency are customisable).
Choose from realistic pre-made templates
Phish comes with a library of pre-made templates impersonating some of the world's most trusted brands.
Easily create custom phishing templates
Easily create custom templates and deploy simulations impersonating internal communications.
View real-time compromised rates
Gain an insight into how your users interact with phishing attacks in real-time.
Customise reports and segment user groups
View in-depth reports and segment users based on departments, seniority and more.
Spot common trends & key user insights
Digest the performance and behaviour of your users over a custom period of time.
Identify and safeguard exposed employee email accounts
With millions of email login credentials exposed online due to third-party data breaches, users with vulnerable accounts could be targeted by social engineering and business email compromise (BEC) attacks.
Breach quickly identifies which employee accounts are exposed in data dumps, paste sites and hacking forums, as well as which service leaked the user’s details and what sensitive data is available.
Quickly locate exposed user email accounts
Breach will rapidly identify which email accounts are at risk - bringing your results back in minutes.
Search online data dumps and paste sites
Breach conducts a deep web investigation into hacking forums, paste sites and data dumps.
Obtain full exposure report in minutes
View your organisation's overall breaches and assess individual account exposures.
Learn what data is publicly disclosed
Identify the exposed data of each user - including usernames, passwords, phone numbers and more.
Automate regular exposure checks
Breach will automatically run regular exposure checks and update your dashboard for quick viewing.
Enhanced ISO 27001 and Cyber Essentials compliance
Breach can help with enhancing your compliance with popular IT security programs
Simplify policy management and ensure user acknowledgement
Manually updating users on policy updates and chasing signatures is a time-consuming, outdated and ineffective approach.
Policy simplifies policy communications and user acknowledgement by automating the process – sending policy changes directly to your users’ inbox and tracking who has opened and signed their document.
Notify staff of new corporate policies
Have new corporate policies sent directly to your users' email inboxes.
Update users on policy amendments
Ensure policy updates get communicated by delivering and tracking updated docs via email.
Use pre-made policies or create your own
Policy contains a library of pre-made policies, incl. Data Breach Response, Email, Acceptable Use and more.
Upload custom policies
Deliver and track your organisation's custom policies within Policy
Track who has or hasn't signed
Identify which users have opened your policy document and which have provided a signature.
Enhanced ISO 27001 and Cyber Essentials compliance
Automated policy enforcement can help with enhancing your compliance with popular IT security programs
Understand your organisation’s human cyber risk
Determining the human risk-level of your organisation and assessing how your users are progressing can be difficult to measure.
Risk Score quantifies your employee threat-level by collating various behavioural metrics from the platform, and collating them into an overall grade.
(Low-High for end-users, 0-900 for entire organisation)
View overall risk level from your dashboard
Access a high-level overview measuring your organisation's risk score from 0 (low) to 900 (high).
Access your users' individual risk scores
View the risk profile of your users, ranging from high, medium to low.
See how user scores change over time
Assess how your organisation's risk score changes over a 12-month period.