Calculate human risk.
Empower the workforce.
Secure your business.

Security awareness training is broken.
Human Risk Management is the fix.

Humans are your strongest line of defence, but security awareness training alone won’t transform user behaviour.
Human Risk Management (HRM) is the one-stop solution for building a security-savvy workforce.


Understand user vulnerability to evolving cyber threats.


Strengthen user resilience with tailored training programs.



Measure the impact of training and combat future threats.





Reduce insider threats with user-tailored security awareness training

Learn enables your organisation to easily deploy continuous security awareness training in the most time-efficient and cost-effective way.

Packed with engaging training content, Learn crafts user-tailored programmes and eliminates repetitive admin tasks through automation – reducing insider threats, data breaches and ransomware, while meeting the demands of compliance standards such as GDPR and PCI.

Rapid deployment & automated admin

By enabling the 'AutoEnrol' feature, Learn launches your users' training instantly and manages admin tasks.

Deliver programmes unique to each user

Learn identifies initial user infosec vulnerabilities, then prioritises their courses to strengthen these areas first.

Library of infosec & compliance courses

Educate your users on an ever-growing library of information security and compliance-based courses.

Build courses unique to your organisation

Easily create custom courses unique to your business, all with Learn's unique 'Custom Course Builder'.

Video & Interactive Course Content

Keep your users engaged and maximise knowledge retention with video and interactive content.

Custom Reporting & Weekly Summaries

Assess different departments of your business and obtain weekly progress reports.


Assess user vulnerability to sophisticated phishing attacks

Phish automates regular phishing assessments alongside your users’ training programme, determining user risk towards common attacks while ensuring training effectiveness.

Your automated feature, AutoPhish, periodically deploys a range of common phishing attacks, tracking real-time compromised rates and highlighting key trends.

(Note – simulations can be automated or deployed manually)

Automate regular phishing simulations

Enable 'AutoPhish' and automate regular simulations (templates and frequency are customisable).

Choose from realistic pre-made templates

Phish comes with a library of pre-made templates impersonating some of the world's most trusted brands.

Easily create custom phishing templates

Easily create custom templates and deploy simulations impersonating internal communications.

View real-time compromised rates

Gain an insight into how your users interact with phishing attacks in real-time.

Customise reports and segment user groups

View in-depth reports and segment users based on departments, seniority and more.

Spot common trends & key user insights

Digest the performance and behaviour of your users over a custom period of time.


Identify and safeguard exposed employee email accounts

With millions of email login credentials exposed online due to third-party data breaches, users with vulnerable accounts could be targeted by social engineering and business email compromise (BEC) attacks.

Breach quickly identifies which employee accounts are exposed in data dumps, paste sites and hacking forums, as well as which service leaked the user’s details and what sensitive data is available.

Quickly locate exposed user email accounts

Breach will rapidly identify which email accounts are at risk - bringing your results back in minutes.

Search online data dumps and paste sites

Breach conducts a deep web investigation into hacking forums, paste sites and data dumps.

Obtain full exposure report in minutes

View your organisation's overall breaches and assess individual account exposures.

Learn what data is publicly disclosed

Identify the exposed data of each user - including usernames, passwords, phone numbers and more.

Automate regular exposure checks

Breach will automatically run regular exposure checks and update your dashboard for quick viewing.

Enhanced ISO 27001 and Cyber Essentials compliance

Breach can help with enhancing your compliance with popular IT security programs


Simplify policy management and ensure user acknowledgement

Manually updating users on policy updates and chasing signatures is a time-consuming, outdated and ineffective approach.

Policy simplifies policy communications and user acknowledgement by automating the process – sending policy changes directly to your users’ inbox and tracking who has opened and signed their document.

Two men looking slightly confused, or worried, at a computer monitor. We can only see the back of the monitor, and the expression of the men, and it doesn't look good.

Notify staff of new corporate policies

Have new corporate policies sent directly to your users' email inboxes.

Update users on policy amendments

Ensure policy updates get communicated by delivering and tracking updated docs via email.

Use pre-made policies or create your own

Policy contains a library of pre-made policies, incl. Data Breach Response, Email, Acceptable Use and more.

Upload custom policies

Deliver and track your organisation's custom policies within Policy

Track who has or hasn't signed

Identify which users have opened your policy document and which have provided a signature.

Enhanced ISO 27001 and Cyber Essentials compliance

Automated policy enforcement can help with enhancing your compliance with popular IT security programs

Risk Score

Understand your organisation’s human cyber risk

Determining the human risk-level of your organisation and assessing how your users are progressing can be difficult to measure.

Risk Score quantifies your employee threat-level by collating various behavioural metrics from the platform, and collating them into an overall grade.

(Low-High for end-users, 0-900 for entire organisation)

View overall risk level from your dashboard

Access a high-level overview measuring your organisation's risk score from 0 (low) to 900 (high).

Access your users' individual risk scores

View the risk profile of your users, ranging from high, medium to low.

See how user scores change over time

Assess how your organisation's risk score changes over a 12-month period.

Get five comprehensive suites for just a few pennies per day!