ABCD
1
Service FeaturesStartupProfessionalElite
2
Awareness & Training
3
IS Awareness Programsβœ…βœ…βœ…
4
Standard and compliance-aligned awareness for all employeesβœ…βœ…βœ…
5
Tailored awareness sessions for regulations and complianceβœ…βœ…βœ…
6
Annual effectiveness measurement of awareness campaignsβœ…βœ…βœ…
7
Phishing Security Tests and Simulated Phishing Campaignsβœ…βœ…βœ…
8
Automated Security Awareness Program (ASAP)βœ…βœ…βœ…
9
Advanced Reporting and Metricsβœ…βœ…βœ…
10
Security 'Hints & Tips' Newslettersβœ…βœ…βœ…
11
Access to +190 courses and career pathsβœ…βœ…βœ…
12
New courses and live workshops added every quarterβœ…βœ…βœ…
13
Specialized training for technical, security, and business teamsβœ…βœ…βœ…
14
Standard & Compliance
15
Creation and Review of Policies and ProceduresβŒβŒβœ…
16
Risk Management Framework Creation and ReviewβŒβŒβœ…
17
Continuous Risk Assessment UpdatesβŒβœ…βœ…
18
Information Security Auditingβœ…βŒβœ…
19
Compliance Auditing for Standards (ISO, GDPR,PDPL, HIPAA,ISR,NCA, etc.)βŒβœ…βœ…
20
Incident Response Planning and TestsβŒβœ…βœ…
21
Compliance Training and Workshopsβœ…βœ…βœ…
22
Vendor and Third-party Risk ManagementβŒβŒβœ…
23
Legal Compliance Review (Data Privacy Laws, etc.)βŒβœ…βœ…
24
Security Architecture Review and Consultingβœ…βŒβœ…
25
Security Assessment
26
Cloud / IoT Security AssessmentβŒβœ…βœ…
27
SOC Maturity EvaluationβŒβŒβœ…
28
Application Security Assessmentβœ…βœ…βœ…
29
Zero Trust Security AssessmentβŒβŒβœ…
30
Annual Vulnerability Assessment and Penetration Testing (VA/PT)βŒβœ…βœ…
31
Network Security Assessmentβœ…βŒβœ…
32
Compliance Assessment for Security StandardsβŒβœ…βœ…
33
Threat Modeling and AnalysisβŒβŒβœ…
34
Security Posture Review and Recommendationsβœ…βœ…βœ…
Features

100-1000 Subscribers

Recomended

1001-2000 Subscribers

+2000 Subscribers

Unlimited Phishing Security Tests
Automated Security Awareness Program (ASAP)
Security β€˜Hints & Tips’
Training Access Level I
Automated Training Campaigns.
Brandable Content
Assessments
AI-Recommended Training
Phish Alert Button
Phishing Reply Tracking
User Provisioning via Active Directory or SCIM Integration
SSO/SAML Integration
Industry Benchmarking