Alok Sahay Country Manager India Saarc

Alok Sahay
Sales Director India & SAARC
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

Faurani Ahmad Sales director Southeast Asia

Ahmad Faurani
Sales Director Southeast Asia
ahmad.faurani@holmsecurity.com
+60 19 434 2727

Welcome to Malaysia!

Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk! 

Contact us

cristian-miranda-holm-security

Cristian Miranda
Key Account Manager, Finland
cristian.miranda@holmsecurity.com
+46 8-550 05 582

Tervetuloa!

Hei! Nimeni on Cristian ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? 

Ota yhteyttä

victor-bunge-meyer-holm-security

Victor Bunge Meyer
Key Account Manager, Sverige
victor.bunge-meyer@holmsecurity.com
+46 08-550 05 582

Holm Security i Sverige

Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vår platform för sårbarhetsanalyser. 

Kontakta oss

 

 

Beth Murrell holm security

Beth Murrell
Account Manager, Benelux
elizabeth.murrell@holmsecurity.com
+31-20-238 63 94

Welkom in de Benelux!

Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!

Neem contact op

jens dahlkvist holm security

Jens Dahlkvist
Key Account Manager, Norge
jens.dahlkvist@holmsecurity.com
+46 8-550 05 582

Holm Security i Norge

Velkommen til Holm Security i Norge! Jeg heter Jens og er din lokale kontaktperson.Kontakt meg hvis du vil vite mer om vår plattform for sårbarhetsanalyser.

Kontakt oss

Ronnie Jensen

Ronnie Jensen
Country Manager Denmark
ronnie.jensen@holmsecurity.com
+45 31 12 10 05

Holm Security i Danmark

Velkommen til Holm Security i Danmark! Mit navn er Ronnie og jeg er din lokale kontaktperson. Kontakt mig, hvis du vil vide mere om vores sårbarhedsanalyseplatform.

Kontakt os

Phishing simulation & awareness training

Over 90 % of data breaches start with a malicious email. Do you know how your users will respond to the next attackOur product for phishing simulation and awareness training helps you increase resilience against social engineering through simulated email attacks, like phishing, spear phishing, and ransomware - together with tailored awareness training.

KEY FEATURES

Build your human firewall

Our product Phishing & Awareness Training support includes all the features you need to run simulations and work with awareness training with less effort through automation.

envelope-open-text-duotone (1)
Simulate social engineering

Simulate email attacks, such as phishing, spear phishing, ransomware, and CEO/CFO phishing. Or create your own custom simulations.

cogs-duotone
Automated awareness training

Depending on the behavior of each user in the simulation, a tailored awareness training is automatically composed and presented to the user.

chart-bar-duotone
Statistics & reports

Based on the results of the simulation you get detailed statistics that help you identify weak users.

repeat-duotone
Repeat

Through continuous simulations, you make sure to keep your users up to date with the constantly shifting and latest threats. 

FEATURES & FUNCTIONS

Simulations

Our product offers a wide range of simulation templates for different scenarios and we’re constantly adding new ones based on the latest threats.

Contact us

Ransomware

The number of ransomware attacks is increasing rapidly, threatening to lock down your entire organizationProtection against ransomware should be your highest priority.

Phishing

Credentials, credit card numbers, and personal data are examples of targets for phishing emails. Phishing emails are usually sent out on large scale – spraying the internet. 

Spear phishing

Spear phishing is an email attack targeting a specific individualdepartment, or organization that appears to be from a trusted source. 

CEO/CFO phishing

CEO/CFO fraud is a scam where cybercriminals spoof company email accounts and impersonate executives to try and fool an employee to execute unauthorized wire transfers, or sending out confidential financial information.

shield-check-duotone-blue

Planning your cyber defense?

Book a demo of our Vulnerability Management platform.

TECH DETAILS

Specific features & functions

Our product phishing and awareness training provides a wide range of features for your organization to conquer the threats your users are facing.  

  • An ever-increasing number of ready-made and customizable templates. 
  • Templates supporting placeholders to be able to create personalized emails. 
  • Ready-made and customizable awareness training templates. 
  • Import users manually, or integrate with your Active Directory for automatic user import.  
  • Risk-free – the assessments are carried out completely without any risk to the user and your IT environment. 
  • Flexible tracking – you chose if specific user behavior should be tracked on a per simulation basis. 
  • Automated and tailored awareness training based on specific user behavior. 
  • Create groups to be able to better understand different user groups and their behavior.  
Pricing

ADMINISTRATION

Centralized, powerful administration & orchestration

shield-check-duotone
Security Center

Security Center is our easy-to-use web-based control panel that gives comprehensive insights and helps you manage vulnerabilities. Through flexible dashboards and reports, you get a visual overview of current data, development over time, and more. Security Center supports Role-Based Access Control (RBAC).

Read more

sitemap-duotone-1
Organizer

Organizer enables different people, groups of users, departments, or countries to be given isolated access to relevant vulnerability data while maintaining a centralized administration. Get the best of two worlds – decentralized management to engage your teams, while still having support for centralized management.

Read more

PROFESSIONAL SERVICES

Maximum effect - maximum ROI

Product support

Continuous support from our Vulnerability Management Experts. 

Workflows & routines

We help you set up workflows and routines for success within Vulnerability Management. 

Follow-up meetings

Continuous follow-up meetings together with our Vulnerability Management experts to support the assessment and prioritization. 

Maximum advantage

Together we make sure that you’re taking advantage of all powerful features in our platform – existing as well as new ones. 

Trusted by

stadium customer holm security vikingline customer holm security kraftringen customer holm security it sam customer holm security region halland customer holm security huddinge kommun customer holm security bodens-energi-customer-holm-security citaverde-college-customer-holm-security

Resources

Read about Phishing & Awareness Training and related topics in our resource bank.

FAQ

Here we answer the most frequent questions. We love to answer questions you have about vulnerability management in general or about our platform.

Are specific users exposed in the simulation?

You decide on a per simulation basis if you would like to be able to see which user did what.

Why is phishing and awareness training so efficient?

You instantly increase the resilience against email attacks and over time, through repeated simulations, you keep your users up to date with the latest threats.

How often do you recommend to run simulations?

Simulations should be carried out on a regular basis to make sure you users are up to date with the latest threats and to keep their resilience on a high level. We recommend somewhere between 4-6 simulations per year.

Is awareness training included in the product?

Yes, automated and tailored awareness training is included and can be customized to suit your organization.

Can I create my own custom templates?

Yes, we provide ready-made templates based on the latest threats and you can edit existing templates and create your own.

Do support integration with Active Directory?

Yes, we support integration with Active Directory for automated import of users.

HOLM SECURITY

Cyber Security Starts Here

The fastest and most efficient way to automated and continuous Vulnerability Management for your entire infrastructure – systems, web applications and users. All in one platform.

Phishing & Awareness Training

Starting at

EUR

0,40

EUR

$0,45 USD / user

Monthly price based on 1,000 users.

Request quote
  • All features & functions included
  • Unlimited number of simulations
  • Awareness training
  • Qualified local support