Fremium | Essential | Business | Premium | MSP |
---|
Fremium | Essential | Business | Premium | MSP |
---|
Fremium | Essential | Business | Premium | MSP |
---|
Feature | Description | Fremium | Essential | Business | Premium | MSP |
---|---|---|---|---|---|---|
User Limitations | Number of users who can be served with cybersecurity awareness measures and practical exercises such as phishing simulations or e-learnings | 500 | License | License | License | License |
On-Premise Appliance | Install your own cybersecurity awareness platform on your infrastructure or in your private cloud. Distribute the load across several nodes if necessary. | |||||
REST API and 3rd Party Integration | The REST API allows you to integrate Cyberdise into your IT system landscape. Each Cyberdise function can be called its REST API Endpoint. You can initiate, run and report attack simulations or trainings from other systems. The REST API also allows you to feed external reporting systems with the results, metrics and other data originating from executed awareness and campaigns. | |||||
AI-Layer | Cyberdise's AI layer, a pivotal component of the cybersecurity awareness training platform, leverages the advanced capabilities of Huggingface Transformers and Cyberdise LLM (a specialized version of Llama-2) for on-premise applications, alongside OpenAI's GPT-4 for cloud-based implementations. This layer is the driving force behind our platform's efficiency and scalability, offering transformative AI-powered cybersecurity awareness and practical training exercises. | Cloud | Cloud | Cl/OnPrem | Cl/OnPrem | |
SSL Certificates | Allows automatic creation of official and trusted certificates for administrative backends and campaigns. If you choose to use SSL for your campaign, you can generate a custom certificate or certificate signing request (CSR) for the domain you want to use. Of course the import of own official trusted certificates is also supported. | |||||
Tenant Segregation and Management | Serve multiple customers on a single Cyberdise instance. Each tenant operates in a virtually isolated environment, with the software maintaining the separation of each tenant's data and configurations. In this case a ‘Super-Admin’ is managing the tenants without having access into it. | |||||
Layered Recipient Grouping | Rapidly import users in large numbers using a CSV, LDAP, or text file. Establish varied groups of recipients, sorted by their department, division, job title, and so on. Modify the list of recipients within an ongoing campaign. | |||||
Dynamic Recipient Groups | In cybersecurity awareness campaigns, dynamic recipients groups are formed based on users' performance in previous security tests like phishing simulations. Those who fail these tests are automatically placed in groups that receive more frequent and simpler training, tailored to improve their cybersecurity awareness and response to threats. | |||||
Role-Based Access Controls | Cyberdise utilizes a role-based access control system to limit system access to only those operators who are authorized. Specific roles within the operator settings are allocated permissions for certain operations. Users in the role of an Operator are assigned specific technical roles, and these role assignments give them the necessary computer authorizations to perform various functions within Cyberdise. | |||||
Reminder Emails | Reminder Emails for Trainings or Attacks: Automated reminder messages are available to resend messages to users who haven't engaged with an attack link or a training course, triggered after a predetermined time period. | |||||
Multi-Language Admin Interface | The administrative interface of Cyberdise is offered in various languages. More languages can be requested. | |||||
Mobile-Responsive Admin Gui | As an Cyberdise operator you can maintain your Cybersecurity Awareness activities from your mobile device. | |||||
Multiple E-Mail Delivery Methods | In a single campaign, diverse email delivery methods can be employed to guarantee that emails from attack simulations are not dispatched through the same infrastructure as training emails. Besides the integrated mail server the operator has the option to utilize external SMTP servers. That’s how you can assure that you send messages from systems with superior delivery reputation, to minimize issues related to spam filtering. | |||||
Extended Security Features | Cyberdise offers customizable security configurations to meet specific company requirements, equipped with numerous security functionalities. These include brute force attack protection, enforcement of password policies, the option to activate custom ports for administrative purposes, IP-based access limitations for administration and directories for administrative use, along with comprehensive activity logging. | |||||
Custom Error Pages | Enhance your sophisticated phishing exercise with 404 error pages adapted to the attack scenario or even with a spoofed homepage that matches the attack simulation. | |||||
Logging of activities | Access, transaction and email delivery logs provide detailed insight into server activities, facilitate troubleshooting and provide an audit trail. | |||||
DNS Domain API | Purchase any number of domain names directly through Cyberdise for your phishing exercises or awareness training. Have Cyberdise automatically generate the relevant DNS records (including SPF, MX, Wildcard A-Record, and Whois protection) for you. Mantain and extend the domains you have purchased directly in Cyberdise. | |||||
White Labelling | With Cyberdise's white labelling feature, you can tailor the application and content to align with your organization's preferences. This includes customization of the admin domain, phishing domain, SMTP server, UI colors, background, fonts, login logo, copyright, software name display, mail plugin name, system error pages, and more. Additionally, you can personalize phishing and training templates. White label settings can be individually configured for each tenant on the instance. | |||||
LDAP API | Enhances user and recipient management: Utilize the LDAP API to import and authenticate user data, as well as execute automated campaigns. This allows for actions like automatically targeting new employees with phishing simulations. | |||||
LDAP Sync | Streamlines management of addresses and users: With the LDAP API, you can synchronize user data, verify its authenticity, and conduct automated campaigns. This feature enables you to automatically initiate phishing simulations or initial cybersecurity trainings for new employees. | |||||
Single Sign-On (SSO) | Enhance Security and Convenience by Removing Passwords: Use the SAML based Single Sign-On (SSO) feature. | |||||
2-Factor Authentication | Cyberdise offers two-factor authentication for administrators, which can be enabled through an authentication app compatible with smartphones (iOS & Android). | |||||
Data Entry Attacks | Data entry attacks might involve one or more web pages designed to capture sensitive information input. With Cyberdise, these web pages can be effortlessly customized using the provided web editor. Moreover, extra editing tools enable the swift creation of features like login forms, download sections, and more, all without requiring any knowledge of HTML. | |||||
Hyperlink Attacks | In a hyperlink-based campaign, users receive an email that includes a uniquely generated tracking URL. | |||||
File-Based Attacks | File-based attacks in Cyberdise enable the administrator to incorporate various file formats (such as Office documents with Macros, PDFs, Executables, MP3s, etc.) into email attachments or websites created within Cyberdise, allowing the monitoring of their download or execution frequency. | |||||
Java-Based Attacks | Java-based attacks allow the Cyberdise administrator to integrate a trusted applet within the file-based or mixed attack templates into Cyberdise and to measure their execution by the user. | |||||
Ransomware Simulation Attacks | Cyberdise features ransomware simulations designed to evaluate the staff's response and readiness. | |||||
Double Barrel Attacks | Start your phishing campaign with an initial harmless email (the bait) that contains no malicious content and does not require a response from the recipient. | |||||
Mixed Attacks | Mixed Attacks enable the integration of various types of scenarios, like hyperlink-based and data entry attacks, within a single campaign. | |||||
Smishing Attacks | Smishing is essentially "SMS-based phishing." In this approach, cybercriminals engage in "phishing" activities by sending deceitful text messages instead of emails, aiming to dupe the recipient into opening an attachment loaded with malware or clicking on a harmful link. | |||||
Portable Media Attacks | Cyberdise provides a feature to simulate portable media attacks, allowing users to store file templates like executables, archives, or office files with macros on devices such as USBs, SD cards, or CDs. This functionality enables tracking the access of these specific files in Cyberdise, helping to understand and mitigate the users risky behaviours associated with portable media drives. | |||||
Skill-based Attacks | Skill level based phishing training for employees aims to quantify the risk of social engineering attacks. Through scientific analysis, key risk factors are identified, enabling the provision of tailored training content automatically. This approach involves attacks that are dependent on the knowledge level, experience-based, and connected to the concept of ‘Dynamic Recipient Groups’. | |||||
Multilingual Attacks | Conduct your phishing exercise in several languages at the same time. | |||||
Industry Specific Templates | Availability of industry-specific attack templates. | |||||
Data Entry Validation | During phishing simulations, it's crucial to avoid false positives in login fields, such as logins with incorrect syntax. Additionally, company policies might prohibit the transmission of confidential data like passwords. To address these needs, Cyberdise provides a versatile input filtering and regex engine, designed to meet a variety of requirements. | |||||
Multi Attack Campaigns | Cyberdise allows you to incorporate various simulated attack templates within a single campaign. You can combine different types (with file-based to be added later) and themes to maximize risk coverage and gain a deeper insight into employee vulnerabilities. Coupled with our scheduling planner and randomizer, this enables the execution of complex attack patterns over an extended period. | |||||
Spear Phishing Simulation | The Spear Phish feature utilizes dynamic variables such as gender, time, name, email, links, messages, division, country, etc., which can be integrated into landing pages and message templates. You can can even add and maintain your own custom variables for phishing exercises or trainings. | |||||
Website Cloner | Efficiently generate professional-looking landing pages for your campaigns. You can replicate existing websites and enhance them with added features like data entry fields, downloadable files, and more. While development for this feature will continue, the usage is your own responsibility and no support is offered for the Website Cloner. | Backlog | Backlog | Backlog | ||
Vanity URL Attack Links | The manual URL creation feature enables you to craft easily memorable links that can be associated with a landing page. Additionally, you have the option to use automated short URL strings, or even assign unique URLs for each user. | |||||
DKIM / S/MIME Support | Anton Belousov | |||||
Dynamic Training Hints | The dynamic hints feature in Cyberdise enables learning managers or campaign operators to place markers within attack templates. These markers then guide employees during e-learning sessions, highlighting points where the phishing exercise could potentially be identified. | |||||
Mobile-Responsive Content | The majority of Cyberdise’s integrated modules are designed with mobile responsiveness, allowing users the convenience of accessing training on various types of connected devices. Most awareness modules adhere to SCORM standards and come with built-in support for mobile responsiveness. For phishing landing pages, there is a built-in HTML editor available. | |||||
Rich Media Awareness Training | Incorporate engaging rich media elements like video and audio into your awareness training programs. Utilize the provided educational videos, customize them, or include your own rich media content to enhance user interaction and engagement. Contact Cyberdise support if you want to have videos customized (on a paid basis). | |||||
Static Training Support | Training materials can be made available on static pages within Cyberdise or on the intranet, ensuring that users have ongoing access to the training content. | |||||
Diploma Generator | Recipients can generate and print out diplomas and certificates for eLearning either during a training session or within the Learning Management System (LMS). For completed trainings in a particular campaign, training diplomas are available for download as PDF files from the users private learning home page (LMS Home). | |||||
LMS Portal | Access to Cyberdise Learning Management System (LMS) for the end user. Every employee can get a permanent access to his own training homepage with his own courses. Allow access to performance statistics, resume or repeat training, training certificates, and allow comparison with other groups or departements. | |||||
Skill-based e-Learning | Educate your employees tailored to their skill requirements. Assess employee capabilities and foster a positive competitive environment among colleagues through gamification. The system can automatically provide multiple training sessions based on the users' reputation profiles, which are determined by their responses in phishing simulations. This means that repeat offenders will receive different training content compared to those who click on an attack simulation for the first time. | |||||
SCORM Import and Player | Do you have your own training modules or are you developing them? Then you can easily upload them to Cyberdise and integrate them into campaigns. Tracking and reporting on the training results is also possible. | |||||
SCORM Export | Do you want to publish existing Cyberdise training modules in your own LMS or on the intranet? Then export them with the SCORM export feature. Ask Support if you would like to have Cyberdise videos personalized (subject to a charge). | |||||
Engage Employees | ||||||
Report-a-Phish Button (M365 / Outlook) | With the highly customizeable Phishing Button end users can report suspicious e-mails with a single click to one or multiple accounts or to the Cyberdise operator. | |||||
Integration with Phishing Exercises | Reporting and dashboard integration with phishing exercises. Identify the users who have behaved exemplarily in a phishing simulation: Those who reported a suspicious message! | |||||
Button Customization Options | Customization and a full white labelling of various functions (icon, ribbon label, feedback messages, transmission protocol, sent header, etc.) | |||||
Positive Behavior Reinforcement | The Phish Button functionality automatically reinforces positive behavior by increasing the end user Awareness Score and displaying a customizeable thank you message. | |||||
Phish Report Autoresponder | The Report-a-Phish Autoresponder enables the automatic dispatch of a notification to the end user with the outcomes of the email threat analysis. This message is customizable, and if needed, the Cyberdise Message Risk Score can be incorporated into it. |
Program and Campaign Management | ||||||
Program Dashboard | Overview of your awareness programs and their campaigns. Cockpit for your campaigns and their details. | |||||
Basic Attack Template Library | The basic attack library in Cyberdise offers a limited selection (around 20 templates) for the most frequently encountered types of phishing exercises. | Reduced | ||||
Extended Attack Template Library | The extended attack library features a broader range (less than 100 templates) of ready-to-use Cyberdise templates for various phishing exercises. | |||||
Full Attack Template Library | The complete attack library contains all available attack module templates (there will be over 200) in Cyberdise. | |||||
Basic Training Library | A concise collection (less than 20 awareness training templates) tailored for the most prevalent learning topics. | Reduced | ||||
Extended Training Library | The extended training library provides a diverse array of Cyberdise educational templates (less than 50), ready for immediate use, covering a broad spectrum of IT security subjects. | |||||
Full Training Library | The complete training library encompasses all available awareness education templates (there will be more than 100) in Cyberdise. | |||||
Individual / Custom Content Packages | Individual / Custom Content Packages Content packages are used to distribute training content or a set of phishing templates. External content providers can create their own content packages and offer them to Cyberdise customers free of charge or for a fee. If customers have a Cyberdise infrastructure with multiple instances, Content Packages allow the transfer of training content or phishing exercises from node to node. | |||||
Awareness Program Configurator | Create an awareness program consisting of several campaigns based on existing program blueprints (well formed collection of cybersecurity awareness trainings and phishing/smishing exercises). You can then adapt the program to your individual needs. | |||||
Training Hints Constructor for Microlearning | The Training Hints Editor allows the creation of training templates which, for example, show a phishing mail and explain to the user how he could have recognized that this is a phish. | |||||
Anonymization | Anonymize the results of a phishing exercise so that no conclusions can be drawn about the individual. Nevertheless, in the event of an error/phish, the anonymized user can be provided with individual training adapted to their skill level. | |||||
Multi Timezone Campaign Scheduler | You can serve recipients who are in different time zones in the same campaign. | |||||
Delivery Randomizer | The crucial element for achieving effective and lasting awareness among employees is to enhance their understanding at random intervals. Conducting numerous campaigns simultaneously and at random is one of the most effective strategies for training employees. | |||||
Campaign Checks | Before launching a Cyberdise campaign, it's essential to conduct preliminary checks to see if everything configured properly:
| |||||
Phishing Simulation AI Assistant | The PSAA tailors attacks according to your specific selections and needs. It generates personalized phishing simulation messages and also constructs an initial version of a landing page for the simulated attack, all based on your provided criteria. | |||||
Awareness Campaign Automator | Use the Automator to generate phishing simulations that mimic the ones currently circulating online. Enhance your employees' awareness and preparedness against contemporary internet threats almost instantly with phishing simulations that are modeled after actual ongoing scams | Backlog | Backlog | Backlog | Backlog | Backlog |
Cybersecurity Chatbot | Create a Security Policy Database with a chatbot feature, utilizing your corporate policies and controls. Set up a reliable and localized Corporate Security Chatbot for your employees, enabling them to inquire about cybersecurity matters. Ensure that the Chatbot's responses are aligned with your organization's specific policies, rules and regulations! | |||||
Advanced Video Tracking | Advance your assessment of eLearning awareness videos by employing a feature that tracks user engagement. This feature enables you to monitor which users have watched the videos, the duration of their viewing, and identify those who discontinue watching before the video concludes. | |||||
Advanced Quiz Tracking | In Cyberdise, when you examine the interactive content through reporting tools or dashboards, you have the ability to see which user answered each question, the timestamp of their answer, the duration of their visit on the site, and how their performance compares with other departments within the company. | |||||
Detailed Campaign Statistics | Metrics on the success of the campaign. Click rate, open rate, training rate, certification rate, time progression, etc. | |||||
Campaign Statistics Exports | Export the metrics for further processing in an analysis tool or for external reporting. | |||||
Landing Page Time Tracking | It's possible to precisely track the duration of time a user spends on a specific webpage, both in attack scenarios and during training exercises. | |||||
View Only Access | Give management, auditors, the works council or other interested parties read-only access to the awareness campaigns and the results. | |||||
Customer Success Manager | Cyberdise Customer Success Managers (CCSM) help you to set up successful and sustainable campaigns. Please note that the CCSM is a supporter. Setting up complete awareness programs is not the responsibility of a Customer Success Manager. | n/a | Shared | Shared | Dedicated | Shared |
Business Consulting Service Option | If you would like to set up complete cybersecurity awareness and privacy learning (CPLP) programs or need conceptual or organizational consulting on security awareness training (SAT), you can book one of our Cyberdise Business Consultants (subject to a fee). | n/a | ||||
Creation of Custom Templates | Creation of individual training templates or templates for phishing exercises (subject to a charge) | n/a | ||||
Custom Video Editing | Personalization of Cyberdise videos (logo change, subtitles, dubbing, other languages). Mostly with fixed prices. | n/a | ||||
Official Partner or Customer Certification | Certification of the customer or partner by Cyberdise and official confirmation of the certification status when the certification criteria are met. | n/a | ||||
Custom Campaign Service | Setting up, conducting and evaluating awareness training and phishing/smishing exercises for the end customer. | n/a | ||||
Support Level | All quantitative indications relate to a period of a year. Support Levels: Standard: Two support hours. Access to support ticketing system. Support hours Mo-Fr during business hours (CET.) Support cases based on software errors are free of charge. Maximum 24 h response time. Business: Six support hours. Access to support ticketing system & live web sessions. Support hours Mo-Fr during business hours, CET & CST(planned). Support cases based on software errors are free of charge. Maximum 12 h response time. Premium: 12 support hours. Access to support ticketing system & live web sessions. Support hours Mo-Fr during business hours, CET & CST(planned). Support cases based on software errors are free of charge. Maximum 12 h response time. | n/a | Standard | Business | Premium | Business |
Installation Support (OnPrem / Private Cloud) | Awareness team and system engineers help you to setup and integrate Cyberdise into your on-premise or local cloud environment (DNS, Mail, LDAP, Firewall, etc.). Maximum 20 hours per instance. | n/a |