KnowBe4 Security Awareness Training & Phishing Simulation
Train your users to detect Phishing emails through the comprehensive Cloud Training Platform Suite from KnowB4. Regularly schedule Phishing Simulation tests. Social Engineering training to protect your business and users from cyber threats through email.
Features
- Unlimited Training and Phishing Simulation Use
- Social Engineering Indicators
- Integration with Active Directory
- Advanced Reporting with 60+ Reports
- Upload Your Own Content
- Customise Phishing Templates and Landing Pages
- Phish Alert Button to forward emails to your Security Team
- Engaging Interactive Browser-Based Training Content
- Virtual Risk Officer
- AI-Driven Phishing and Training Recommendations
Benefits
- Reduce Your Phish Prone Percentage
- Measure your organisation against others in your sector
- Create a Security Culture throughout the organisation
- Reduced phishing risk from 31% to 5%
- Setup onboarding process for new starters
- Over 14,000 Phishing and landing page templates
- Reduced admin time
- Content kept up to date by Vendor
- Protects your brand reputation
- Keeps users up to date wherever they work
Pricing
£2 to £37 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 5 6 3 1 5 1 3 9 6 9 2 1 0 5
Contact
ACTISOFT TECHNOLOGY LIMITED
Bill Slaven
Telephone: 0203 931 0199
Email: bill.slaven@actisofttechnology.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Internet Access
- Internet Browser
- Headphones - Recommended
- Mobile Phone using KnowBe4 App
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 4 working hours Monday to Friday 0830 - 1730.
Weekend support by arrangement at an additional fee for managed service users - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Webchat accessible through company website or email link for managed service users
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is provided by both the reseller and software vendor, KnowBe4
No additional fee for Vendor support.
Managed Service available at an additional fee. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onboarding process with the Software Vendor, KnowBe4. Program tasks to follow from completed Questionnaire.
All onboarding is included in the price. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Download their data via CSV
- End-of-contract process
- Minimum Contract term is 12 months if not renewed then access is removed and all documentation is archived then securely deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Training fully accessible through KnowBe4 app and supported mobile browsers. The Phish Alert Button works if you are using Microsoft 365 and the Outlook app.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Leverage Reporting APIs to pull data from your KnowBe4 console.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Upload own content. Edit templates & landing pages.
Scaling
- Independence of resources
- SLA available upon request
Analytics
- Service usage metrics
- Yes
- Metrics types
- Organisations Risk Score. Reporting of Simulated & Non-Simulated Phishing Emails. Phishing Campaign Results. Training taken by User.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- KnowBe4
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via API or CSV Export
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% Availability
- Approach to resilience
- WAF, Load balancing, snapshots, redundancy built in
- Outage reporting
- Status Webpage
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Multi-Factor Authentication & Single Sign-On
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We use the NIST Security Framework.
All endpoints are monitored and have protection.
Multi-Factor Authentication in place.
Control over websites accessed.
Email Security Gateway.
Comprehensive regular security training - Information security policies and processes
- Managing Director is informed of all problems and policies are regularly updated and communicated
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All change management controlled by Software Vendor
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Regular reviews and monitoring of all endpoints
All endpoints kept up to date and scanned regularly. Multi-Factor Authentication and Single-Sign on.
All software is updated with security patches upon release.
Threat Intelligence services - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Endpoint monitoring
Follow procedures for dealing with a potential compromise
Immediately with reporting to the customer within 72 hours of an incident - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents reported through monitoring and procedures are followed dependent upon the type of incident.
All reported incidents are done via a written report
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Security Awareness Training helps users have confidence in their actions, both professionally and personally, with regards to recognising phishing emails reducing the threat from being scammed therefore taking away the stress of being breached. Knowledge transfer can take place by passing on what is learnt to others who don’t have access to the training.
Pricing
- Price
- £2 to £37 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free Trial for up to 100 users available for Limited period of time
- Link to free trial
- https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU