Skip to main content

Help us improve the Digital Marketplace - send your feedback

ACTISOFT TECHNOLOGY LIMITED

KnowBe4 Security Awareness Training & Phishing Simulation

Train your users to detect Phishing emails through the comprehensive Cloud Training Platform Suite from KnowB4. Regularly schedule Phishing Simulation tests. Social Engineering training to protect your business and users from cyber threats through email.

Features

  • Unlimited Training and Phishing Simulation Use
  • Social Engineering Indicators
  • Integration with Active Directory
  • Advanced Reporting with 60+ Reports
  • Upload Your Own Content
  • Customise Phishing Templates and Landing Pages
  • Phish Alert Button to forward emails to your Security Team
  • Engaging Interactive Browser-Based Training Content
  • Virtual Risk Officer
  • AI-Driven Phishing and Training Recommendations

Benefits

  • Reduce Your Phish Prone Percentage
  • Measure your organisation against others in your sector
  • Create a Security Culture throughout the organisation
  • Reduced phishing risk from 31% to 5%
  • Setup onboarding process for new starters
  • Over 14,000 Phishing and landing page templates
  • Reduced admin time
  • Content kept up to date by Vendor
  • Protects your brand reputation
  • Keeps users up to date wherever they work

Pricing

£2 to £37 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bill.slaven@actisofttechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 5 6 3 1 5 1 3 9 6 9 2 1 0 5

Contact

ACTISOFT TECHNOLOGY LIMITED Bill Slaven
Telephone: 0203 931 0199
Email: bill.slaven@actisofttechnology.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
  • Internet Access
  • Internet Browser
  • Headphones - Recommended
  • Mobile Phone using KnowBe4 App

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 working hours Monday to Friday 0830 - 1730.
Weekend support by arrangement at an additional fee for managed service users
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Webchat accessible through company website or email link for managed service users
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Support is provided by both the reseller and software vendor, KnowBe4

No additional fee for Vendor support.

Managed Service available at an additional fee.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onboarding process with the Software Vendor, KnowBe4. Program tasks to follow from completed Questionnaire.
All onboarding is included in the price.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Download their data via CSV
End-of-contract process
Minimum Contract term is 12 months if not renewed then access is removed and all documentation is archived then securely deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Training fully accessible through KnowBe4 app and supported mobile browsers. The Phish Alert Button works if you are using Microsoft 365 and the Outlook app.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
Leverage Reporting APIs to pull data from your KnowBe4 console.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Upload own content. Edit templates & landing pages.

Scaling

Independence of resources
SLA available upon request

Analytics

Service usage metrics
Yes
Metrics types
Organisations Risk Score. Reporting of Simulated & Non-Simulated Phishing Emails. Phishing Campaign Results. Training taken by User.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
KnowBe4

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via API or CSV Export
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% Availability
Approach to resilience
WAF, Load balancing, snapshots, redundancy built in
Outage reporting
Status Webpage

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Multi-Factor Authentication & Single Sign-On
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We use the NIST Security Framework.
All endpoints are monitored and have protection.
Multi-Factor Authentication in place.
Control over websites accessed.
Email Security Gateway.
Comprehensive regular security training
Information security policies and processes
Managing Director is informed of all problems and policies are regularly updated and communicated

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All change management controlled by Software Vendor
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular reviews and monitoring of all endpoints
All endpoints kept up to date and scanned regularly. Multi-Factor Authentication and Single-Sign on.
All software is updated with security patches upon release.
Threat Intelligence services
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Endpoint monitoring
Follow procedures for dealing with a potential compromise
Immediately with reporting to the customer within 72 hours of an incident
Incident management type
Supplier-defined controls
Incident management approach
Incidents reported through monitoring and procedures are followed dependent upon the type of incident.
All reported incidents are done via a written report

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Security Awareness Training helps users have confidence in their actions, both professionally and personally, with regards to recognising phishing emails reducing the threat from being scammed therefore taking away the stress of being breached. Knowledge transfer can take place by passing on what is learnt to others who don’t have access to the training.

Pricing

Price
£2 to £37 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free Trial for up to 100 users available for Limited period of time
Link to free trial
https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bill.slaven@actisofttechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.