Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Asset Monitor keeps track of all your external facing assets and services. Our protection capabilities and your risk profile will change as your technology footprint changes. Our expert training guides and simulated scams will help you teach your staff cyber security basics so they don't fall for attacks that could expose your company. Dark Web Monitor alerts to data leaks such as credit card numbers, personal information, and credentials. To find out if there are any data breaches, we monitor more than 350 cyber criminal groups. Our dashboard makes it easy to stay on top of cyber security issues. Our Hack Monitor scans the Internet for signs that cyber criminals may be targeting your company, or that you have been hacked but don't know it. Vulnerability Monitor scans your infrastructure for vulnerabilities that hackers could exploit.

Description

Each year, our penetration tests reveal that the greatest vulnerability for most organizations stems from their personnel. In particular, social engineering and spear-phishing schemes can result in various threats, such as ransomware attacks, account takeovers, data breaches, and even data loss. Consequently, as your organization expands, the potential for human-related vulnerabilities also increases. Fortunately, educating your employees on how to resist social engineering attacks can significantly reduce these risks, making it an essential element of your cybersecurity strategy. At Silent Breach, we have developed a comprehensive online security awareness training program tailored to the evolving needs of today's workforce. Our Quantum Training platform enables your team to engage in training at their convenience through a series of brief videos, interactive quizzes, and phishing simulations, ensuring they are well-prepared to tackle potential threats. By investing in this training, you not only enhance your security posture but also foster a culture of vigilance among your staff.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$99
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

DynaRisk

Founded

2015

Country

United Kingdom

Website

www.dynarisk.com/business/breachdefence

Vendor Details

Company Name

Silent Breach

Founded

2015

Country

United States

Website

silentbreach.com/qam-training.php

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Infrastructure Monitoring

Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Product Features

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Alternatives

Alternatives

MetaPhish Reviews

MetaPhish

MetaCompliance