Best Security Awareness Training Programs for Okta

Find and compare the best Security Awareness Training programs for Okta in 2026

Use the comparison tool below to compare the top Security Awareness Training programs for Okta on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Adaptive Security Reviews
    See Program
    Learn More
    Adaptive Security is OpenAI’s investment for AI cyber threats. The company was founded in 2024 by serial entrepreneurs Brian Long and Andrew Jones. Adaptive has raised $50M+ from investors like OpenAI, a16z and executives at Google Cloud, Fidelity, Plaid, Shopify, and other leading companies. Adaptive protects customers from AI-powered cyber threats like deepfakes, vishing, smishing, and email spear phishing with its next-generation security awareness training and AI phishing simulation platform. With Adaptive, security teams can prepare employees for advanced threats with incredible, highly customized training content that is personalized for employee role and access levels, features open-source intelligence about their company, and includes amazing deepfakes of their own executives. Customers can measure the success of their training program over time with AI-powered phishing simulations. Hyper-realistic deepfake, voice, SMS, and email phishing tests assess risk levels across all threat vectors. Adaptive simulations are powered by an AI open-source intelligence engine that gives clients visibility into how their company's digital footprint can be leveraged by cybercriminals. Today, Adaptive’s customers include leading global organizations like Figma, The Dallas Mavericks, BMC Software, and Stone Point Capital. The company has a world class NPS score of 94, among the highest in cybersecurity.
  • 2
    RansomLeak Reviews

    RansomLeak

    RansomLeak

    $8/year/user
    RansomLeak is an innovative platform for security awareness training that replaces traditional videos and slides with engaging 3D simulations. Employees encounter a variety of realistic scenarios, including phishing emails, social engineering phone calls, and decisions related to data management and physical security, all based on established attack patterns. Each interactive simulation adapts to the decisions made by the employee, providing insight into the potential outcomes of actual cyberattacks. The training approach is grounded in cognitive science principles, particularly focusing on experiential learning and the technique of active recall. To further enhance user engagement, gamification elements such as points, badges, and leaderboards are incorporated, significantly increasing completion rates among large teams. The platform can be deployed as SCORM 1.2/2004 packages compatible with various LMS platforms like Cornerstone, Workday, SAP SuccessFactors, Docebo, 360Learning, Moodle, Canvas, and Blackboard, or utilized as a standalone cloud-based LMS that features user management, real-time analytics, campaign scheduling, SSO/MFA, and white labeling capabilities. Developed by the same team that created Kontra Application Security Training, RansomLeak aims to strengthen organizational security by equipping employees with practical skills in a dynamic and immersive learning environment.
  • 3
    Innvikta Reviews

    Innvikta

    Innvikta Cybersecurity Solutions

    Free
    2 Ratings
    One-off, off-the-shelf training cannot validate your unique vision of cybersecurity. In this rapidly changing threat environment, a customized and continuous curriculum that speaks to YOUR co-workers about YOUR security policy is needed. Innvikta’s Security Awareness Training Platform(InSAT) enables organizations to deliver an effective training program. Features include Attack replication, Just-in-time training, auto-enrollment into courses, dynamic landing pages, etc. Our unique business model allows us to provide our clients with customized training content specific to their security policies. This allows for a highly relatable and engaging learning experience for the users.
  • 4
    Code42 Reviews
    Welcome to the realm of data security tailored for collaborative and remote enterprises. Ensure that approved collaboration tools like Slack and OneDrive are being used correctly. Identify unauthorized applications that could signal deficiencies in the available corporate tools or employee training. Achieve insight into file activities occurring off the corporate network, including uploads to the web and the use of cloud synchronization applications. Swiftly identify, probe, and address instances of data exfiltration carried out by remote workers. Stay informed with activity alerts that are triggered by specific file types, sizes, or quantities. Furthermore, utilize comprehensive user activity profiles to enhance the efficiency of investigations and responses, ensuring a robust security posture in a dynamic work environment.
  • 5
    IRONSCALES Reviews

    IRONSCALES

    IRONSCALES

    $4.50 per user per month
    IRONSCALES offers an API-connected, AI-driven email security and training solution to help companies defend against advanced phishing attacks. We believe that phishing is a human + machine problem that can only be solved with a human + machine solution. This unique approach sets us apart from our competitors in this space.
  • 6
    Keepnet Labs Reviews
    Keepnet's extended platform for human risk management empowers organizations to build security cultures with AI-driven simulations, adaptive training and automated phishing responses. This helps eliminate employee-driven risks, insider threats and social engineering within your organization and beyond. Keepnet continuously assesses the human behavior through AI-driven simulations of phishing across email, SMS and voice, QR codes, MFA and callback phishing. This helps to reduce human-driven cybersecurity risks. Keepnet's adaptive learning paths are tailored for each individual based on their risk level, role, and cognitive behavior. This ensures that secure behaviors are embedded in order to continuously reduce cyber risk. Keepnet empowers its employees to report threats immediately. Security admins can respond 168x quicker using AI-driven analysis, automated phishing responses and automated responses. Detects employees that click on phishing links frequently, mishandle information, or ignore security policy.
  • 7
    Cyberly Reviews
    Cyberly serves as a human-risk management platform that prioritizes the protection of organizations by addressing the human aspect of cyber threats. It provides employees with practical training through realistic phishing and deep-fake scenarios, enabling them to identify suspicious activities like verifying the identities of recruiters, questioning unexpected software requests, and recognizing social-engineering cues. Additionally, the platform features an “AI teaching co-pilot” that actively engages teams in contemporary awareness training, moving away from old-fashioned, passive approaches to more interactive and scenario-driven exercises. By utilizing its simulations and analytical insights, Cyberly aids organizations in fostering a more robust security culture, minimizing risks associated with human error, and enhancing employee awareness in areas like phishing, identity theft, and internal threats. Ultimately, this approach not only strengthens the organization’s defenses but also empowers employees to become proactive guardians of security.
  • 8
    Dune Security Reviews
    Prevent sophisticated social engineering attacks with user-adaptive security awareness training, red team analysis, and adaptive controls. Historically the biggest challenge for enterprise security teams, this trend is worsening with new trends that increase the sophistication and scale of attacks on end users. Cybercriminals use AI tools like ChatGPT to create highly convincing phishing attacks, increasing both sophistication and scale. APTs and state-sponsored attacks use complex social engineering techniques to gain and maintain long-term access to targeted systems. BEC attacks manipulate users into transferring funds or disclosing sensitive information by impersonating executives or trusted partners. Our configurable solutions enable you to build a program tailored to your organization's needs. Training modules adjust based on user behavior and risk level, enhancing learning effectiveness and engagement.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB