WOMBAT SECURITY

IS NOW PROOFPOINT SECURITY AWARENESS TRAINING

Wombat was born from research at the world-renowned Carnegie Mellon University (CMU). Our company was founded in June 2008 by Drs. Norman Sadeh, Jason Hong, and Lorrie Cranor — all faculty members at the CMU School of Computer Science. While at CMU, our cofounders led the largest national research project on combating phishing attacks. Their goal was to address the human element in cybersecurity and develop novel, more effective anti-phishing filtering solutions. This project, funded by the National Science Foundation and the Department of Defense, yielded a uniquely effective suite of cybersecurity software training and filtering technologies. These technologies provided the foundation for our Security Education Platform and our unique Continuous Training Methodology.

Today, recognized as one of the fastest-growing technology companies in North America, we are headquartered in Pittsburgh, PA and have offices in Denver, CO and London, UK — as well as global network of partner organizations. In March 2018, Wombat was acquired by Proofpoint, Inc., a leading cybersecurity company. We are helping Fortune 1000 and Global 2000 customers in industry segments such as finance, technology, banking, higher education, retail, and consumer packaged goods to strengthen their cybersecurity defenses. Our Security Education Platform includes integrated knowledge assessments, a library of simulated attacks, and interactive training modules, which have been proven to reduce successful phishing attacks and malware infections by up to 90%.


SOLUTIONS

Train end users to recognize and avoid security risks—without wasting their time.

Effective Training, Without Waste
Turn your end users into a strong last line of defense against today’s cyber attacks with our research-based security awareness training. Our people-centric cybersecurity training is personalized to individuals’ needs, efficient for end users to complete, and—above all—effective at changing behaviors and reducing risk at every level of your organization.

Our curated, actionable content draws on proven Learning Science Principles, using a unique Continuous Training Methodology. Users get hands-on practice at recognizing and avoiding a wide range of security risks with our constantly growing library of education content. Our interactive training modules, videos, posters, images, and articles are designed to drive security awareness and make cybersecurity an ongoing topic of conversation with your end users.

Engaging, Updated Content
We continuously update our training content to reflect evolving best practices and current attack trends identified through Proofpoint threat intelligence. Our interactive training modules, videos, posters, images, and articles are available in 35+ languages, and offer consistent, actionable messaging suitable for global organizations. (A full list of topics and content types is available below.)

Interactive training modules are available on demand and mobile-responsive, so your users can take our training anytime, anywhere, on any connected device, minimizing disruption to daily work routines. Each module averages just 5 to 15 minutes, and content can be tailored to your organization’s needs using our self-service Customization Center. Videos, modules, and other content can be customized in a variety of ways.

Train end users to recognize and avoid security risks—without wasting their time.

Effective Training, Without Waste
Turn your end users into a strong last line of defense against today’s cyber attacks with our research-based security awareness training. Our people-centric cybersecurity training is personalized to individuals’ needs, efficient for end users to complete, and—above all—effective at changing behaviors and reducing risk at every level of your organization.

Our curated, actionable content draws on proven Learning Science Principles, using a unique Continuous Training Methodology. Users get hands-on practice at recognizing and avoiding a wide range of security risks with our constantly growing library of education content. Our interactive training modules, videos, posters, images, and articles are designed to drive security awareness and make cybersecurity an ongoing topic of conversation with your end users.

Engaging, Updated Content
We continuously update our training content to reflect evolving best practices and current attack trends identified through Proofpoint threat intelligence. Our interactive training modules, videos, posters, images, and articles are available in 35+ languages, and offer consistent, actionable messaging suitable for global organizations. (A full list of topics and content types is available below.)

Interactive training modules are available on demand and mobile-responsive, so your users can take our training anytime, anywhere, on any connected device, minimizing disruption to daily work routines. Each module averages just 5 to 15 minutes, and content can be tailored to your organization’s needs using our self-service Customization Center. Videos, modules, and other content can be customized in a variety of ways.

Phishing Email Reporting and Analysis

Identify and stop phishing attacks that slip through technological perimeter defenses.

Even with advanced email protection tools, a small percentage of malicious messages still end up in users’ inboxes. Our PhishAlarm® phishing button empowers users to report phishing emails and other suspicious messages with one mouse click, and PhishAlarm® Analyzer helps response teams identify and remediate the most pressing threats. Both tools are integral to Proofpoint’s innovative Closed-Loop Email Analysis and Response (CLEAR) solution.

PhishAlarm and PhishAlarm Analyzer Features and Benefits

A User-Friendly Phishing Button

Knowledgeable users are key to identifying—and stopping—phishing attacks that slip through technological perimeter defenses. A simple but effective email client add-in, PhishAlarm makes it easy for your users to report phishing, dramatically reducing the duration and impact of an active phishing attack. A valuable addition to security awareness training, PhishAlarm also reinforces positive behavior by immediately thanking users (via a pop-up message or email) for reporting suspicious emails.

Time-Saving Threat Prioritization

A companion to PhishAlarm, PhishAlarm Analyzer provides a real-time ranking of reported emails in order of threat potential, allowing your response team to save time by focusing on the most imminent and dangerous threats within your network. While other tools rank reported messages based on the users’ level of “trustworthiness” and “accuracy,” PhishAlarm Analyzer classifies an email’s content using machine learning and standard security indicators of compromise (IOCs), taking into account known threat vectors obtained from established databases and technical resources.

CLEAR Features and Benefits

Neutralize Phishing Attacks in Minutes

Closed-Loop Email Analysis and Response (CLEAR) is an integrated solution that streamlines end-user reporting and security response to phishing attacks. By combining the PhishAlarm and PhishAlarm Analyzer products with Proofpoint’s Threat Response Auto-Pull (TRAP), CLEAR reduces the time needed to neutralize an active phishing threat from hours to minutes.

Learn More
Discover how SecureNation can help you better protect your IT assets.