SecurityIQ Selected from Dozens of Products Based on Verified Client Feedback & Ratings
InfoSec Institute, developers of SecurityIQ security awareness training, today announced it is a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training. Gartner Peer Insights Customers’ Choice distinctions are based on both quantity and quality of verified user reviews.
“We’re thrilled our clients named us a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training,” said Jack Koziol, InfoSec Institute CEO. “With over 30 vendors in this space, we believe it’s an honor to receive this distinction.”
InfoSec Institute, also recognized in the October 2017 Gartner Magic Quadrant for Security Awareness Computer-Based Training, integrates security awareness training, phishing simulations and personalized learning in one platform to drop organizational phishing susceptibility rates and motivate behavioral change. The platform features 768 training modules and 51 assessment modules in 20 languages.
SecurityIQ is rated 4.7 out of 5 stars on Gartner Peer Insights based on 80 verified client ratings. Reviews include:
- “Easy to use. The videos are great and it immediately started to increase awareness.” — Director IT in the Healthcare Industry
- “This is a great product that works you through securing the human! This is more of an information literacy product!” — CIO in the Education Industry
- “Their engineering team was willing to work with us to provide custom content and UI. Implementation was a breeze and they walked me through step-by-step on setting up our first campaign.” — Senior Information Security Engineer in the Finance Industry
- “Every part of our experience has been exceptional. Could not ask for better customer service! The client success manager is an invaluable piece to streamline implementation!” — Information Security Liaison in the Education Industry
“Since launch, SecurityIQ has and will remain (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/smztcRf_VuA/