Complementary Gartner Report: Peer Insights ‘Voice of the Customer’ – Security Awareness CBT

We’re pleased to announce InfoSec Institute is named to the Customers’ Choice Zone of the Gartner Peer Insights ‘Voice of the Customer’: Security Awareness Computer-Based Training Market Report.

Free from vendor influence, Gartner Peer Insights research reports are based on enterprise professionals’ software and service reviews and first-hand experiences through various stages of the IT life cycle – from evaluation through deployment. This report includes eligible vendors with at least 25 reviews on Gartner Peer Insights in the past one year as of April 30, 2018, in the Security Awareness CBT category.

With an overall rating of 4.7 out of 5, here are some of the things our clients said about InfoSec Institute and their SecurityIQ platform:

  • “We needed a vendor that could provide a viable phishing campaign solution. The solution needed to be easy to deploy, but believable by [end users]. InfoSec Institute certainly provided all that and much more without breaking the budget at the same time. They have provided excellent support, the templates are all professional looking, and have worked beyond our expectations.” — Senior Engineer, Services Industry
  • “The training provided guidance for different end users within our organization. We were able to fine tune which employees received which module set to allow for maximum efficiency. The in-depth modules provided a more technical approach for our IT users and Developers while the basic modules covered common risk scenarios applicable to the entire organization.” — Security Engineer, Financial Services
  • “Every part of our experience has been exceptional. Could not ask for better customer service! The client success manager is an invaluable piece to streamline implementation!” —Information Security Liaison, Education
  • Read more reviews

We’re honored and thrilled to be distinguished as a Customers’ Choice Zone vendor and give a big “thank you” to our (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Kristin Zurovitch. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/A9ALBZgcBSI/