Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/12/2012
02:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat's New Version Of Security Training Platform To Improve Employee Response To Cybersttack

Platform enables businesses to manage their security awareness training and employee assessment program from one cloud-based, enterprise-grade solution

Wombat Security Technologies (Wombat), a leading provider of cyber security awareness training solutions, today announced the latest version of its award-winning Security Training Platform to arm Information Security Officers with the powerful tools they need to train employees how to recognize and avoid today's complex cyber-attacks. Wombat's Security Training Platform, which has recently received high industry accolades including a new "emerging group" product review from SC Magazine - is the only cyber security learning system on the market today that leverages progressive training techniques to effectively improve human response against cyber-attacks. It provides an integrated approach, combining employee assessments and in-depth training to strengthen a company's security posture. This combination allows security officers to proactively identify weaknesses and address them through a program of continuous improvement and ongoing employee training and assessments.

Recently named as a finalist of the Pittsburgh Technology Council's Tech 50 Award as well as a finalist for the Golden Bridge Business Award as a security awareness and training innovator, Wombat is launching the most powerful version of its Security Training Platform. The updated product suite addresses the market need for new methods of cyber security training that employ interactive software modules and games to engage users, coupled with employee assessments and simulated attacks to measure success – and ultimately deliver quantifiable results.

"Staying current is a big benefit of the program," said Peter Stephenson of SC Magazine. "I tend to avoid security awareness sessions because keeping the class relevant and keeping the class awake is a huge challenge. The Wombat program solves both of those issues and adds the benefit of providing ways to validate outcomes and show progress. I never have seen a more creative and effective approach to information security training."

Wombat's Security Training Platform, enables businesses to easily manage their security awareness training and employee assessment program from one cloud-based, Enterprise-grade solution. Wombat's Security Training Platform enables security officers to:

Deploy mock cyber-attacks which create teachable moments and helps employees become receptive to more in-depth training

Create training assignments for everyone at once, or for groups of employees you define, such as people who fell for mock-attacks, new hires, functional departments, geographic regions, etc.

Select from a comprehensive set of training modules (each under 10 minutes) that teach practical advice to avoid numerous threats, including the most up-to-date attacks

Monitor employee completion of assignments and deliver automatic reminders about training deadlines

Identify the users, or groups of users, who have the best or worst understanding of critical risk areas

Show measurable knowledge improvement over time with easy-to-read reports for executive management

Train global employees in multiple languages, including Spanish, Chinese, Portuguese, and French

Manage their security training program from one cloud-based system that is continually updated with new content about the latest cyber threats

"We are very pleased with the customer adoption of Wombat's Security Training Platform since launching last September. We have won companies with household names in numerous vertical markets, including some of the largest companies in the world," said Joe Ferrara, President and CEO of Wombat Security Technologies.

Ferrara continued, "In the past, the goal of security training has been to 'check the box' whether for an audit, compliance reasons, or to show company executives that the security team was doing its job. Today, successful training needs to be measured and provide actionable data about the strengths and weaknesses in any organization. With our latest version of the Security Training Platform, Wombat continues to deliver the cutting-edge security training advances needed to help today's businesses defend against increasing cyber security threats."

The latest version of Wombat's Security Training Platform is available today. For pricing and/or more information about this award-winning product, please visit http://www.wombatsecurity.com/trainingplatform.

About Wombat Security Technologies

Wombat is an innovator in helping organizations combat cyber security attacks with uniquely effective software-based security awareness training solutions and a first of its kind anti-phishing filter. Wombat's training methodology is based upon learning science principles and includes employee mock attacks with brief embedded training, as well as a full complement of 10-minute software training modules which significantly reduce an organization's susceptibility to cyber-attack. Wombat is helping Fortune 500 customers, large government agencies and small to medium businesses in segments such as financebanking, higher education, retail, technology, energy, insurance, and consumer packaged goods strengthen their cyber security defenses. For more information visit http://www.wombatsecurity.com or contact Lorraine Kauffman-Hall at 704-882-0443 or [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.
CVE-2019-6659
PUBLISHED: 2019-11-15
On version 14.0.0-14.1.0.1, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.
CVE-2019-6660
PUBLISHED: 2019-11-15
On BIG-IP 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.1, undisclosed HTTP requests may consume excessive amounts of systems resources which may lead to a denial of service.
CVE-2019-6661
PUBLISHED: 2019-11-15
When the BIG-IP APM 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.4.1, or 11.5.1-11.6.5 system processes certain requests, the APD/APMD daemon may consume excessive resources.