Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/12/2012
02:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Wombat's New Version Of Security Training Platform To Improve Employee Response To Cybersttack

Platform enables businesses to manage their security awareness training and employee assessment program from one cloud-based, enterprise-grade solution

Wombat Security Technologies (Wombat), a leading provider of cyber security awareness training solutions, today announced the latest version of its award-winning Security Training Platform to arm Information Security Officers with the powerful tools they need to train employees how to recognize and avoid today's complex cyber-attacks. Wombat's Security Training Platform, which has recently received high industry accolades including a new "emerging group" product review from SC Magazine - is the only cyber security learning system on the market today that leverages progressive training techniques to effectively improve human response against cyber-attacks. It provides an integrated approach, combining employee assessments and in-depth training to strengthen a company's security posture. This combination allows security officers to proactively identify weaknesses and address them through a program of continuous improvement and ongoing employee training and assessments.

Recently named as a finalist of the Pittsburgh Technology Council's Tech 50 Award as well as a finalist for the Golden Bridge Business Award as a security awareness and training innovator, Wombat is launching the most powerful version of its Security Training Platform. The updated product suite addresses the market need for new methods of cyber security training that employ interactive software modules and games to engage users, coupled with employee assessments and simulated attacks to measure success – and ultimately deliver quantifiable results.

"Staying current is a big benefit of the program," said Peter Stephenson of SC Magazine. "I tend to avoid security awareness sessions because keeping the class relevant and keeping the class awake is a huge challenge. The Wombat program solves both of those issues and adds the benefit of providing ways to validate outcomes and show progress. I never have seen a more creative and effective approach to information security training."

Wombat's Security Training Platform, enables businesses to easily manage their security awareness training and employee assessment program from one cloud-based, Enterprise-grade solution. Wombat's Security Training Platform enables security officers to:

Deploy mock cyber-attacks which create teachable moments and helps employees become receptive to more in-depth training

Create training assignments for everyone at once, or for groups of employees you define, such as people who fell for mock-attacks, new hires, functional departments, geographic regions, etc.

Select from a comprehensive set of training modules (each under 10 minutes) that teach practical advice to avoid numerous threats, including the most up-to-date attacks

Monitor employee completion of assignments and deliver automatic reminders about training deadlines

Identify the users, or groups of users, who have the best or worst understanding of critical risk areas

Show measurable knowledge improvement over time with easy-to-read reports for executive management

Train global employees in multiple languages, including Spanish, Chinese, Portuguese, and French

Manage their security training program from one cloud-based system that is continually updated with new content about the latest cyber threats

"We are very pleased with the customer adoption of Wombat's Security Training Platform since launching last September. We have won companies with household names in numerous vertical markets, including some of the largest companies in the world," said Joe Ferrara, President and CEO of Wombat Security Technologies.

Ferrara continued, "In the past, the goal of security training has been to 'check the box' whether for an audit, compliance reasons, or to show company executives that the security team was doing its job. Today, successful training needs to be measured and provide actionable data about the strengths and weaknesses in any organization. With our latest version of the Security Training Platform, Wombat continues to deliver the cutting-edge security training advances needed to help today's businesses defend against increasing cyber security threats."

The latest version of Wombat's Security Training Platform is available today. For pricing and/or more information about this award-winning product, please visit http://www.wombatsecurity.com/trainingplatform.

About Wombat Security Technologies

Wombat is an innovator in helping organizations combat cyber security attacks with uniquely effective software-based security awareness training solutions and a first of its kind anti-phishing filter. Wombat's training methodology is based upon learning science principles and includes employee mock attacks with brief embedded training, as well as a full complement of 10-minute software training modules which significantly reduce an organization's susceptibility to cyber-attack. Wombat is helping Fortune 500 customers, large government agencies and small to medium businesses in segments such as financebanking, higher education, retail, technology, energy, insurance, and consumer packaged goods strengthen their cyber security defenses. For more information visit http://www.wombatsecurity.com or contact Lorraine Kauffman-Hall at 704-882-0443 or [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.