Education Triggers

Delivering Just-in-Time Training and Security Education

Education Triggers

Delivering Just-in-Time Training and Security Education

Risky employee behaviors permeate all layers of a company’s defense-in-depth strategy — and even the best technical tools cannot stop end users from making bad decisions. We believe end-user training should be part of your defense-in-depth strategy: An approach that couples endpoint remediation and end-user remediation will get you closer to zero risk than technical safeguards or security awareness training could on their own. Our patented Education Triggers solution allows you to seamlessly deliver security education at the desktop, effectively marrying your endpoint and end-user remediation efforts.

Request a Demo

education_triggers

Maximize Your Security Technology Investment

Our technology partnerships help maximize your return on your investment in both endpoint security and our security education. Education Triggers allows you to use existing functionality to add an important layer to a defense-in-depth strategy. It is currently available for Wombat customers who also use Carbon Black Enterprise Response, an advanced endpoint threat detection and response solution.

education_triggers

Employ Just-In-Time Risk Reduction

By integrating our security awareness training tools with Carbon Black’s endpoint protection solution, dangerous actions become Education Triggers. You can use this joint solution to sense risky employee actions, and then deliver just-in-time training in response to those actions, which helps to lower your overall cybersecurity risk.

education_triggers

Take Advantage of Teachable Moments

Our Education Triggers enable real-time intervention through immediate follow-up in the form of Teachable Moments and training. This solution allows you to automatically deliver a training assignment to a user who does something dangerous while using their work-issued PC on your network.

education_triggers

An Ideal Counterpart to Security Education and Training

Combine responsive and proactive training to identify and address your areas of vulnerabilities. Use your security awareness training program to improve your users’ behaviors over time, and employ Education Triggers to alert your users to risky behaviors, including visiting potentially dangerous websites, using out-of-date plug-ins, opening potentially dangerous files, and downloading malware.

Education Triggers: Key Benefits and Features

Respond to Real End-User Behaviors

Education Triggers integrates with endpoint security software platforms that monitor end-user behaviors. When a trigger (risky behavior) is detected, the end user receives a Teachable Moment that is designed to explain the dangers associated with that particular action and prevent ongoing risky behavior.

We isolate Education Triggers by monitoring security events identified by endpoint threat detection products like Carbon Black Enterprise Response. Here’s how our triggers work with the Carbon Black solution:

1. A Wombat Threat Intelligence Feed has been incorporated into the Carbon Black Enterprise Response system. This feed seamlessly integrates with your current implementation of the Carbon Black software.

2. Once you activate the Wombat feed, the defined risky behaviors (e.g., interacting with the Dropbox application, use of the TOR browser, and malicious file detection) will trigger a response within our platform. (Note that you set the threshold for the number of end-user actions that must occur before a response is triggered.)

3. If a risky behavior is detected, we deliver a Teachable Moment email to the end user (once your threshold is met). This message alerts the user to the mistake that was made and offers advice about avoiding the behavior in the future.

4. Administrators can also assign more in-depth training to end users if they feel the need to escalate the situation (e.g., a user has made a similar mistake multiple times).

5. A business intelligence report gives you the ability to view the number of “hits” by type, over time, and whether a Wombat Teachable Moment was triggered. This information helps you to identify the types of risky behaviors that are happening on your network, as well as the employees who are taking those risks.

Teachable Moments

Teachable Moments help end users understand the risk they are imposing on the organization, and help raise awareness about how to avoid the risky behavior in the future.

We have seen the value of this type of real-time interaction within our simulated attack products, which immediately display Teachable Moment messages when a user interacts with a phishing test. Our training statistics show the impact of in-the-moment messaging, and the willingness of users to learn how to prevent future mistakes. Our Education Triggers make this possible in real-life situations, not just as a result of simulated attacks.

Customizable Configuration

Administrators can view activities and adjust parameters within the Education Triggers tool as needed. Not every risky behavior needs to result in a Teachable Moment or training assignment, which alleviates concerns about training fatigue. The following parameters can be customized by administrators:

  • The threshold for each trigger (i.e., the number of “hits” that must occur before a Teachable Moment is sent to a user)
  • The text with the Teachable Moments that are sent to end users
  • The maximum number of times a Teachable Moment email should be sent within a set timeframe (which protects end users from receiving too many messages)

Reporting

Administrators can use our business intelligence tools to monitor users with the most risky behaviors, enabling additional training and direct intervention if necessary. Our reporting features give you access to the following data points:

  • The total number of hits across all users and triggers
  • Number of hits and responses sent to users
  • Detailed insights into the Carbon Black information generated by the hit

Learn More About Reporting

New Report

2018 State of the Phish  What You Need to Know for the Year Ahead

Wombat is one of the most responsive vendors I work with. Answers are timely, direct, and rarely require any back and forth.

Director IT Security and Compliance | Multinational Manufacturing Company

We selected Wombat because they offer a comprehensive cybersecurity preparedness platform. Wombat's Platform enables us to assess internal risk and target training to employees who need it most, thereby strengthening our security profile. We value the opportunity to collaborate with Wombat as the company continues to expand its suite of cybersecurity training modules.

Director IT Security and Risk Management | Del Monte Foods

Wombat Security: A Leading Behavior-Change Company

Continuous Training Methodology based on proven Learning Science Principles

Founded in 2008 based on research at Carnegie Mellon University

A leader for four consecutive years in the Gartner Magic Quadrant

Global customer base, including many Fortune 500 companies

Wombat Security: A Leading Behavior-Change Company

Continuous Training Methodology based on proven Learning Science Principles

Founded in 2008 based on research at Carnegie Mellon University

A leader for four consecutive years in the Gartner Magic Quadrant

Global customer base, including many Fortune 500 companies