Gretel Egan | November 19, 2018

We’ve Been Named a Gartner MQ Leader for the Fifth Consecutive Year

WombatProofpoint_Blog_GartnerMQ_Nov2018Leading IT research and advisory firm Gartner, Inc. has released its 2018 Magic Quadrant for Security Awareness Computer-Based Training (CBT), and we’re excited and honored to share that we have been recognized as a Leader for the fifth year in a row.* Our strong position this year reflects our Completeness of Vision and Ability to Execute — and we ranked highest in the latter metric.

 “Our position as a Gartner Magic Quadrant leader for five consecutive years underscores our commitment to providing exceptional, innovative security awareness training and phishing simulation to organizations worldwide,” said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint. “Proofpoint’s highly personalized security awareness training, which is backed by our best-in-class threat intelligence and real-time data, has the proven ability to educate employees, change behaviors, and reduce organizational risk.”**

magic_quadrant_for_security__2018

Thirteen vendors were evaluated for this fifth annual Security Awareness CBT Magic Quadrant. For those unfamiliar with Gartner’s Magic Quadrant approach, it provides a graphical competitive positioning of providers in fast-growing technology markets, and divides these providers into Leaders, Visionaries, Challengers, and Niche Players. The goal of this visual representation of the market is to help organizations quickly identify the technology providers that best positioned to help them succeed.

color_bar.png

Download a copy of the Magic Quadrant for Security Awareness Computer-Based Training.

Read the Gartner Report

color_bar.png

Continuing to Deliver Leading Security Awareness Training

We have been a Leader in the Security Awareness CBT Magic Quadrant since it was first published five years ago, and we believe our continued leadership position, following our acquisition by Proofpoint in March, shows our commitment to moving the security awareness training market forward. Following are some of the recent product innovations that are allowing our customers to deliver effective cybersecurity education that changes end-user behavior and reduces risk:

Training Customization and Personalization

In February, we launched our configurable Password Policy training module, which allows organizations to teach their end users to create strong, effective passwords that comply with specific company policies. Training customization and personalization will be continued areas of focus for us into 2019 and beyond. Our all-new customization center will allow administrators to modify training modules to meet their specific needs. In addition, we will continue to offer more opportunities for organizations to deliver the right content, to the right people, at the right time, further targeting their training in response to emerging threats and end-user behaviors.

Proofpoint Integration

Proofpoint’s focus on people-centric cybersecurity solutions marries with our goal to help organizations improve end-user behaviors and build a stronger last line of defense against phishing, ransomware, and other cyberattacks. Two recent announcements show our ability to integrate Proofpoint’s world-class products and industry-leading threat intelligence with our security awareness training portfolio and expertise:

  • Closed-Loop Email Analysis and Response (CLEAR) – Our new CLEAR solution combines Wombat’s PhishAlarm® email client add-in and PhishAlarm Analyzer email prioritization tool with Proofpoint Threat Response Auto Pull (TRAP) to streamline end-user reporting of — and security response to — potential phishing attacks. CLEAR allows users to quickly and easily report suspicious emails directly from their desktop or mobile device. Once reported, CLEAR automatically analyzes messages against multiple intelligence and reputation systems, reducing an organization’s typical threat triage time from days to minutes, without requiring additional work from human analysts.
  • Attack Spotlight – Our Attack Spotlights combine Proofpoint threat intelligence and Wombat security awareness tools to provide free, timely, actionable content organizations can use to arm end users against the ever-evolving phishing threat. We release new Attack Spotlights as pressing threats are identified, which means the time between spotting a trending attack and informing end users can be reduced dramatically, from months to days.

Ongoing and deeper integrations with Proofpoint products will ensure that your "Very Attacked People" get the knowledge they need to defend themselves against the advanced threats of today.

Proprietary Research That Provides Actionable Insights Into End-User Behaviors

We analyze our own wealth of security awareness training data and commission independent surveys throughout the year in order to deliver research reports that help organizations identify trends in end-user behaviors and better understand continued knowledge gaps that are putting security postures at risk. This year, we released new editions of our compelling and widely quoted State of the Phish™ and Beyond the Phish® reports, and significantly expanded the scope of our recently published 2018 User Risk Report, which features the results of a survey of 6,000 working adults across six countries (the US, UK, France, Germany, Italy, and Australia). All three pieces of research are excellent resources for any organization that is seeking real-world insights into the need for security awareness training and the types of activities that can minimize end-user risk.

More Innovations to Come in 2019

It is gratifying to again be named a Leader and to be recognized by Gartner for our efforts to deliver the best security awareness training solutions to organizations of all sizes, across all industries, and in all global locations. We marked our 10th anniversary earlier this year, and we know we’ve come a long way since the days when our founders pioneered the use of simulated phishing attacks — but we won’t rest on our laurels. We will continue to lead and innovate in the years ahead as we work to bring the most effective cybersecurity education tools to organizations and end users around the world.

“Cybercriminals are targeting people, not infrastructure, to access critical systems, siphon funds, and steal information. It’s essential to educate today’s workforce on how to identify and help stop the near-constant onslaught of cyberattacks that they will undoubtedly face,” said Kalember.

 

* Source: Gartner, Magic Quadrant for Security Awareness Computer-Based Training, Joanna G. Huisman, 13 November 2018.  

** In 2014, 2015, 2016, and 2017, Wombat Security Technologies was positioned as a Leader in this Gartner Magic Quadrant. Wombat was acquired by Proofpoint in March 2018 and now operates as Wombat Security, a division of Proofpoint.

 

Please note: This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://www.wombatsecurity.com/wombat-named-a-leader-2018

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Subscribe to Our Blog

2018 State of the Phish Report  Protect your organization from phishing attacks. Download Now
2018 Beyond the Phish Report  Protect your organization from threats including and beyond phishing. Download Now