Wombat is now part of Proofpoint. Learn More >
About Proofpoint
  • Products
    • Security Awareness Training
    • Simulated Phishing and Knowledge Assessments
    • Training Modules, Videos and Materials
    • Business Intelligence
    • Multinational
    • Integrations
  • Services
    • About Us
      • Our Company
      • Our Partners
      • Press Releases
      • Careers
      • News
      • Why a Wombat?
      • Events
      • Awards
    • Standard Support
    • Customer Success Manager
    • Managed Services
  • Why Proofpoint?
  • Packages
  • Resources
  • About Us
    • Our Company
    • Our Partners
    • Press Releases
    • Careers
    • News
    • Why a Wombat?
    • Events
    • Awards
    • Resources
  • +1 (412) 621-1484
  • Blog
  • Support
  • +1 (412) 621-1484
  • Blog
  • Support
Proofpoint Logo
  • Products
  • Services
  • Why Proofpoint?
  • Packages
  • Resources
  • About Us
Request a Demo

Security Awareness Training

Simulated Phishing and Knowledge Assessments

Training Modules, Videos and Materials

Phishing Email Reporting and Analysis

Business Intelligence

Multinational

Integrations

Standard Support

Customer Success Manager

Managed Services

Our Company

Our Partners

Press Releases

Careers

News

Why a Wombat?

Events

Awards

Proofpoint Security Awareness Training

Turn your end users into a strong last line of defense against phishing and other cyberattacks.

Try Our Security Awareness Training Request a Demo

Proofpoint Security Awareness Training

Turn your end users into a strong last line of defense against phishing and other cyberattacks.

Try Our Security Awareness Training Request a Demo

Overview

Engage your end users and arm them against real-world cyber attacks, using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.

Our SaaS-based solutions and Continuous Training Methodology were developed by Wombat Security Technologies (acquired in March 2018) and born from research at the world-renowned Carnegie Mellon University. Using them, customers have reduced successful phishing attacks and malware infections by up to 90%.

  • paper-plane

    Simulated Phishing and Knowledge Assessments

  • laptop-1

    Interactive Training, Videos, & Materials

  • email

    Email Reporting & Analysis

  • pie-chart

    Reporting

  • integrations

    Integrations

  • multinational

    Multinational Support

Benefits & Features

  • user-activity

    Assess Users with Real-World Lures

    To educate end users without wasting time, you first need to identify their individual vulnerabilities, as well as broader cybersecurity concerns for your organization. Our ThreatSim® Phishing Simulations help you assess users’ susceptibility to phishing and spear-phishing attacks, with email templates based on real phishing lures spotted “in the wild” by Proofpoint threat intelligence. We also offer CyberStrength® Knowledge Assessments, a powerful web-based tool that helps you measure users’ understanding of critical cybersecurity topics and track progress over time, driving continuous improvement.

    Learn About Phishing & Knowledge Assessments

State of the Phish Report

Download Now

  • security-improvement

    Train Your Last Line of Defense

    Effective security awareness training turns your end users into a strong last line of defense against cyberattacks. To engage users and keep security top-of-mind, we offer a growing, continuously updated library of interactive training modules, videos, posters, images, and articles—all with consistent, actionable messaging suitable for global organizations. Our customizable education content covers a broad range of security risks, from phishing attacks to insider threats, and is available in 35+ languages. We also make it easy to alert your users to the most relevant phishing attacks and lures through our Attack Spotlight series—brief, timely content that teaches how to spot a current threat and avoid becoming a victim.

    Learn About Training Modules & Materials
  • targeted-phishing

    Stop Active Phishing Attacks

    Knowledgeable users are key to identifying—and stopping—phishing attacks that slip through perimeter technology. Our PhishAlarm® button lets your users report suspicious messages with a single mouse click. A companion tool, PhishAlarm® Analyzer prioritizes reported messages and improves incident response, reducing the window of risk associated with active phishing attacks. Both tools are integral to Proofpoint CLEAR (Closed-Loop Email Analysis and Response). This solution streamlines both end-user reporting and remediation tasks, reducing the time needed to neutralize an active threat from hours to minutes.

    Learn About Email Reporting and Analysis
  • hand-shake-agreement

    Measure Results, Share Insights

    Our robust reporting tools help you identify areas of susceptibility, share results with stakeholders, and deliver targeted training when and where it’s most needed. We offer responsive, easy-to-read reporting with a modern UI that makes it easy to benchmark, track, and trend user knowledge; evaluate progress; and gauge ROI. You can download and export data in several formats, and use the Automated Reporting feature to schedule automatic delivery of reports at regular intervals to yourself and others within your organization.

    Learn About Business Intelligence

Key Administrative Features

  • hand-shake

    Multinational Support

    Consistent training for global organizations, translated and localized into 35+ languages

    Learn More
  • network

    Integrations

    Builds on existing infrastructure, from your LMS and email clients to perimeter defenses.

    Learn More
  • strategy

    Admin Features

    Easy-to-use, purpose-built interface for efficient program management and monitoring.

    Learn More
  • control-results

    Proven Methodology

    Maximizes learning and retention through cyclical assessment, education, reinforcement, and measurement.

    Learn More
  • focus

    Accessibility

    Training modules conform to the US Section 508 standard and WCAG 2.0 AA standard.

  • economy

    End-User Sync

    Syncs with Microsoft Active Directory and Azure, automating user and group management tasks.

    Learn More
View All Features
Since our decision to partner with Wombat, we have experiences far fewer technology security issues and have been able to broaden our staff’s awareness in the area of cybersecurity. We are very satisfied with Wombat’s web solution for security awareness training and hope to keep offering our employees this excellent learning experience
Karen Diggs , Director of Technology
North West Hendricks School Corporation , Lizton, Indiana
We have been using Wombat for over two years now and one of the reasons we chose to go with them was not just because we felt the product offered more than their competitors technically, but also because the user education experience had the edge with tone, pace and multinational options. The product itself is constantly evolving, and there’s always something new to offer our colleagues by way of education
Lesley Marjoribanks , Customer & Colleague Security Awareness Manager
Royal Bank of Scotland
This was entertaining and helpful. Good use of interactive activities and immediate feedback for learning.
HR Manager
Non-Profit Organization

Try Our Security Awareness Training

Protect your company from the inside-out
Visit Proofpoint

Try It Now

Our Approach

  • Continuous Training Methodology
  • Learning Science Principles

Wisdom

  • Conference
  • Community
  • Insiders

About

  • Our Company
  • News
  • Events
  • Careers
  • Privacy Policy
  • Website Terms of Use

Connect With Us

Contact

  • Locations & Contact Us
  • Customer Support
  • RFP Template Request
proofpoint-footer-logo-1

Try our Training Modules

Our video, interactive, and game-based training modules in topics like Email Security, URL Training, Mobile App Security, and more are proven to change the behavior of end users and reduce risk.

Try the Modules

Copyright © 2019 Proofpoint Inc. All Rights Reserved.
Privacy Policy Terms of Service