ThreatSim Phishing Simulations

Evaluate Your Susceptibility to Phishing and Spear Phishing

ThreatSim Phishing Simulations

Evaluate Your Susceptibility to Phishing and Spear Phishing

Our ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. Our SaaS-based interface makes it easy to deliver simulated phishing emails and customizable Teachable Moments, which display targeted "just-in-time teaching" messages to individuals who fall for a phishing test.

With ThreatSim, you can develop and administer preconfigured or customized attack campaigns in more than 35 languages. Comprehensive business intelligence features help you understand your organization’s risk and respond accordingly.

Request a Demo


Understand Your Risk with Powerful Phishing Simulation Tools

ThreatSim’s customizable email templates address three key testing factors: attachments, embedded links, and requests for personal data. No one else in the industry can offer multiple templates in one campaign, random scheduling of emails to spread out delivery, along with Auto-Enrollment into targeted training if an employee falls for an attack.

How it Works

Maximize Your Phishing Tests with Our Continuous Training Methodology

Phishing assessments are most effective when paired with interactive training and incorporated in a program that embraces our Continuous Training Methodology. Our short, interactive modules offer focused training about avoiding the dangers of phishing attacks, and our methodology maximizes learning and lengthens retention, enabling ongoing improvement and driving measurable behavior change.

About Our Methodology

Deliver 'Just-in-Time' Teaching to Your Most Susceptible Users

End users who fall for simulated attacks are automatically presented with a Teachable Moment, which offers “just-in-time” guidance that lets users know what they did wrong and offers tips to help them avoid future threats. These brief messages highlight the dangers of attacks and motivate employees to participate in follow-up training.

ThreatSim Phishing Simulations: Key Benefits and Features

Wide Variety of Customizable Templates

The ThreatSim phishing tool supports more than 600 templates across more than 30 languages. Our variety of templates address three key testing factors: embedded links, requests for personal data, and attachment downloads (.pdf, .doc, .docx, .xlsx, and .html). Average failure rates for each template are visible within the phishing tool, which allows administrators to gauge difficulty prior to campaign creation.

The acquisition of Wombat by Proofpoint allows for a unique integration, using real, “in-the-wild” data from Proofpoint’s Targeted Attack Protection. Wombat will be delivering new ThreatSim phishing templates that use Proofpoint’s threat intelligence data, helping to create simulated attacks that will challenge the user’s ability to respond to the most relevant threats of today.

Administrators can also customize the content in any template, or create their own. This flexibility allows organizations to quickly and easily create timely phishing tests that mimic threats seen in the wild and within their own networks.

Teachable Moments

We strongly suggest that all employees who fall for a ThreatSim Phishing Simulation be automatically presented with an “intervention message” (which we like to call a Teachable Moment). By utilizing “just-in-time teaching” at the moment an employee interacts with a mock phishing email, you can explain what happened, outline the dangers associated with real attacks, and give practical advice about avoiding future traps.

We offer several formats — including static and animated landing pages, short videos, and interactive challenges — for our Teachable Moments and allow you to tailor the message as you see fit. A selection of static landing pages is available in more than 30 languages, which allows your global employees to view key messages in their native languages. You can also opt to route clicks to your own internal messaging.

Learn More


Wombat was first-to-market with this time-saving feature that allows you to automatically assign follow-up training to anyone who falls for a ThreatSim Phishing Simulation. While you can still assign training to everyone, Auto-Enrollment allows you to quickly deliver targeted training to your most susceptible end users. This approach can dramatically improve the efficiency of your program and engage those who need the most attention.

Multinational Support

Multinational support allows administrators to deliver simulated attacks and Teachable Moments in more than 30 languages, which means you can assess your global employees in their native languages.

Learn More

PhishAlarm and PhishAlarm Analyzer

Our PhishAlarm® one-click email reporting tool is included with a ThreatSim license at no additional cost. This email client add-in allows employees to report suspicious messages to your security and incident response teams with a single mouse click. We recommend adding our PhishAlarm Analyzer anti-phishing email analysis tool, which utilizes machine learning to prioritize emails reported via PhishAlarm and enables faster remediation of the most dangerous threats on your network.

Learn More

Random Scheduling

This option spreads out the distribution of phishing simulations to minimize the impact to your email servers and IT helpdesk. This function also reduces the chances that employees will figure out — and discuss — the phishing test, which helps to preserve the integrity of your assessment data.

Multiple Templates in a Single Campaign

ThreatSim gives you the option to use multiple simulated attack templates in a single assessment campaign, which helps to minimize the likelihood that end users will identify the phishing test. When combined with our Random Scheduling feature, this approach provides the purest test of end-user susceptibility to a phishing attack.

Valuable Business Intelligence

ThreatSim provides extensive analytics and reporting about employee responses to various phishing attack scenarios. You’ll also know whether employees fell for an attack through a mobile phone, a tablet, or a computer; the browsers they were using; and their locations when they fell for the attack.

Learn More

Weak Network Egress

ThreatSim offers an optional Weak Network Egress function, which can help detect data egress from users’ PCs and, as a result, allow security personnel to identify and modify security controls to reduce potential threats.

Vulnerability Checks

ThreatSim gives you the option to check for browser vulnerabilities, with the capability to flag out-of-date (and potentially vulnerable) third-party plug-ins on end-user PCs.

Most importantly, it gets employees thinking about best practices and how to respond to future threats.

Learn More

System Click Exclusion

System Click Exclusion is a feature built into ThreatSim that identifies and isolates phishing simulation interactions initiated by email protection tools. This patented approach ensures an accurate view of risky end user behaviors and enables productive and efficient security education programs.

What does this provide?

Accuracy - A mechanism to ensure an accurate view of end user interactions (versus system clicks) in phishing simulations

Intuitive UI - An easy-to-use interface for creating System Click Exclusion rules for multiple system interactions based upon IP address or user agent

Reporting - Easily identify the interactions from systems instead of users to validate that all interactions are being captured

Integration with Proofpoint TAP - A seamless experience for Proofpoint Targeted Attack Protection (TAP) customers because the customer’s email protection tool clicks are already systemically whitelisted through existing integration between the ThreatSim product and TAP

New Report

2018 State of the Phish  What You Need to Know for the Year Ahead

Phishing simulation templates are very current and easy to customize to be realistic to our environment and situations.

Systems Administrator | Finance Industry

Wombat was very receptive and open to working with our organisation, we were initially given a brief introduction on the solution which gave us further insight on implementing our security awareness program. We have been able to assess our security posture with help from Wombat and have adopted the wombat continuous training methodology. The integration process was seamless. ThreatSim is also a very great feature.

Service Center Specialist | Finance Industry

Wombat Security: A Leading Behavior-Change Company

Continuous Training Methodology based on proven Learning Science Principles

Founded in 2008 based on research at Carnegie Mellon University

A leader for five consecutive years in the Gartner Magic Quadrant

Global customer base, including many Fortune 500 companies

Wombat Security: A Leading Behavior-Change Company

Continuous Training Methodology based on proven Learning Science Principles

Founded in 2008 based on research at Carnegie Mellon University

A leader for five consecutive years in the Gartner Magic Quadrant

Global customer base, including many Fortune 500 companies