Sophos Phish Threat Primary Use Case

HM
Chief Information Security Officer and Founder at a insurance company with 201-500 employees

Sophos Phish Threat product is the solution we integrated into our infrastructure when I became the Chief Information Security Officer. It is a good solution because it is used for sensitizing our staff to the risk linked to information security. Additionally, we measure and confirm the efficiency of staff after awareness campaigns. If they are not fully aware then they have to complete the training again.

View full review »
Faisal Mian - PeerSpot reviewer
CTO at ABM Info. tech

The solution is mostly used in the banking sector when they want to have penetration testing. They use this tool to check if they are compliant with the policies and procedures of the financial institute. That use case was one I was told to be engaged with and aware I am of that.

View full review »
ZE
Pre-sales manager at National Information Technology Company

Sophos Phish Threat is primarily used for email. It is used for filtering and securing your email.

View full review »
Buyer's Guide
CybeReady vs. Sophos Phish Threat
November 2022
Find out what your peers are saying about CybeReady vs. Sophos Phish Threat and other solutions. Updated: November 2022.
653,584 professionals have used our research since 2012.
Amir Kasem - PeerSpot reviewer
Technical manager at Andalusia Hai Aljamea Hospital

The solution is primarily used to help users be aware of threats. We can train users to help them understand how to work with the security features, security threats, and security attacks. It is like a training center.

View full review »
Terry Cheung - PeerSpot reviewer
Managing Director at TopSOC

Sophos Phish Threat is a phishing simulation email platform.

View full review »
Buyer's Guide
CybeReady vs. Sophos Phish Threat
November 2022
Find out what your peers are saying about CybeReady vs. Sophos Phish Threat and other solutions. Updated: November 2022.
653,584 professionals have used our research since 2012.