Phished References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1402)
    82+ References
  • 4.7 / 5.0 (5032)
    Verified442+ References
  • 4.8 / 5.0 (854)
    218+ References

Phished Case Studies

  • How General Hospital Jan Portaels Saves Time And Risks

  • Enterprise-level solutions, for smaller customers as well WDO IT

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References82 total
    About

    IRONSCALES is the leading cloud email security platform for the enterprise and the industry’s only solution that uses AI and human insights (HI) to stop advanced phishing. Its award-winning, self-learning platform continuously detects and remediates attacks like BEC, ATO, and VIP impersonation that bypass traditional security solutions. Powerful, simple, and adaptive, IRONSCALES helps enterprises reduce risk, boost security team efficiency, and increase cybersecurity awareness. IRONSCALES is headquartered in Atlanta, Georgia, and is proud to support more than 10,000 global enterprises. Visit http://www.ironscales.com or @IRONSCALES.

  • Reference Rating
    4.7 / 5.0
    Customer References442 total
    About

    Mimecast delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 7,000 customers and 1.7 million users worldwide and has offices in Europe, North America, Africa and the Channel Islands.

  • Reference Rating
    4.7 / 5.0
    Customer References218 total
    About

    SoSafe is the fastest-growing security awareness scale-up worldwide. By putting people first and focusing on behavioral science, they are disrupting the security awareness status-quo. Comprehensive analytics measure ROI and tell organizations where vulnerabilities lie. Programs are easy to deploy and scale, fostering secure behavior in every employee.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked