By sending training emails that simulate targeted attacks to employees and staff, we will develop the ability to respond to the increasingly concerning issue of targeted attacks!
■Easy to understand. Offered at a reasonable price. All processes from environmental verification (free for up to 5 licenses), preparation such as training template creation, training implementation, to result confirmation and report download can be realized with the same system. With a fixed annual contract price, you can repeatedly use the service without worrying about email sending domain restrictions, the number of emails sent, or the number of training sessions, enabling effective training. We provide an easy-to-use, high-quality service at a reasonable price. ■Rich training templates and flexible editing features for customization. Training templates are available in attachment type and phishing simulation type, with the phishing simulation type featuring an HTML editor for full customization. ■Flexible tagging feature to add attributes. Tags can be easily and flexibly added not only for departments and positions but also based on training results. ■Management tools and reporting features that show training status in real-time. The status of email views, access, downloads, etc., can be tracked for each training participant (*). (*) Depending on the mailer, system, or settings, the status may not be retrievable.
Inquire About This Product
basic information
Targeted attacks (a type of cyber attack aimed at specific information within an organization) are primarily initiated by sending emails with computer viruses attached to the members of that organization. By spoofing the subject line and address to impersonate relevant parties, the attackers aim to have the targeted organization's personnel open the email and become infected with malware. This human error is triggered by insufficient security awareness and lack of knowledge. If employee security awareness can be enhanced through education and training, it is possible to avoid damage from targeted attack emails. When receiving an email, it is important to notice any differences, be suspicious, and consult colleagues, supervisors, or security personnel without panicking, in order to respond appropriately. Therefore, regularly simulate targeted attacks through Mudfix to prepare for threats.
Price range
Delivery Time
P3
Applications/Examples of results
■Provided as a complete cloud service Customers do not need to prepare any servers or equipment.
Company information
Our company was established in January 2018, taking over the business of Giran Soft Japan, which has been focused on selling the email security solution "SPAMSNIPER" and the popular enterprise online storage "GIGAPOD." These products are used by over 50,000 companies worldwide, including Japan, and particularly the email security solution "SPAMSNIPER" has become a popular product with over 6,000 companies adopting it. Under the slogan "All for Japan Security," we will continue to provide solutions that are more helpful than ever before.