SecurityCoach Key Features

Capabilities To Build Custom Campaigns, Measure And Report, And Reduce SOC “Burn Out”

SecurityCoach provides the right education to the right people via an array of integrations to your existing security products and a robust collection of features and capabilities. It takes alerts generated by your security stack, analyzes them, identifies events related to risky security behavior, and sends a SecurityTip to the appropriate user.

Key Capabilities

Real-Time Security Coaching

Real-Time Coaching

Real-time coaching campaigns allow you to coach your users about risky behavior in real time. When risky activity is detected, your users will receive a SecurityTip about the activity and how to avoid it in the future.

SecurityTip Notifications

SecurityTip Notifications

At the moment risky behavior is detected, SecurityCoach sends a real-time SecurityTip directly to that user via Google Chat, Microsoft Teams, Slack or email. These immediate notifications are a powerful enhancement to your security awareness program.

API-Based Vendor Integrations

API-Based Vendor Integrations

Utilize vendor APIs to quickly and easily integrate with your existing security stack vendors such as CrowdStrike, Microsoft, Cisco, Netskope, Zscaler and more. Our ecosystem of technology partnerships is rapidly expanding to support our customers and strengthen the human firewall.

Built-In Detection Rules

Built-In Detection Rules

Detection rules specify what risky activity you want to track using the data provided by your integrated security vendors. SecurityCoach recommends rules based on common security topics in order of priority, with Very High and High Risk activity rules first.

Coaching Campaign Recommendations

Campaign Recommendations

SecurityCoach recommends real-time coaching campaigns best suited for your detection rules. You can select SecurityTips from different categories of risky behavior.

Easy User Mapping

Easy User Mapping

User data from your identity provider or directory is combined with your security event logs to create user mapping rules. With a variety of built-in user mapping rules and the ability to create custom rules, you can easily configure rules to automatically map users.

Dashboard and Detailed Reporting

Dashboard & Detailed Reporting

The built-in dashboard provides an overall summary of coaching campaigns, detection rules and detected security events. The detailed reports provide insights into your organization's security risks and help track trends in your users' risky activity over time.

Rule-Based Automation

Rule-Based Automation

Based on the rules in your existing security software stack and defined high-risk users or roles, you can configure your real-time coaching campaign to determine the frequency and type of SecurityTip risky users will receive.

Robust SecurityTip Catalog

Robust SecurityTip Catalog

You can create campaigns using our extensive and continually growing catalog of 200 SecurityTips covering 60 different topics, many of which are available in 34 languages.

See how you can improve your security culture and coach your users in real-time with SecurityCoach:

Request A Demo