It's been two months since this profile received a new review
Leave a Review

PhishTitan Reviews & Product Details

Profile Status

This profile is currently managed by PhishTitan but has limited features.

Are you part of the PhishTitan team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

PhishTitan Media

PhishTitan Demo - Dashboard
PhishTitan dashboard
PhishTitan Demo - Insights Report
PhishTitan insights report
PhishTitan Demo - Report
PhishTitan report
PhishTitan Demo - Threat Protection
PhishTitan threat protection
PhishTitan Demo - Suspected Email Example
Example of a phishing email in the inbox.
Product Avatar Image

Have you used PhishTitan before?

Answer a few questions to help the PhishTitan community

PhishTitan Reviews (2)

Reviews

PhishTitan Reviews (2)

4.5
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
CG
Managing Director
Apparel & Fashion
Small-Business (50 or fewer emp.)
"Handling Phishoing Easily With PhishTitan"
What do you like best about PhishTitan?

Integration of the software with employees training materials and user based phishing reporting.

Multi language support capabilities and campaign customization.

Automated attack simulations that boosts awareness and training

Effectiveness of the software in simulated spear phishing assessment.

Phish Titan facilities custom built phishing templates and conducts user phishing awareness and vulnerability to actual threats.

Availability of alternative social engineering tests and and integration with training materials.

Limitless implementation and reliable customer services. Review collected by and hosted on G2.com.

What do you dislike about PhishTitan?

For new users and un experienced in cyber security,learning curve of the software is very steep. It requires training programs for effective implementation. Review collected by and hosted on G2.com.

SJ
Mid-Market (51-1000 emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Security system for companies"
What do you like best about PhishTitan?

It is helpful against scammers and used frequency in the base of security Review collected by and hosted on G2.com.

What do you dislike about PhishTitan?

Some features could be included for the better version and it is resisted for particular usage Review collected by and hosted on G2.com.

There are not enough reviews of PhishTitan for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,298)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
2
Proofpoint Core Email Protection Logo
Proofpoint Core Email Protection
4.6
(583)
Proofpoint Core Email Protection stops malware and non-malware threats such as impostor email.
3
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(513)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
4
Paubox Logo
Paubox
4.9
(517)
Paubox is an easy way to send and receive HIPAA compliant email.
5
Valimail Logo
Valimail
4.6
(441)
Valimail is the only solution that automates the path to DMARC enforcement from start to finish, providing rapid, ongoing protection against fraudulent use of your domains.
6
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(317)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
7
Microsoft Defender for Office 365 Logo
Microsoft Defender for Office 365
4.5
(290)
Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations from advanced threats targeting email and collaboration tools within the Microsoft 365 environment. It offers robust protection against phishing, malware, and business email compromise, ensuring secure communication and collaboration across platforms like Exchange Online, Microsoft Teams, SharePoint, and OneDrive. Key Features and Functionality: - Safe Attachments: Scans email attachments in a secure environment to detect and block malicious content before it reaches users. - Safe Links: Provides real-time protection by analyzing URLs at the time of click, safeguarding users from malicious links. - Anti-Phishing Policies: Utilizes advanced algorithms and machine learning to identify and mitigate phishing attempts, including those involving domain impersonation. - Protection for Collaboration Tools: Extends security measures to Microsoft Teams, SharePoint, and OneDrive, ensuring safe file sharing and collaboration. - Automated Investigation and Response (AIR): Automates threat investigation processes, enabling swift identification and remediation of security incidents. - Attack Simulation Training: Offers tools to simulate phishing attacks, helping organizations educate employees and strengthen their security posture. Primary Value and Problem Solved: Microsoft Defender for Office 365 addresses the critical need for advanced threat protection in today's digital workplace. By integrating seamlessly with Microsoft 365 applications, it provides a unified defense against sophisticated cyber threats, reducing the risk of data breaches and ensuring business continuity. Its comprehensive approach not only safeguards email communications but also secures collaborative platforms, enabling organizations to operate confidently in a secure environment.
8
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(231)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
9
Vade Logo
Vade
4.6
(180)
Vade is the global leader on anti-phishing, spear phishing, malware and ransomware filtering.
10
Cloudflare One (SASE) Logo
Cloudflare One (SASE)
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
PhishTitan