Sophos PhishThreat Features
Simulation (4)
Test Agent Deployment
Executes attacks on a range of surfaces from email and desktop to cloud and network environments.
Breach Simulation
Simulates a compromized network environment resulting from neglegence, misconfiguration, or other user errors that expose sensitive information.
Attack Simulation
Simulates a real-world attack on networks and endpoints with the intent to harm a business.
Resolution Guidance
Guides users through the resolution process and give specific instructions to remedy individual occurrences.
Customization (3)
Multi-Vector Assessment
Allows users to simulate threats that attack multiple points of entry to infect computers and networks.
Scenario Customization
Allows users to create attack scenarios that mimic their real-world working enviroment.
Range of Attack Types
Allows for the simulation of multiple attack variants. Simulates attacks targeting different kinds of endpoints and networks.
Administration (3)
Reporting
Provides results of the simulation and reveals potential security gaps or vulnerabilitites.
Risk Evaluation
Identifies potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Automated Testing
Automates attacks and adversarial logic for continuous testing.



