Top Rated Sophos PhishThreat Alternatives
Video Reviews
21 Sophos PhishThreat Reviews
Overall Review Sentiment for Sophos PhishThreat
Log in to view review sentiment.

The options. There is a myriad of options, from what type of attack to who and how many to deploy. There are also options to send to specific groups or to send to random collections throughout your organization. Review collected by and hosted on G2.com.
The biggest downside I have encountered is that when people get caught, then get scared and think the training link provided is another phishing attempt, or they believe they are in trouble and, either way, do not do the provided training. Review collected by and hosted on G2.com.

Sophos has One of the best threat simulation tools with predefine 60 + predefined templates, which showcase the real threats in live environment.
With the help of the Sophos Threat Simulation tool, end users get trained for ever-changing cyber threats with the simulation of phishing mail. Review collected by and hosted on G2.com.
Sophos PhishThreat needs to have granularity in reporting part. Also, when we register IP on Sophos Central, which needs to be allowed, sometimes it takes time. Review collected by and hosted on G2.com.

One of the key features of Sophos PhishThreat is its ability to simulate realistic phishing attacks to educate users on how to spot and avoid them. This type of training is critical for organizations as it helps to raise awareness of the dangers of phishing and empowers employees to be more vigilant when it comes to suspicious emails. Review collected by and hosted on G2.com.
Sophos PhishThreat can be somewhat complex and challenging to navigate, particularly for non-technical users Review collected by and hosted on G2.com.

Users can click a single button to report a phishing email to the IT team.
Automatic phishing tests
A single pane of glass to see the security posture across all of your organization, including antivirus status (if you subscribe to those services.
Integration with Office and Outlook Review collected by and hosted on G2.com.
Users often report everything under the sun or report spam as phishing. It takes time and patience, but I'd rather have users report too much rather than report too little. Review collected by and hosted on G2.com.

phish threats are very usefull to help out new phising site and email in sophos. It is a great experience in management console and also user profile and monitoring tool Review collected by and hosted on G2.com.
From PhisThreat can you describe more about PhisThreat and product in console itself like Help button icon describe with use case and easy to access support portal from console itself. Review collected by and hosted on G2.com.

About the Sophos Phish Threat, I like the efficacy of the product. Review collected by and hosted on G2.com.
The results are a bit time taking sometimes in Sophos Phis Threat Review collected by and hosted on G2.com.

The more important is the security which is very great and comprehensive.
And the simple and air tight security for phish threat.
Plus point is it's integration with other appliances. Review collected by and hosted on G2.com.
The central management. Compatibility with the end devices Review collected by and hosted on G2.com.

The way it blocks all the threats, phishing attacks. Review collected by and hosted on G2.com.
There is nothing that I find wrong with this application. However, it can be made more secure. Review collected by and hosted on G2.com.

