NINJIO PHISH3D

Get more from your simulated phishing program. NINJIO PHISH3D relies on three dimensions to identify the specific social engineering tricks most likely to fool users in your organization:
Attack vector-based phish testing
Our algorithm uses adaptive learning to continually test against commonly used real world hacks.
Emotional susceptibility testing
Tests users against 7 key social engineering emotional triggers commonly used by bad actors.
Automated difficulty levels
The algorithm will adjust the difficulty of each user’s phishing simulations.

TEST FOR ALL ATTACK VECTORS INCLUDING:

Ransomware | Deceptive Phishing | CEO Fraud/Whaling | Spear Phishing
Smishing | Business Email Attack | Credential Threat | Malware & Malicious Attachments

GETTING STARTED IS EASY

PROVISIONING

 Centralized user provisioning for all functions of the NINJIO platform
Create Static and Dynamic “Smart” Groups to optimize delivery
Automatic user provisioning

CAMPAIGN SET UP

 Simple and intuitive platform for ongoing management
Setup smart campaigns using dynamic groups for more targeted testing
Automated difficulty selection of simulations based on user strengths

CHOOSE SIMULATED PHISHING TEMPLATES

1000’s of existing simulated phishing templates in multiple languages
Simulated phishing templates based on recent attack vectors
 Each template offers variable difficulty levels
• Unlimited template building capability

MEASURE AND REPEAT

 Real time dashboard of all key interactions
 Reporting at company, group, department and individual levels
• Reporting by interaction type, campaign, date, and more
• Automatic key susceptibility determinations for each user via the NINJIO RISK Algorithm

NINJIO
RISK ALGORITHM

The NINJIO Risk Algorithm uses engagement data collected by PHISH3D to build a profile of each user’s specific social engineering vulnerabilities.

Quantifiable Human Risk Reduction

CIO, National Mortgage Company
“Every month, when we release the new episode,
“Information Security” becomes the buzz in the office.
I have never seen such a thing. When did information
security training become something our employees talk
about? When we introduced NINJIO!”
WHAT OUR CUSTOMERS SAY
Director, IT, Federal Government Agency
“Previous products were very long and boring. Staff
would never take the time to watch the entire training
and it was difficult to keep their interest and attention.
From the start, NINJIO was well received and got the job
done without wasting valuable time.”
WHAT OUR CUSTOMERS SAY
CIO, Large Retail Chain
“Long gone are the days of lengthy videos that are
ineffective, and boring to users. NINJIO videos are
short, relevant, and frequent. Each video is 3-4
minutes long and will focus on telling a story of
a real breach, and then give users a simple piece
of advice to follow.”
WHAT OUR CUSTOMERS SAY

Quantifiable Human Risk Reduction

WHAT OUR CUSTOMERS SAY

stars

CIO, Large Retail Chain
“Long gone are the days of lengthy videos that are ineffective, and boring to users. NINJIO videos are short, relevant, and frequent. Each video is 3-4 minutes long and will focus on telling a story of a real breach, and then give users a simple piece of advice to follow.”

WHAT OUR CUSTOMERS SAY

stars

Director, IT, Federal Gov’t Agency
“Previous products were very long and boring. Staff would never take the time to watch the entire training and it was difficult to keep their interest and attention. From the start, NINJIO was well received and got the job done without wasting valuable time.”

WHAT OUR CUSTOMERS SAY

stars

CIO, National Mortgage Company
“Every month, when we release the new episode, “Information Security” becomes the buzz in the office. I have never seen such a thing. When did information security training become something our employees talk about? When we introduced NINJIO!”