Audience

IT teams searching for an advanced Cybersecurity solution

About Jericho Security

Train your team to defend against the latest cyber attacks with our complete cybersecurity platform. Run hyper-realistic, scarily personalized attack simulations in just a few clicks. Phishing attacks are responsible for more than 80% of reported security incidents an about 90% of data breaches. Replicate techniques used by today0s attackers to help your people spot and stop AI-generated threats, With tests and training materials tailored to each team member we help you increase cyber security efficiency.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Jericho Security
www.jerichosecurity.com

Videos and Screen Captures

Jericho Security Screenshot 1
You Might Also Like
Our Free Plans just got better! | Auth0 by Okta Icon
Our Free Plans just got better! | Auth0 by Okta

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms Supported
SaaS
Training
Live Online
Support
Online

Jericho Security Frequently Asked Questions

Q: What kinds of users and organization types does Jericho Security work with?
Q: What languages does Jericho Security support in their product?
Q: What kind of support options does Jericho Security offer?
Q: What type of training does Jericho Security provide?

Jericho Security Product Features

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning