Meet CyberHoot Autopilot!
Finally, automated security awareness training at a flat rate!
Cybersecurity training that runs on autopilot
*Only available to Managed Service Providers/Partners
Three easy steps...
Cyber training has never been this easy!
Once a customer is added to the system with users, Autopilot will do the following:
An onboarding email will be sent to each user one day prior to training start date, announcing CyberHoot Security Awareness Training.
Each user will receive their assignments via email beginning with the Foundational Training Videos. The first video training is sent out on the training start date.
The first phish training assignment will be sent one week after the training start date.
A Customer Cybersecurity Compliance Report will be sent to the Company Manager email on the first of each month, with a carbon copy to the Partner contact. This report includes:
- Training Compliance Metrics
- Phish Training Compliance Metrics
- Dark Web Reporting
Check out this demo recorded by one of our customers!
Autopilot was created to give our partners their time back. There is no console, just a simple wizard-driven action system to onboard your customers. Once your customers are onboarded, Autopilot takes care of the rest with fully automated monthly cybersecurity training and quarterly phish testing using our assignment-based phishing technology.
Autopilot's flat rate enables you to bake in security awareness training into your services, which could be the differentiator your prospects are looking for.
No more trying to figure out what the current user count is before billing your customers, the price is the same whether you have 25 or 2500 users.
Autopilot's minimal setup and automation allows you to focus on serving your clients, without needing to spend hours setting up allow lists and spam filters.
Provide automated Cybersecurity training to your employees and customers
Need more power and control?
Check out our Power Platform, which gives you full control of all your cybersecurity training requirements, including policy management and phish testing.