Real-time cyber trainer in employee browsers

Employees get training and guidance through a browser extension and for a maximum of 120 seconds a workday.

Play a demo - see trainer in action

Demo Company Ltd.

Virtual IT-assistant

This website is categorized for work use.

Our IT admin Ismo Paananen wants you to report, how are you using this app?

For work

For work

Only for personal use

Thanks! I'll forward the information for your IT admin.

Closing in 3 seconds...

This demo presents monitoring users when employees visit work app sites.

Thanks! Demo has ended.

This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
Close demo Play again See all skills

Sign up now
How will the assistant train our employees?

I train security policies with the help of stories and skill tests.

Educate with stories

Get policy acceptance

Monitor with skill tests

I train cloud data protection by delivering real-time guiding.

Monitor access

Check site reputation

Find unknown apps

Block unwanted sites

I assist incident reporting and ensure deliverability of critical info.

Admin messages

Incident reporting for employees

Gather privacy info

Choose your plan

How safe do you want your employees? Cancel anytime. Priced by extension users.

Free

Real-time cloud data protection guidance
Monitor access
Check site reputation
Find unknown apps
Block unwanted sites
0
per employee
per month
Get started

Pro

Starting from 10 users
Security policy training
Educate with stories
Get acceptance for policies
Periodic skill testing
4
per employee
per month
Start 14-day trial

Premium

Priority support
Incident response fastlane
Admin messages
Incident reporting
Automated GDPR reporting
9
per employee
per month
Start 14-day trial

How does it work?

These are skills cyber assistant uses to train and guide your employees.

Deploy policies for real

Assistant uses 2 minutes a day to explain, get acceptance and testing knowledge of your chosen security policies. Use our default set or create and tune your own.

See demos of company Security policy training

Educate with stories

Assistant helps people understand why we have policies, by first telling 1-3 stories which outline key security points managed by the policy.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

There's one new entry about phishing on your cyber security diary. Can I show it to you now?

Yes, go ahead

Yes, go ahead

Remind me tomorrow

A heard a troubling story from my colleague today. She had received an email from our CEO's address, which looked completely legit, sending address, header info, talking style and all that.

CEO had attached an invoice about our ongoing project with vendor X, and asked me to process it forward. Later I found out, that it was all a scam and the money went straight to fraudsters account.

How relevant was this entry for your work?

Thanks! I'll remember this for the future.

This demo presents teaching with weekly cyber security cases.

Thanks! Demo has ended.

This demo showed some of my skills on automated training. What would you like to do next?
Close demo Replay demo Show all skills

Get policy acceptance

Assistant gets feedback for security policies from connected employees and asks for more info, if they are not able to follow the policy in their work.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

You have one pending security policy for unit "Supervisors"

Would you like to review it now?

Yes, let's review it

Yes, let's review it

Remind me tomorrow

Use of confidentiality agreements

Everyone processing confidential data needs to sign a confidentiality agreement before given access to data. Agreement must include the following issues:

•  definition for confidential data
•  presumed lenght of data processing
•  actions when agreement is cancelled

...

Yes, I do follow this policy

Yes, I do follow this policy

I can't follow this policy, because...

I need more information

Thanks! Information sent to your admins. Closing in 3 seconds...

This demo presents weekly policy enforcement for employees of relevant units.

Thanks! Demo has ended.

This demo showed some of my skills on automated training. What would you like to do next?
Close demo Replay demo Show all skills

Periodic skill testing

After hearing stories and accepting policies, employees knowledge will be tested in a short quiz, which only includes topics that are relevant for them.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

It's time for our montly "Cyber security quiz". Do you have a minute now to take part?

Yes, let's review it

Yes, let's review it

Remind me tomorrow

Question 1/5

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?

Information entered into the site is encrypted

Information entered into the site is encrypted

The site is the newest version available

The site is not accessible from unsecure connections

That is correct! Next question coming up in 5 seconds...

Check your status at company leaderboard >>

This demo presents monthly cyber quizzes for all employees

Thanks! Demo has ended.

This demo showed some of my skills on automated training. What would you like to do next?
Close demo Replay demo Show all skills

Real-time guiding on cloud data protection

Assistant protects employees, when they usetheir work email or apps for work purposes. Admin will get a list of cloud apps and users to help management and on- and offboarding.

See demos of company cloud data protection training

Monitoring work app access

When your employees use sites of work apps, your company's app library is built. We monitor who uses each app to help on- and offboarding.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

This website is categorized for work use.

Our IT admin Ismo Paananen wants you to report, how are you using this app?

For work

For work

Only for personal use

Thanks! I'll forward the information for your IT admin.

Closing in 3 seconds...

This demo presents monitoring users when employees visit work app sites.

Thanks! Demo has ended.

This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
Close demo Play again See all skills

Checking site reputation on new work email entry

If users are on unknown websites, assistant does his best to keep them safe. If they're filling work email, we demand a short reputation check to prevent phishing.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

You typed your work email on an unknown website.

According to our security policy, you need to do a reputation check on the website.

Okey, run the check now

Okey, run the check now

Exit website

The site has passed the reputation check. View results >>

Closing in 3 seconds...

Demo: doing a reputation check when work email typed on unknown site.

Thanks! Demo has ended.

This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
Close demo Replay demo Show all skills

Blocking unwanted sites

Unwanted sites can be known dangerous sites or app sites for which your company has another preferred app. We block people out from these.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

You just logged into an unknown website using your Google account.

Our IT admin Ismo Paananen wants you to report, how are you using this app?

For work

For work

Only for personal use

Thanks! I'll forward the information for your IT admin and add this app to your company's app library.

Closing in 3 seconds...

This demo presents finding new work apps after employee logs in.

Thanks! Demo has ended.

This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
Close demo Replay demo Show all skills

Finding unknown work apps

When users log in to sites, which aren't yet on your company app library, assistant takes the opportunity to ensure whether this site is on work use.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

You're visiting an app website, but this app is forbidden by our IT.

Microsoft Planner is the preferred app in our company.

Switch to Planner

Switch to Planner

I need this app - continue and report to IT

Thanks! You're redirected to tasks.office.com.

Closing in 3 seconds...

This demo presents blocking an app site when there's another preferred app.

Thanks! Demo has ended.

This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
Close demo Replay demo Show all skills

Fastlane for reporting and notifying of incidents

Assistant offers a communication fastlane for users. Admins can share information about ongoing attacks or other important changes, and they know when people have read them.

See demos of Incident response Fastlane

Delivering critical messages from IT admin

Admins can push messages straight into the assistant when there's e.g. a high risk due to a running phishing campaign.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

You have a pending security message from IT admin. Can you view it now?

Yes, view it now

Yes, view it now

Remind in 1 hour

Security message from IT admin:

Our vendor Supplier Inc. has recently been a target of a business-email-compromise attack and fraudsters are using their email inboxes for scams. Be vary of all emails coming from alum-supplier.com.

You might receive suspicious emails asking for confidential info or payments to ongoing projects.

Message read, thanks.

Message read, thanks.

Thanks for reading and keep safe!

Closing in 3 seconds...

This demo presents delivering a security message from admin to employees.

Thanks! Demo has ended.

This demo showed some of my skills on incident response. What would you like to do next?
Close demo Replay demo Show all skills

Offering an employee channel for incident reporting

When something bad happens, you need to get the word around as quickly as possible. Assistant helps any employee to report a cyber incident.

Play a demo

Demo Company Ltd.

Virtual IT-assistant

You selected to report cyber security incident. I'll guide you through the process.

What happened?

I encountered phishing

I encountered phishing

I may have a malware infection

A device has been lost or stolen

I sent confidential info to a wrong recipient

I accidentally published confidential data

Can you tell me more e.g. about how this happened, whose data and which personal data categories were involved?

Contact me for more info

Contact me for more info

Type more information here

Thanks for reporting! IT admin may contact you for more info.

This demo presents employee reporting a cyber security incident for admin.

Thanks! Demo has ended.

This demo showed some of my skills on incident response. What would you like to do next?
Close demo Replay demo Show all skills

Automating GDPR documentation

Gather GDPR-related information from app admins when they're visiting the app and generate all required reports automatically.

Coming soon...

What's hot on cyber security?

We share about the latest employee-related cyber security happenings.

See all latest news

Get it on your favourite browser

Currently versions available for Chrome, Firefox and the new Edge.

Appcover for Chrome
Appcover browser extension for Google Chrome provides all the basic functionality.
Download
Version 1.1.7
Appcover for Firefox
Appcover browser extension for Mozilla's Firefox provides all the basic functionality.
Download
Version 1.1.7
Appcover for Edge
Appcover browser extension for Microsoft's Edge provides all the basic functionality.
Download
Version 1.1.7

Want to see some of my other skills?

Security policy training

  • Enforce security policies - PLAY >>
    Enforce security policies - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    You have one pending security policy for unit "Supervisors"

    Would you like to review it now?

    Yes, let's review it

    Yes, let's review it

    Remind me tomorrow

    Use of confidentiality agreements

    Everyone processing confidential data needs to sign a confidentiality agreement before given access to data. Agreement must include the following issues:

    •  definition for confidential data
    •  presumed lenght of data processing
    •  actions when agreement is cancelled

    ...

    Yes, I do follow this policy

    Yes, I do follow this policy

    I can't follow this policy, because...

    I need more information

    Thanks! Information sent to your admins. Closing in 3 seconds...

    This demo presents weekly policy enforcement for employees of relevant units.

    Thanks! Demo has ended.

    This demo showed some of my skills on automated training. What would you like to do next?
    Close demo Replay demo Show all skills

  • Teach employees with cases - PLAY >>
    Teach employees with cases - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    There's one new entry about phishing on your cyber security diary. Can I show it to you now?

    Yes, go ahead

    Yes, go ahead

    Remind me tomorrow

    A heard a troubling story from my colleague today. She had received an email from our CEO's address, which looked completely legit, sending address, header info, talking style and all that.

    CEO had attached an invoice about our ongoing project with vendor X, and asked me to process it forward. Later I found out, that it was all a scam and the money went straight to fraudsters account.

    How relevant was this entry for your work?

    Thanks! I'll remember this for the future.

    This demo presents teaching with weekly cyber security cases.

    Thanks! Demo has ended.

    This demo showed some of my skills on automated training. What would you like to do next?
    Close demo Replay demo Show all skills

  • Monthly cyber quizzes for employees - PLAY >>
    Monthly cyber quizzes for employees - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    It's time for our montly "Cyber security quiz". Do you have a minute now to take part?

    Yes, let's review it

    Yes, let's review it

    Remind me tomorrow

    Question 1/5

    What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?

    Information entered into the site is encrypted

    Information entered into the site is encrypted

    The site is the newest version available

    The site is not accessible from unsecure connections

    That is correct! Next question coming up in 5 seconds...

    Check your status at company leaderboard >>

    This demo presents monthly cyber quizzes for all employees

    Thanks! Demo has ended.

    This demo showed some of my skills on automated training. What would you like to do next?
    Close demo Replay demo Show all skills

Cloud app usage training

  • Monitor work app users - PLAY >>
    Monitor work app users - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    This website is categorized for work use.

    Our IT admin Ismo Paananen wants you to report, how are you using this app?

    For work

    For work

    Only for personal use

    Thanks! I'll forward the information for your IT admin.

    Closing in 3 seconds...

    This demo presents monitoring users when employees visit work app sites.

    Thanks! Demo has ended.

    This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
    Close demo Play again See all skills

  • Check reputation on work email login - PLAY >>
    Check reputation on work email login - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    You typed your work email on an unknown website.

    According to our security policy, you need to do a reputation check on the website.

    Okey, run the check now

    Okey, run the check now

    Exit website

    The site has passed the reputation check. View results >>

    Closing in 3 seconds...

    Demo: doing a reputation check when work email typed on unknown site.

    Thanks! Demo has ended.

    This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
    Close demo Replay demo Show all skills

  • Find unknown work apps - PLAY >>
    Find unknown work apps - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    You just logged into an unknown website using your Google account.

    Our IT admin Ismo Paananen wants you to report, how are you using this app?

    For work

    For work

    Only for personal use

    Thanks! I'll forward the information for your IT admin and add this app to your company's app library.

    Closing in 3 seconds...

    This demo presents finding new work apps after employee logs in.

    Thanks! Demo has ended.

    This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
    Close demo Replay demo Show all skills

  • Block unwanted sites - PLAY >>
    Block unwanted sites - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    You're visiting an app website, but this app is forbidden by our IT.

    Microsoft Planner is the preferred app in our company.

    Switch to Planner

    Switch to Planner

    I need this app - continue and report to IT

    Thanks! You're redirected to tasks.office.com.

    Closing in 3 seconds...

    This demo presents blocking an app site when there's another preferred app.

    Thanks! Demo has ended.

    This demo showed some of my skills on company cloud data monitoring. What would you like to do next?
    Close demo Replay demo Show all skills

Incident response training

  • Deliver admin messages - PLAY >>
    Deliver admin messages - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    You have a pending security message from IT admin. Can you view it now?

    Yes, view it now

    Yes, view it now

    Remind in 1 hour

    Security message from IT admin:

    Our vendor Supplier Inc. has recently been a target of a business-email-compromise attack and fraudsters are using their email inboxes for scams. Be vary of all emails coming from alum-supplier.com.

    You might receive suspicious emails asking for confidential info or payments to ongoing projects.

    Message read, thanks.

    Message read, thanks.

    Thanks for reading and keep safe!

    Closing in 3 seconds...

    This demo presents delivering a security message from admin to employees.

    Thanks! Demo has ended.

    This demo showed some of my skills on incident response. What would you like to do next?
    Close demo Replay demo Show all skills

  • Facilitate incident reporting - PLAY >>
    Facilitate incident reporting - PLAY >>

    Demo Company Ltd.

    Virtual IT-assistant

    You selected to report cyber security incident. I'll guide you through the process.

    What happened?

    I encountered phishing

    I encountered phishing

    I may have a malware infection

    A device has been lost or stolen

    I sent confidential info to a wrong recipient

    I accidentally published confidential data

    Can you tell me more e.g. about how this happened, whose data and which personal data categories were involved?

    Contact me for more info

    Contact me for more info

    Type more information here

    Thanks for reporting! IT admin may contact you for more info.

    This demo presents employee reporting a cyber security incident for admin.

    Thanks! Demo has ended.

    This demo showed some of my skills on incident response. What would you like to do next?
    Close demo Replay demo Show all skills

  • Help gather privacy info - COMING SOON >>