Please enable the breadcrumb option to use this shortcode!
Assess yourself, phish yourself, train yourself, alarm yourself.
Test, train and engage your employees. LUCY allows you to put your security to the test by simulating realistic cyber-attacks. LUCY, makes Simulated Internet Attacks available and affordable for all!
LUCY - Simulated Realistic Cyber-Attacks
Schedule your demo of LUCY today!
The LUCY Phishing Awareness Training Server is used to simulate social engineering attacks and it is universally applicable from SMEs right up to very large customers. Available on-premise or as a cloud solution, LUCY is easy to learn & intuitive to use. This solution provides dozens of preconfigured, easily customizable phishing templates and training modules, which can be independently used by the end user.
With LUCY’s “Phishing Incident Plugin for MS-Outlook ©” users rapidly send and receive security alerts, whenever a phishing attack is detected. This speeds up security team responses whilst reducing workload and costs . Lucy is already installed and used in more than 3900 licenses in over 50 countries.
How can a company leverage Lucy to test security.
LUCY Software runs different variations of phishing, SMiShing, malware and portable media attack simulations to measure your team’s awareness of attacks and improve how they respond to them.
Allow your IT department to perform security checks without involving other employees. Detect malware-related risks at every level of your IT infrastructure from your network and systems to individual applications.
Monitor the progress on our real-time dashboard, create business reports in various formats (PDF, Word etc.), export the data (CSV, Excel, etc.) or via REST API. Create benchmark reports and trend analysis for your organization or a single employee.
What is LUCY’s Technology Assessment?
When a simulated phishing attack is successful you can run customized client vulnerability detection routines. They check out the posture of browsers installed in the organization; it checks if there are any hooks, which can be used by attackers, and determines to what degree they could be exploited. Results are shown in the campaign reporting.
Our second technology assessment method uses LUCY’s Malware Simulation Module. After a successful infection, it starts with the client and goes through a long list of client configuration items to determine if they are set correctly. But you also can start the program manually without a phishing simulation campaign to directly determine if there are any flaws in your IT infrastructure.
In addition to the methods mentioned above, LUCY provides safe and harmless tools for manual technology assessments executed by senior assessors.
LUCY Multitenant Server can be downloaded and run on-premise within your intranet so that no data is transmitted outside of your organization. As an alternative, it can be used as a cloud-based solution with restricted access for only your staff.
IT-security awareness training, people testing and education
LUCY Phishing Software makes fake phishing campaigns and IT-security awareness trainings easy! It is the best solution to maintain vigilance against malware attacks and educate your organization to recognize cyber threats.
Designed for non-technical persons
Input for best-run phishing simulations often comes from the business side of an organization rather than from its IT department. That is why one of the key benefits of LUCY is the potential for campaigns and simulations to be managed by users who are not technically-trained individuals. You do not need to go to a “hacking school” to operate LUCY!
Everything is a campaign based on a scenario
And its easy! You can choose out of 70 different best-practice templates when you create a campaign and adapt it to your own specific needs. There are all types of scenario templates available: Phishing (hyperlink, file/download, mobile storage device and even SMiShing), awareness training or technical malware templates (see below).
Educate your people and improve
…their cyber threat knowledge with predefined learning content or add your own training content.
Rerun and become safer!
Cyber threats and IT-security risks are real. Having a campaign-based view does not lead to a well-prepared workforce or a vigilant organization. Simulations and campaigns need to be run on an ongoing basis. LUCY allows you to run campaigns the whole year round!
Mixed and custom campaigns
Of course, you can mix your campaign with different scenarios and send different templates to different recipients. If you do not want to use templates you launch entirely custom-built phishing simulations.
Report, analyze, learn and improve your future simulations
Detailed state-of-the-art reporting generally fits the needs of risk management and GRC officers, or other stakeholders. LUCY’s integrated dashboard and in-depth statistics provide the data necessary for IT-security specialists to analyze past campaigns or improve future ones. The integrated campaign comparison and trend analytics functionality facilitate this work, especially for larger organizations.
Who Uses LUCY?