Awareness Trainings & Phishing Simulation

The role of people in defending against cyber risks is a critical factor. Training platforms increase awareness and thus safer obsolescence of employees in the digital space.

  • Price-performance ratio
  • Interactive elements / gamification
  • Integratability with existing learning platforms
  • Language availability

A selection of our 100+ providers

Out value add:

We find the right provider for you in four steps – for free!


Specify requirements


Anonymous tender under Bosch brand


Transparent comparison of the best-fitting providers


Provider pitches and customer decision

1. Requirements management for sourcing

  • Target definition of the solution (awareness, phishing, languages, price differences)
  • Standardized specification

Start specification

2. Market Intelligence

  • Proposal of suitable provider – customizable
  • RfO/RfP, anonymization of the tender possible

Understand our selection process

3. Independent comparison of offers

  • Transparent preparation of the offers (degree of fulfillment of the specification, costs, options)
  • Decision template incl. recommendation and orderable offers for fast processes up to the final order

View example

4. You make the last decision with our support

  • Demo appointment with favored provider to get to know learning environment
  • Coordination of final details and start – mostly via a SaaS platform and therefore quickly implementable

Book an appointment

Perspective from one of our experts

Just another info campaign or additional rules will not solve the problem; rather, I am convinced that good safety is built on the psychological safety to eliminate dilemmas and a willingness to learn in the face of challenges and incidents.

Read the full interview

Clare Patterson

Former CIO Shell Energy

Make an appointment and compare providers for awareness trainings – especially for your case!

Contact our expert

Nehal Thakore

Bosch CyberCompare Country Head UK

+44 1895 838 918

The human factor is often a significant risk factor in defending against attacks. Trained employees support the defense with safe behavior and thus contribute to the overall goal.

Regular sensitization of employees through training, evaluation of effectiveness through phishing tests and provision of practical tools (e.g. password manager). The human factor is often challenged by constantly improving attack methods and is still frequently the element that ultimately enables access or otherwise reacts to attackers (e.g. CEO fraud, changing account data, etc.). Targeted training can reduce this risk factor, employees understand the methods and what is behind them and react accordingly.

Most attackers enter the company primarily through phishing (e-mails with malicious links or attachments), but also through targeted manipulation and blackmail. It therefore makes sense to start precisely here with targeted awareness measures such as special training courses. A lot has happened in the area of training in recent years: the courses are catchy, fun, and the platforms are not particularly expensive due to the wide range of offerings, even compared to other security products.

It can also be exciting to use simulated phishing emails to see how awareness changes over time and to intervene more intensively.

Furthermore, it is advisable to play out different content in different functions; for example, purchasing is in much greater contact with external parties, is sent attachments or links more frequently, and should therefore receive special training. The same applies to sales. In IT, administrators have a high risk profile; in accounting, it is a matter of deception when transferring or changing account data. Thus, each area has its own challenges and many awareness training platforms meet these specific contents.

However, the human factor is never “solely to blame” just because the door is opened. Furthermore, some of the attacks are so good that it is difficult to reduce the click rate to 0%. Security is a team sport; the attacker may gain access to a workstation via phishing, work his way further, and then often gain higher rights in the system through further searches and begin to spread – IT and IT security must work on this to become more secure as an overall system.

Simeon Mussler

We are happy to help you personally with the specification of your cybersecurity requirements:

+44 1895 838 918

Reach out now