Features

Relatable scenarios

We turn common cybersecurity topics into relatable scenarios, where users pick from three options and get instant feedback with tips for handling similar situations in the future.

Start your 14-day free trial
White card displaying the text: "On your way to work in the morning, you notice a USB drive on the ground in the parking lot. The side of the USB drive says “Confidential”. What do you do?' Below the question are three answer options in rectangular boxes labeled A, B, and C, with option A highlighted in purple to indicate it has been selected. At the top of the card, there are two profiles of people: one indicating a correct answer and the other indicating a wrong answer.

“Super easy to use for admins. The cybersecurity training runs completely on autopilot.”

Verified User in Education Management
(Mid-Market)

Source: G2

Feature Overview

Real-life scenarios without the consequences

Two overlapping white cards on a purple background. The back card shows the text "Training: Smishing," with blurred-out text and three boxes, one of which is selected with a purple checkmark. The front card contains three expandable sections with '+' icons. There is an illustration of a phone outline with an enabled toggle, all displayed within an abstract version of a browser interface.

Scenario-driven learning experiences

Cybersecurity can be tough to grasp, especially without real-world context. We present information through scenarios to help users connect the dots and build instinctive responses.

Informative feedback

Right or wrong, we lead users to an informative page that will inform them which was the correct action to take, and how to better identify that situation in the future.

Sent directly to users' inboxes

Logins can be a hassle, turning cybersecurity training into something that's either done right away or pushed to the bottom of the to-do list. To prevent this, we deliver training directly to the apps they use most.

Available Topics

Our scenarios cover a variety of topics

  • AI Prompt Injection
  • AI Hallucinations
  • Cookie Tracking
  • GDPR
  • Pseudonymized Data
  • Personal Data
  • Passwords
  • Multi-Factor Authentication
  • Single Sign-On
  • Physical Security
  • Tailgating
  • QR Codes
  • Friendly Smishing
  • Unknown Smishing
  • Insider Spoofing
  • Brand Spoofing
  • Subdomains
  • Subdomains
  • Brand Spoofing
  • Insider Spoofing
  • Unknown Smishing
  • Friendly Smishing
  • QR Codes
  • Tailgating
  • Physical Security
  • Single Sign-On
  • Multi-Factor Authentication
  • Passwords
  • Personal Data
  • Pseudonymized Data
  • GDPR
  • Cookie Tracking
  • AI Hallucinations
  • AI Prompt Injection

Our Approach

How Scenarios work

Diagram on a purple background featuring the Pistachio logo with three lines extending from it. All lines connect to an illustration of a folder labeled 'Scenarios.' The first line has a data tag labeled 'Scenario sent.' The second line splits into three streams labeled A, B, and C, then reconverges into a single line leading to the folder. The third line is dotted, with two data tags labeled 'New Topic' and 'Frequency.'

Prioritized convenience

All scenarios are delivered directly to the user’s preferred app and take only a minute or two to complete. The email will be ready for them whenever they have a spare moment.

Re-enforces lessons

We make sure that users are trained with a balance of theory and practice, so all our content is intended to re-enforce lessons learned in the other side of our training.

Relatable content

Cybersecurity training can feel abstract for a lot of people. We make it easier to understand by showing real-life scenarios rather than just explaining technical jargon.


Types of Scenario Interactions

On a beige background, there are two email notifications featuring the Microsoft logo. The first email has the subject line 'Training: Scanning QR Codes,' and the second is 'Training: USB Flash Drive.' A third card, the same size as the emails, is purple with a loading icon and the text 'Generating new training.'
Two overlapping cards on a beige background. The back card shows a photo of a wooden table with a place setting, with an enabled toggle labeled 'Show Signs.' The top card is white and reads 'Good try! But that is not what you should do in that scenario,' followed by two blurred-out sections indicating a right and wrong answer. There are two expandable sections with '+' icons. The Pistachio logo is at the bottom of this card.
Two overlapping cards on a beige background. The back card features a photo of an open hand, palm facing upwards, holding an unmarked USB flash drive. An enabled toggle is labeled 'Show Signs.' The top card is white with the text 'Exactly right! That is the action you should take in that scenario,' followed by two blurred-out sections with expandable '+' icons. The Pistachio logo is at the bottom of this card.

“Different level of difficulty for phishing detection. Clear for the user when they failed.”

Verified User in Education Management (Mid-Market)

Source: G2

Delivery Preferences

Integrated with your team’s go-to apps

In the center of a yellow background, the Pistachio logo appears in light purple on a dark purple rectangle. Two lines extend from opposite sides of the rectangle. On one side, a line splits into two, leading to the Slack logo and the Microsoft logo. On the other side, a dotted line leads to a Slack bot with a robot icon, while another line leads to an Email Inbox with an inbox icon.

Outlook

To make things simple, we deliver all scenarios directly to users’ Outlook inboxes unless they change their preferred app. This ensures they can easily access and respond to them without disrupting their day-to-day.

Slack

With the necessary permissions granted, you can add Pistachio’s Training Bot to your team’s workspace. This allows users to choose whether they want their scenarios delivered directly to their Slack app.

Let
Pistachio
Pistachio manage your human
People
cybersecurity risk for you