Features
Tailored simulations
“Pistachio has been successful at making our employees considerably more aware and alert of phishing attempts.”
"Verified User in Education Management
(Mid-Market)"
Feature Overview
Our simulations help build long-term resilience
Tailored to every person
We tailor the content of our simulations to each person's specific traits, like their role, software or location.
No manual set-up
Leave the logistics to us. We'll handle everything for you, making sure your team gets the best training without any management on your end.
Adaptive difficulty & frequency
We adjust the difficulty and frequency of our simulations based on how they do. If they need extra help, we'll step in with targeted support.
Available Categories
Our simulations cover every category
- Card and subscriptions
- Meeting invitations
- File sharing and requests
- Security notifications
- Financial transactions
- Social media activity
- Payslips and work planning
- Password issues
- Order and shipping confirmations
- Confirm email requests
- Software invitations
- Invoicing and refunds
- Offers and newsletters
- Government and authorities
- Government and authorities
- Offers and newsletters
- Invoicing and refunds
- Software invitations
- Confirm email requests
- Order and shipping confirmations
- Password issues
- Payslips and work planning
- Social media activity
- Financial transactions
- Security notifications
- File sharing and requests
- Meeting invitations
- Card and subscriptions
Delivered to Outlook
Types of Simulations
C-Suite Impersonation
Learn to spot fake requests from C-level executives where authority is used to deceive. It's about trusting one's instincts and double-checking before acting.
Brand Spoofing
Identify subtle signs of email spoofing, where bad actors impersonate well-known brands. This helps users avoid falling for seemingly trustworthy traps.
QR Code Phishing
Learn to spot the dangers of scanning unfamiliar QR codes, especially in unusual contexts. This simulation teaches users to pause and think before taking what might seem like a routine action.
Sequenced Reminders
Practice recognizing when follow-up emails feel off, even if they seem urgent. This simulation helps users stay alert and cautious under pressure.
Types of User Interactions
“Lot of new features month after month to follow the evolution of the cybersecurity!”
Jeremy l. (Network & Security Engineer)
Source: G2Our Methodology
We value progress, not perfection
Learn-by-doing
When someone fails our simulations, we don’t punish them. We teach them where they went wrong. By providing immediate feedback, we help people to spot phishing attacks better than generic training can.
Supportive environment
We never make users feel bad for failing a simulation. It’s a normal part of the learning process, and there’s no shame in getting it wrong—that’s what makes it a valuable learning experience!
Practical insights
The instant feedback users get when they fail a simulation helps them see the subtle clues they may have missed the first time around. This helps them spot these clues in future simulations and actual attacks.
Outlook Add-on
Report suspicious emails with one click
Faster threat identification
By adding the Pistachio "Report" button to the Outlook toolbar, users can quickly determine if a suspicious email is one of our simulations, enabling faster response and better security awareness.
Develop organic security habits
When team members routinely report suspicious emails, they develop a habit of staying vigilant for potential phishing threats and notifying their IT department for further action.