<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Antoine Hascoet, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/antoine-hascoet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/antoine-hascoet/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 22 Jan 2026 13:27:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Antoine Hascoet, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/antoine-hascoet/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>2025 cybersecurity awareness solutions radar: how can I find the right solution for my needs?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/#respond</comments>
		
		<dc:creator><![CDATA[Antoine Hascoet]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 10:19:20 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[Wavestone]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25316</guid>

					<description><![CDATA[<p>According to the 2024 Verizon report, the human factors is responsible for 68% of data breaches. Aware of this vulnerability, 90% of cyberattacks exploit human error, with phishing as the primary attack vector. In this context, it has become essential...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/">2025 cybersecurity awareness solutions radar: how can I find the right solution for my needs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">According to the 2024 Verizon report, the human factors is responsible for <strong>68% of data breaches</strong>. Aware of this vulnerability, <strong>90% of cyberattacks exploit human error</strong>, with phishing as the primary attack vector. In this context, it has become essential to raise awareness to cybersecurity risks in line with your organization&#8217;s needs.</p>
<p style="text-align: justify;">However, although <strong>companies recognize the importance of awareness content</strong>, <strong>very few manage to effectively deploy</strong> <strong>solutions</strong> adapted to their teams&#8217; specific needs. In fact, as much as awareness is a priority, choosing the most suitable tool remains a challenge. Companies are confronted to a diverse range of options, from standardized online training to interactive and personalized tools.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>A radar of +100 cybersecurity awareness solutions</strong></h2>
<p style="text-align: justify;">In an environment where cybersecurity awareness is becoming a priority, the <strong>awareness solutions radar proves to be a strategic ally for companies</strong>. This tool provides a <strong>clear and structured view of available solutions</strong>, helping organizations <strong>identify the ones best suited to their needs.</strong></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-28865 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2.png" alt="" width="837" height="561" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2.png 837w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2-285x191.png 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2-768x515.png 768w" sizes="(max-width: 837px) 100vw, 837px" /></p>
<p> </p>
<h3 style="text-align: justify;"><strong>A decision-making tool</strong></h3>
<p><strong>The radar provides a comprehensive overview of options available and helps assess the size of the market. </strong>Thanks to the radar, companies can <strong>quickly identify high-performing</strong> <strong>and innovative</strong> <strong>solutions</strong>, while also distinguishing <strong>essential ones</strong>. To achieve this, the solutions have been grouped into 7 categories:</p>
<ol>
<li><strong>Maturity Assessment</strong>: Solutions offering robust cybersecurity maturity and human risk evaluation tools, going beyond reports or questionnaires</li>
<li><strong>E-learning</strong>: Solutions providing a variety of structured learning modules</li>
<li><strong>Technical Training</strong>: Solutions specifically designed for technical audiences (cybersecurity teams, IT, developers, etc.)</li>
<li><strong>AI</strong>: Solutions based on artificial intelligence tools</li>
<li><strong>Chatbot</strong>: Solutions integrating an interactive conversational agent</li>
<li><strong>Phishing</strong>: Solutions specialized in phishing attack simulations, distinct from e-learning modules covering the topic.</li>
<li><strong>Games</strong>: Solutions focused on gamification, offering engaging cybersecurity awareness activities.</li>
</ol>
<p>This <strong>radar aims to provide a condensed view of our benchmark and is not a ranking</strong>. It is a <strong>curated selection based on several criteria</strong>, including company size, market presence (primarily in France), and our expert evaluation. We have <strong>intentionally limited the number of solutions presented to ensure a clear and strategic overview.</strong></p>
<p>The selection favors French solutions, in line with our client base, while also including a few relevant international players. Additionally, <strong>only solutions whose core offer is product-oriented</strong>, rather than consulting services, have been included, to ensure a <strong>product-focused approach</strong>.</p>
<h3> </h3>
<h3 style="text-align: justify;"><strong>A benchmark for a tailored solution</strong></h3>
<p style="text-align: justify;"><strong>The radar is based on a benchmark of over +100 solutions available on the market</strong>, providing a <strong>comprehensive overview of the cybersecurity awareness solutions’ ecosystem</strong>.</p>
<p style="text-align: justify;">The <strong>benchmark is designed to guide your selection</strong> towards the <strong>most suitable solution</strong>. Companies <strong>fill in their criteria</strong> to <strong>generate a refined list of options: types of content </strong>(phishing, passwords, social engineering, etc.), <strong>types of formats </strong>(quizzes, videos, chatbot, e-learning, etc.),<strong> availability and flexibility of the solution</strong>,<strong> target population</strong>, <strong>price</strong>,<strong> languages</strong>, etc. This process helps <strong>avoid arbitrary choices</strong> and ensures the selection of a <strong>solution that is truly aligned with awareness challenges and objectives.</strong></p>
<p style="text-align: justify;">Thus, without trying to be exhaustive, the radar <strong>offers a wide range of options to best meet</strong> <strong>your</strong> <strong>organization&#8217;s needs.</strong></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Integration process into the benchmark</strong></h3>
<p style="text-align: justify;">The process of integrating a solution into the benchmark is intended to be straightforward. Once a solution is identified, it is <strong>analyzed and sorted based on specific criteria</strong>, along with <strong>feedbacks from our Wavestone consultants.</strong> In addition, <strong>meetings with solution providers </strong>allow us to <strong>refine our analysis </strong>through demonstrations and the collection of additional information.</p>
<p style="text-align: justify;">As such, a solution with a <strong>clear and intuitive interface</strong>, offering <strong>transcriptions in multiple languages, </strong>and covering a <strong>wide range of topics</strong> (phishing, cloud, chatbot, etc.) in an <strong>innovative way</strong> will be particularly relevant. If it also receives positive feedback from our consultants, it will have a strong chance of being included in the radar.</p>
<p style="text-align: justify;">The benchmark and its radar also come with <strong>detailed presentations of certain solutions</strong>. Thanks to our <strong>expertise and strong convictions regarding awareness</strong>, some <strong>solutions deemed relevant have detailed profiles that include a more precise overview of the interface</strong> and <strong>expert opinions</strong>, enriched by discussions with vendors. These presentations not only help <strong>select the most suitable tool but also highlight often more effective yet lesser-known alternatives.</strong></p>
<p> </p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-25318" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1.png" alt="" width="1344" height="370" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1.png 1344w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1-437x120.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1-768x211.png 768w" sizes="(max-width: 1344px) 100vw, 1344px" /></p>
<p style="text-align: center;"><em style="font-size: revert; color: initial;">Integration process of a solution into the benchmark and radar</em></p>
<h4> </h4>
<h4><strong>Disclaimer</strong></h4>
<p>Please note that this radar is a reduced view of the associated benchmark. If you notice that a cyber awareness player you know is missing from this radar, contact us so we can evaluate and add them.</p>
<p> </p>
<h4 style="text-align: left;"><strong>Acknowledgements</strong></h4>
<p style="text-align: left;">We would like to thank Guillaume MASSEBOEUF for his contribution to this radar.</p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/">2025 cybersecurity awareness solutions radar: how can I find the right solution for my needs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
