SlideShare a Scribd company logo
1 of 14
Download to read offline
Impact 18.1
A Focus on Users/Client –Side Testing
AGENDA
• What’s New in Impact 18.1 (High-level)
• Why Focus on Users/Client-Side Testing
• More Detailed Look at 18.1
• Demo
• Dynamic Credential Capturing
• Temporal Agent Enhancements
• Updated Status View & New Auto-Tagging
• Re-Designed Testing Workflows
• Import New Email Templates
• Updated Default Email Templates
• New Phishing Wizard
What’s New in Impact 18.1?
Release Focused on Client Side or User Testing
Why Focus on Users?
Client Side Testing
• Email is the #1 delivery vehicle for most malware & 1 in 131 emails
contained malware in 20161
• 76% of organizations report being victim of a phishing attack in 20162
• Reports of W-2 phishing emails increased 870% in 20173
• Unfortunately, WE (humans) are the often the weakest link
1 - https://www.symantec.com/security-center/threat-report
2 - https://info.wombatsecurity.com/state-of-the-phish
3 - https://www.bna.com/w2-email-scam-b73014451281/
U S E R S I M PA C T A C T U A L W E B S I T E
• Not a clone website
• Don’t have to host - little resources required
• Capture credentials from more modern
websites
Dynamic Credential Capturing
IMPACT18.1
Temporal Agent Enhancements
IMPACT 18.1
• Introduced “self-destruct” agent in previous release
• Now adding more options:
IMPACT
AGENT
• Product Level (whole)
• Workspace Level
• Module/RPT Level
Agents left behind could become backdoor paths for attackers
and can unnecessarily drain resources of machines deployed on
Updated Status View & Auto Tagging
IMPACT 18.1
Auto Tagging for Further Testing
1. Open & Viewed AND clicked link
2. Open & Viewed, clicked link, AND gave credentials or downloaded and ran attachment
Re-Designed Testing Workflow
IMPACT 18.1
Import New Email Templates
IMPACT 18.1
• Reduce time to create
realistic email templates
• Don’t have to know HTML
• Click save to capture any &
template-ize any email
Updated Default Email Templates
IMPACT 18.1
• Less templates – spend less
time find one
• Modernized templates –
improved effectiveness
• Modern language & style to
mimic today’s email norms
New Phishing Wizard
IMPACT 18.1
RPT Wizard
Attack & Penetration
RPT Wizard
Phishing
RPT Wizard
Phishing
RPT Wizard
Phishing
RPT Wizard
Phishing
• Phishing Wizard buried under
Attack & Penetration Wizard
• Now it’s own & easy to find
D E M O
COMING SOON!
The Core Impact Customer Community
• Real-time chat with other Core Impact
customers as well as various Subject Matter
Experts from SecureAuth + Core Security
• Question and Answer area to ask and
answer questions about using Core Impact
• On-Demand Training area to take multiple
short online training courses on various
Impact topics
• Code Repository where you can post code
for custom modules or find custom
modules others have created
THANK YOU
© 2017 by SecureAuth
All rights reserved

More Related Content

What's hot

ISACA Scholarship Competition.pptx
ISACA Scholarship Competition.pptxISACA Scholarship Competition.pptx
ISACA Scholarship Competition.pptx
Junho Lee
 

What's hot (10)

ISACA Scholarship Competition.pptx
ISACA Scholarship Competition.pptxISACA Scholarship Competition.pptx
ISACA Scholarship Competition.pptx
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
 
Dashboards, widgets, business views & 3D-data centre
Dashboards, widgets, business views & 3D-data centreDashboards, widgets, business views & 3D-data centre
Dashboards, widgets, business views & 3D-data centre
 
5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster
 
It's What's Inside that Counts!
It's What's Inside that Counts!It's What's Inside that Counts!
It's What's Inside that Counts!
 
New relic
New relicNew relic
New relic
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Client
 
Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!
 
Server and application monitoring webinars [Applications Manager] - Part 2
Server and application monitoring webinars [Applications Manager] - Part 2Server and application monitoring webinars [Applications Manager] - Part 2
Server and application monitoring webinars [Applications Manager] - Part 2
 
Geekit -Testing Services
Geekit -Testing ServicesGeekit -Testing Services
Geekit -Testing Services
 

Similar to Thanks for All the Phish: Introducing Core Impact 18.1

Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration Presentation
James Garrett
 
Reduce Time to Value: Focus First on Configuration Management Debt
Reduce Time to Value: Focus First on Configuration Management DebtReduce Time to Value: Focus First on Configuration Management Debt
Reduce Time to Value: Focus First on Configuration Management Debt
Chris Sterling
 

Similar to Thanks for All the Phish: Introducing Core Impact 18.1 (20)

Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration Presentation
 
Plumbr Slide Deck
Plumbr Slide DeckPlumbr Slide Deck
Plumbr Slide Deck
 
Module 6 - Insider Risk.pptx
Module 6 - Insider Risk.pptxModule 6 - Insider Risk.pptx
Module 6 - Insider Risk.pptx
 
Has visibility of user experience become clouded by complexity?
Has visibility of user experience become clouded by complexity?Has visibility of user experience become clouded by complexity?
Has visibility of user experience become clouded by complexity?
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Falconide Triggered/Transactional Emails Product Presentation
Falconide Triggered/Transactional Emails Product PresentationFalconide Triggered/Transactional Emails Product Presentation
Falconide Triggered/Transactional Emails Product Presentation
 
Using Static Analysis Tools to Become a Superhero Programmer.pptx
Using Static Analysis Tools to Become a Superhero Programmer.pptxUsing Static Analysis Tools to Become a Superhero Programmer.pptx
Using Static Analysis Tools to Become a Superhero Programmer.pptx
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Reduce Time to Value: Focus First on Configuration Management Debt
Reduce Time to Value: Focus First on Configuration Management DebtReduce Time to Value: Focus First on Configuration Management Debt
Reduce Time to Value: Focus First on Configuration Management Debt
 
UK Conference 2018_How to engage your IT security team and fund your SAM prog...
UK Conference 2018_How to engage your IT security team and fund your SAM prog...UK Conference 2018_How to engage your IT security team and fund your SAM prog...
UK Conference 2018_How to engage your IT security team and fund your SAM prog...
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser Attacks
 
eFolder Expert Series webinar — Pushing the Envelope: Bringing Email Continui...
eFolder Expert Series webinar — Pushing the Envelope: Bringing Email Continui...eFolder Expert Series webinar — Pushing the Envelope: Bringing Email Continui...
eFolder Expert Series webinar — Pushing the Envelope: Bringing Email Continui...
 
Automation and Technical Debt
Automation and Technical DebtAutomation and Technical Debt
Automation and Technical Debt
 
Real Time Experiment Analytics at Pinterest with Apache Flink - Ben Liu & Par...
Real Time Experiment Analytics at Pinterest with Apache Flink - Ben Liu & Par...Real Time Experiment Analytics at Pinterest with Apache Flink - Ben Liu & Par...
Real Time Experiment Analytics at Pinterest with Apache Flink - Ben Liu & Par...
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Owasp LA
Owasp LAOwasp LA
Owasp LA
 
Cheapest User Stories - The Achilles Heel of Agile
Cheapest User Stories - The Achilles Heel of Agile Cheapest User Stories - The Achilles Heel of Agile
Cheapest User Stories - The Achilles Heel of Agile
 
158 - Product Management for Enterprise-Grade platforms
158 - Product Management for Enterprise-Grade platforms 158 - Product Management for Enterprise-Grade platforms
158 - Product Management for Enterprise-Grade platforms
 

More from Core Security

More from Core Security (20)

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
 
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
 
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityVulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
anilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Recently uploaded (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 

Thanks for All the Phish: Introducing Core Impact 18.1

  • 1. Impact 18.1 A Focus on Users/Client –Side Testing
  • 2. AGENDA • What’s New in Impact 18.1 (High-level) • Why Focus on Users/Client-Side Testing • More Detailed Look at 18.1 • Demo
  • 3. • Dynamic Credential Capturing • Temporal Agent Enhancements • Updated Status View & New Auto-Tagging • Re-Designed Testing Workflows • Import New Email Templates • Updated Default Email Templates • New Phishing Wizard What’s New in Impact 18.1? Release Focused on Client Side or User Testing
  • 4. Why Focus on Users? Client Side Testing • Email is the #1 delivery vehicle for most malware & 1 in 131 emails contained malware in 20161 • 76% of organizations report being victim of a phishing attack in 20162 • Reports of W-2 phishing emails increased 870% in 20173 • Unfortunately, WE (humans) are the often the weakest link 1 - https://www.symantec.com/security-center/threat-report 2 - https://info.wombatsecurity.com/state-of-the-phish 3 - https://www.bna.com/w2-email-scam-b73014451281/
  • 5. U S E R S I M PA C T A C T U A L W E B S I T E • Not a clone website • Don’t have to host - little resources required • Capture credentials from more modern websites Dynamic Credential Capturing IMPACT18.1
  • 6. Temporal Agent Enhancements IMPACT 18.1 • Introduced “self-destruct” agent in previous release • Now adding more options: IMPACT AGENT • Product Level (whole) • Workspace Level • Module/RPT Level Agents left behind could become backdoor paths for attackers and can unnecessarily drain resources of machines deployed on
  • 7. Updated Status View & Auto Tagging IMPACT 18.1 Auto Tagging for Further Testing 1. Open & Viewed AND clicked link 2. Open & Viewed, clicked link, AND gave credentials or downloaded and ran attachment
  • 9. Import New Email Templates IMPACT 18.1 • Reduce time to create realistic email templates • Don’t have to know HTML • Click save to capture any & template-ize any email
  • 10. Updated Default Email Templates IMPACT 18.1 • Less templates – spend less time find one • Modernized templates – improved effectiveness • Modern language & style to mimic today’s email norms
  • 11. New Phishing Wizard IMPACT 18.1 RPT Wizard Attack & Penetration RPT Wizard Phishing RPT Wizard Phishing RPT Wizard Phishing RPT Wizard Phishing • Phishing Wizard buried under Attack & Penetration Wizard • Now it’s own & easy to find
  • 12. D E M O
  • 13. COMING SOON! The Core Impact Customer Community • Real-time chat with other Core Impact customers as well as various Subject Matter Experts from SecureAuth + Core Security • Question and Answer area to ask and answer questions about using Core Impact • On-Demand Training area to take multiple short online training courses on various Impact topics • Code Repository where you can post code for custom modules or find custom modules others have created
  • 14. THANK YOU © 2017 by SecureAuth All rights reserved