Products



The Q-LOG Computerized Awareness Training System educates your employees to prevent cyber-attacks such as phishing, malware, spyware, ransomware, along with social engineering manipulation prevention. Q-LOG is a modular system that works across the platforms you use in the workplace including desktop and mobile devices, all without any need for client-side software.

The Q-LOG system is built around three core concepts:

  • Effective management and measuring tools to understand the “at risk” status of your organization, down to the level of the individual employee and to carry out training campaigns easily and effectively
  • Computerized data security policy training to give employees the theoretical knowledge on data security best practices.
  • Mock attack campaigns to test if the theoretical knowledge is being implemented through data-safe computing behavior

Q-LOG is licensed by modules providing a cost-effective solution to meet your needs, no matter how large or small. You license only what you need.

Installation and integration of the Q-LOG software is easy using the hardware and software servers and directories that already exists in your organization.

Management and Measurement

The core of Q-LOG is the management and measurement module that gives the system administrator easy to use and powerful tools to develop, schedule, execute and measure the effectiveness of cyber-awareness training. You will always know the “at-risk” level of your organization and the best course of training action to reduce risk to its lowest possible level.

  • Ensure training happens exactly as needed by scheduling and executing campaigns automatically
  • Solidify training topics by scheduling campaigns to recur at regular intervals or ad-hoc as needed
  • Effectively target training by categorizing employees according to groups, departments, job type
  • Measure effectiveness by collecting results for each employee and each campaign
  • Quickly understand the “at-risk” status of your organization by viewing data as tables and graphs
  • Filter data according to campaign, employee, pass/fail and other parameters
  • Know each employee, department or group training success rate
  • Tailor the level of training individually to each employee, group, department and job type

Enterprise Policy Training Module

The Enterprise Policy training module gives employees a solid theoretical base to combat cyber-attacks and social engineering manipulations. This training is conducted through pop-up windows that appear at scheduled intervals on the PC screens. The pop-ups display either a multiple choice question or a training message. Q-LOG comes with many common policy questions and notifications that are built in and customizable by your IT department or through Celestya’s Service Packages. Questions are categorized according to topic and difficulty level so that each employee, group or department gets the best training according to their level and need.

  • No client software required.
  • No need to take breaks from work - multiple choice questions and notifications pop-up on the endpoint that require only a minute or two of attention.
  • Target vulnerabilities by keeping statistics per user, per group, and per question to measure proficiency levels
  • Reinforce your training by having questions and notifications appear on a regular schedule or by being pushed manually
  • Train efficiently by categorizing users according to knowledge level
  • Easy creation and management of training questions and notifications by categorizing according to topic and difficulty level

Phishing Training Module

Use the Q-LOG Phishing module to create, schedule, conduct and analyze mock phishing attacks across common platforms like PC, web, mobile, and media transfer (USB/DVD/CD). This module includes all of the tools necessary to conduct effective anti-phishing education across the organization. The Q-LOG Phishing module comes with ready-to-go emails, file attachments and landing pages that can be used as-is or after easy customization. These campaigns are up to date and reflect the latest and most effective types of phishing attacks. Enjoy complete flexibility with the included tools to easily copy content from well-known websites and rapidly build genuine looking emails and landing pages.
The Q-LOG Phishing module is installed within your organization and integrates with the Active Directory. Mails are distributed using your organization’s mail server.
When an employee fails a mock-attack and clicks on a link, fills in a form or downloads an attachment, an educational message is provided explaining exactly what the mistake was and how to avoid it in the future. These educational and customizable landing pages and file attachments are included with the Q-LOG Phishing module.

  • No client software required.
  • No need to take breaks from work - multiple choice questions and notifications pop-up on the endpoint that require only a minute or two of attention.
  • Target vulnerabilities by keeping statistics per user, per group, and per question to measure proficiency levels
  • Reinforce your training by having questions and notifications appear on a regular schedule or by being pushed manually
  • Train efficiently by categorizing users according to knowledge level
  • Easy creation and management of training questions and notifications by categorizing according to topic and difficulty level

Cross Platform Training

Cross Platform Training
The Q-LOG system works the way you do to train and educate against cyber-attacks and social engineering. The system is designed to be cross-platform across common devices, such as mobile phones, discs and thumb drives.
No client software is needed on any of the endpoint devices.
The cross platform training leverages all of Q-LOG’s capabilities:

  • Mobile device mock attacks
  • SMISHING (sms phishing)
  • APPPhising (application phishing)
  • PC mock attacks
  • Mail phishing
  • Web phishing
  • Media phishing
  • CD, DVD, thumb-drive
  • PC Policy training on cybersecurity

Social Engineering Training

The Q-LOG system is an excellent platform to educate employees against the risks and tactics of social engineering. Social engineering attempts to manipulate employees into poor data security behavior that is contrary to the organization’s policy.
Social Engineering training is conducted the Enterprise Policy Training module. The questions and notifications in that module can be constructed to convey the important anti-social engineering theory and then test it through targeted questions.