Compare CyberHoot

View Listing


what is this?
interest falling
CyberHoot screenshot

About CyberHoot

Are you tired of low compliance, nagging employees to get training done, and hopping between multiple tools to manage your end-user cybersecurity?

CyberHoot is a combination of a Learning Management System and a Governance, Risk, and compliance tool that is designed to be Apple-Esq. CyberHoot is known for being one of the simplest, and most automated solutions on the market. CyberHoot was built by MSPs for MSPs to automate their cybersecurity program development and operations.

What do you get?

Cybersecurity Awareness Training - Hundreds of topics including Phishing, Password Hygiene, WiFi security, Two-factor authentication, and so much more! 650+ videos standard and growing!

Product Training - Over 50 product training programs from Microsoft to Salesforce with the ability to add any videos you would like and quiz users to ensure retention.

Phish Testing - Automated reporting to named email contacts at your company - employees who fail phishing tests are auto-enrolled in remediation training

Policy Management - 25 templates help you round out your training program and manage employees via governance policies (think: password policy, Written Information Security Policy [WISP], Information Handling Policy, and 20+ more fully vetted templates for policy and process management)

Dark Web Reporting - exposed online accounts are shared via reports to administrators for awareness

3rd party assessments - 10 to 100 question cybersecurity maturity assessments you can assess yourself or your 3rd party against. Helping your team come more prepared to your next meeting with the client

Program Automation - All the awareness training videos are scheduled automatically in a few clicks for a year's worth of automatic training. Compliance reports are automatically sent to managers keeping clients in the know on who is and is not doing their training.

Sales Module – Your sales reps will be able to run dark web scans and phishing simulations on your clients to establish urgency and provide evidence about why your clients should adopt this software.


  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management


  • Cybersecurity Awareness Training

  • Product Training

  • Phish Testing

  • Policy Management

  • Dark Web Reporting

  • 3rd party assessments

  • Program Automation

  • Automated Reporting

  • Sales Module



Included in plan:
  • 6 Cybersecurity Training Videos
  • Dark Web Monitoring
  • Optional Monthly Newsletters


1 server(s) / month
Included in plan:
  • Unlimited Cybersecurity Training Videos
  • Unlimited Phish Testing
  • Unlimited Policy Compliance Tracking
  • Unlimited Security Maturity Surveys
  • Dark Web Monitoring For All Users
  • Automated Compliance Reporting


1 server(s) / month
Included in plan:
  • All Business Features
  • Branded URL
  • Branded Portal and Emails
  • Multi-customer Tenancy
  • Free Use For Internal Employees


    Who are the main user groups of this service?
  • Managed Service Providers, Small to Medium-Sized Businesses, and Individuals.

  • Does this service integrate with any other apps?
  • Azure AD.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes. You can separate out your internal users as well as have sub-environments where you add your customers.

  • Does this service offer guides, tutorials and or customer support?
  • Yes, many 'HowTo' tutorials as well as fast direct customer support.

  • What is this service generally used for?
  • Cybersecurity Awareness Training, Policy Management, Dark Web Reporting, Phish Testing, and Risk Assessments.

Vendor Information

Based in:


Who uses CyberHoot
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
Regional Restrictions:
No restrictions.
Back to top