In TSAT) the Reports section serves as a robust repository of insights, providing a comprehensive analysis of campaign performance, user behavior, and incident response. Let's delve into the Reports section of TSAT, exploring its various subsections and the wealth of information they offer.
Campaign Analytics
The Campaign Analytics sub-section furnishes organizations with an in-depth overview of all campaigns executed within TSAT, offering a wealth of metrics and graphical representations to assess performance and identify areas for improvement.
Key metrics include:
Number of emails sent, opened, and reported as suspicious
Links clicked and data submitted
Visual depiction of high-risk categories, phish risk, and high-risk groups
Click Reports
The Click Reports sub-section provides detailed analysis of malicious links clicked by users, shedding light on potential security breaches and user behavior.
Key insights include:
Total clicks and average click rate
Country-wise distribution of clicks
Category click response and group-wise click rate
Top 5 countries with the highest click rates
Breach/ Incident
The Breach/Incident sub-section equips organizations with tools to swiftly respond to security breaches and incidents, minimizing impact and mitigating risks.
Key metrics and insights include:
Average breach time and incident report time
Visual representation of campaign breach, category response, and group response
First breach response time for timely incident resolution
Repeat Offenders
The Repeat Offenders sub-section focuses on identifying and addressing repeat offenders within the organization, enabling targeted interventions and risk mitigation strategies.
Key data points and graphs include:
Total number of users, offenders, and repeat offenders
Graphical representation of top offenders and employee threat profile
Analysis of offenders and repeat offenders by category and department
Filters in TSAT Reports
In TSAT's Reports section, filters streamline analysis for sharper insights:
Time Frame: Choose from Last 24 Hours, Last 7 Days, Last 30 Days or custom time range for focused monitoring.
Attack Vector: Filter by Phishing, Smishing, Ransomware or Vishing to pinpoint specific threats.
Credential Harvesting: Distinguish campaigns with credential harvesting enabled or disabled for targeted scrutiny.
Campaign Selection: Analyze all campaigns or selectively filter by campaign name for tailored assessment.
Location: Gain geographic insights to address regional-specific threats.