- Knowledge Base
- Phishing & Awareness Training
- Data privacy
-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
-
Dashboard
Is data posted in forms stored?
A part of the phishing simulation workflow is web pages, including forms asking users for sensitive information, such as login credentials. The user's actions in the simulation are stored, but the data posted in the form is instantly deleted and not stored for data security and privacy reasons.