Our mission

Metis - Prepare your next Phishing Awareness campaigns

Raise awareness among your employees with our SaaS solutions. Train your employees to recognize threats and report them.

Why choose Metis from Oletros?

Some points that led us to build this solution.

Real world techniques

We constantly track malicious actors, allowing us to be constantly informed of current techniques, from spoofing to QRishing.

Not only templates

We use Microsoft templates of course, but we are also able to use the forms of your solutions exposed on the Internet such as your SSO.

Threat evolution

Several difficulty levels available and the possibility of spreading out the campaign over time, all with the aim of avoiding the effect of campaign fatigue.

User segmentation

As some users are more sensitive than others, we have chosen to put a segmentation of your users in place and thus allow targeted campaigns.

Train users

Because prevention is nothing without improvement, we explain to trapped users how to detect phishing.

Real time metrics

You will have all the metrics in real time, as well as evolution graphs by user, segments and at the global level.

Use cases

Discover how Metis serves as the ideal platform, providing methods & training to improve the vigilance of your employees

Domain identity theft

Customer situation

With our EASM service, we had found unsecure domains on the client perimeter. This allowed an attacker to send emails pretending to be the company, and without the security systems blocking it because it was allowed by an overly flexible configuration. The poc that we presented was striking for them, even for internal cybersecurity team.

Our resolution

We made a report, explained how to resolve the incident and what technologies to rely on to facilitate the resolution. Then we proposed our platform to build targeted campaigns against IT people.

Phishing training

Customer situation

A company needed a guide to send to employees to understand the broad outlines of phishing and social engineering methods.

Our resolution

We have produced a guide in the form of a document with the different common attacks accompanied by video demonstrations on their perimeter. We contributed to the creation of a questionnaire to measure the uptake of information but also engagement around the subject.

Would you like a demonstration of our offer?