{"id":62,"date":"2025-08-03T10:06:23","date_gmt":"2025-08-03T10:06:23","guid":{"rendered":"https:\/\/cyberone.com.sa\/?page_id=62"},"modified":"2026-01-20T10:46:42","modified_gmt":"2026-01-20T10:46:42","slug":"cyberone-phishtrace","status":"publish","type":"page","link":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/","title":{"rendered":"CyberOne PhishPath"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"62\" class=\"elementor elementor-62\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5674831 e-flex e-con-boxed e-con e-parent\" data-id=\"5674831\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-59587a7 e-con-full e-flex e-con e-child\" data-id=\"59587a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f86012 elementor-widget elementor-widget-elementskit-heading\" data-id=\"9f86012\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle  \">\n\t\t\t\t\t\tPRODUCTS\n\t\t\t\t\t<\/h3><h2 class=\"ekit-heading--title elementskit-section-title \">Cyberone PhishPath<\/h2>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>An Advanced Solution for Detecting and Managing Email Threats<\/p>\n<p>In today\u2019s complex digital threat environment, Cyberone PhishPath delivers clarity and protection. Purpose-built to support IT teams, it simplifies the detection, management, and mitigation of email-based risks. With powerful tools for rapid response, PhishPath turns what was once a heavy burden into a streamlined process, freeing your organization to focus on core business priorities.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b0361d e-con-full e-flex e-con e-child\" data-id=\"2b0361d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a419bc2 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"a419bc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"531\" height=\"422\" src=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg\" class=\"attachment-large size-large wp-image-850\" alt=\"\" srcset=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg 531w, https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path-300x238.jpeg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-58a8e69 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58a8e69\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a932c87\" data-id=\"a932c87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbdf869 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"bbdf869\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-17-2025-04_53_01-PM-1-768x512.png\" class=\"attachment-medium_large size-medium_large wp-image-593\" alt=\"\" srcset=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-17-2025-04_53_01-PM-1-768x512.png 768w, https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-17-2025-04_53_01-PM-1-300x200.png 300w, https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-17-2025-04_53_01-PM-1-1024x683.png 1024w, https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-17-2025-04_53_01-PM-1-930x620.png 930w, https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-17-2025-04_53_01-PM-1.png 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1fefdc1\" data-id=\"1fefdc1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f13dc7 elementor-widget elementor-widget-heading\" data-id=\"9f13dc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><h2 data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\" style=\"font-size: 32px;font-weight: 600;font-family: Roboto, sans-serif;letter-spacing: normal;text-transform: none;text-align: start\">What is Cyberone PhishPath?<span style=\"font-size: 40px;text-align: center\"><\/span><\/h2><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fda399 elementor-widget elementor-widget-text-editor\" data-id=\"4fda399\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyberone PhishPath<\/strong> is an intelligent cybersecurity tool that helps IT teams prioritize, investigate, and respond to suspicious emails reported by employees. By accelerating threat identification and streamlining workflows, it enables faster, more effective mitigation of email-based risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7bd802 elementor-widget elementor-widget-heading\" data-id=\"c7bd802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prepared to protect what matters most?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-b056656 e-flex e-con-boxed e-con e-parent\" data-id=\"b056656\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af0a9d2 elementor-widget elementor-widget-elementskit-heading\" data-id=\"af0a9d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Features<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8ce55e e-con-full e-grid elementor-invisible e-con e-child\" data-id=\"e8ce55e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;_ha_eqh_enable&quot;:false,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54d76e2 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"54d76e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Subject &amp; Content Analysis                <\/h3>\n                        \t\t  \t<p>Scan email titles, body text, and URLs to detect potential malicious content.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e41b2 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"28e41b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Automated Threat Classification                <\/h3>\n                        \t\t  \t<p>Group suspicious emails by sender, subject, attachments, or URLs for efficient investigation.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4c34a ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"2d4c34a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Attachment Scanning                <\/h3>\n                        \t\t  \t<p>Evaluate files within emails using integrated Anti-virus and Anti-malware tools.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce73bf9 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"ce73bf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Third-Party Threat Intelligence                <\/h3>\n                        \t\t  \t<p>Strengthen detection by integrating with external intelligence platforms.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd7b065 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"cd7b065\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Security App Integration                <\/h3>\n                        \t\t  \t<p>Connect seamlessly with existing incident response and antivirus tools.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc71e9b ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"dc71e9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Flexible Deployment                <\/h3>\n                        \t\t  \t<p>Our suite can be deployed either on-premise or on cloud, making it adaptable to the unique needs and existing infrastructure of your organization.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49859db ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"49859db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Integration Capabilities                <\/h3>\n                        \t\t  \t<p>Our solutions integrate effortlessly with your current security tools, delivering a unified and comprehensive approach to cyber defense.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19d8fec ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"19d8fec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Custom-Built and User-Specific                <\/h3>\n                        \t\t  \t<p>Our solutions provide extensive flexibility, allowing you to adapt them to your industry, organization, and workforce requirements.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-871f35f ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"871f35f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Rapid Detection &amp; Removal                <\/h3>\n                        \t\t  \t<p>Instantly quarantine or delete malicious emails from all user inboxes with one-click Exchange integration.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8aa3f0 e-con-full e-grid elementor-invisible e-con e-child\" data-id=\"c8aa3f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;_ha_eqh_enable&quot;:false,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7818476 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"7818476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Custom Rule Creation                <\/h3>\n                        \t\t  \t<p>Enhance security by building or editing custom YARA rules for specific use cases.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-447515e ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"447515e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Automated Threat Classification                <\/h3>\n                        \t\t  \t<p>Group suspicious emails by sender, subject, attachments, or URLs for efficient investigation.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c577d7f ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"c577d7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Attachment Scanning                <\/h3>\n                        \t\t  \t<p>Evaluate files within emails using integrated Anti-virus and Anti-malware tools.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97747c2 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"97747c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Third-Party Threat Intelligence                <\/h3>\n                        \t\t  \t<p>Strengthen detection by integrating with external intelligence platforms.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ff3961 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"5ff3961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Security App Integration                <\/h3>\n                        \t\t  \t<p>Connect seamlessly with existing incident response and antivirus tools.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd55ce0 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"cd55ce0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Flexible Deployment                <\/h3>\n                        \t\t  \t<p>Our suite can be deployed either on-premise or on cloud, making it adaptable to the unique needs and existing infrastructure of your organization.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8de7a03 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"8de7a03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Integration Capabilities                <\/h3>\n                        \t\t  \t<p>Our solutions integrate effortlessly with your current security tools, delivering a unified and comprehensive approach to cyber defense.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18c718b ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"18c718b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Custom-Built and User-Specific                <\/h3>\n                        \t\t  \t<p>Our solutions provide extensive flexibility, allowing you to adapt them to your industry, organization, and workforce requirements.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9ab0b ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"ce9ab0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    SIEM Compatibility                <\/h3>\n                        \t\t  \t<p>Forward logs and events to SIEM platforms for full integration into your security ecosystem.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b0c369 e-flex e-con-boxed e-con e-parent\" data-id=\"4b0c369\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-116608d elementor-widget elementor-widget-elementskit-heading\" data-id=\"116608d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Differentiators<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c6a826 e-con-full e-grid elementor-invisible e-con e-child\" data-id=\"6c6a826\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;_ha_eqh_enable&quot;:false,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf8e3d8 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"bf8e3d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Outlook Add-in                <\/h3>\n                        \t\t  \t<p>Empower staff to report and manage suspicious emails directly within Outlook\u2014detect, quarantine, and neutralize threats without extra resources.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9d5841 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"d9d5841\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Automated Email Analysis                <\/h3>\n                        \t\t  \t<p>Apply YARA rules to analyze headers, bodies, attachments, and URLs. Automatically group similar threats for faster action.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-faec433 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"faec433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Smart Auto-Response                <\/h3>\n                        \t\t  \t<p>Take immediate action based on pre-set rules\u2014apply responses globally, by tag, or case-by-case.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7506a6a ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"7506a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text- text- icon-lef-right-aligin elementor-animation-   \">\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Phishing Awareness Reporting                <\/h3>\n                        \t\t  \t<p>Integrate with phishing simulation and training to enable employees to recognize and report threats, turning them into active defenders.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-338f7d8 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"338f7d8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fa15e9\" data-id=\"6fa15e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b7e79a elementor-widget elementor-widget-heading\" data-id=\"8b7e79a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Who Should Use Cyberone PhishPath?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9d1b23 elementor-widget elementor-widget-text-editor\" data-id=\"f9d1b23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyberone PhishPath is an ideal tool for IT teams, cyber security professionals, and businesses of any size that place a high priority on maintaining a secure digital environment. This is particularly beneficial for organizations with extensive digital communication, where potential email threats could pose a significant risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d281dab elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d281dab\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a746ac2\" data-id=\"a746ac2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc55dd7 elementor-widget elementor-widget-image\" data-id=\"cc55dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"484\" height=\"370\" src=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-16-212502.png\" class=\"attachment-full size-full wp-image-450\" alt=\"\" srcset=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-16-212502.png 484w, https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-16-212502-300x229.png 300w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-642c021\" data-id=\"642c021\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d69f8ef elementor-widget elementor-widget-heading\" data-id=\"d69f8ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">JOIN TODAY<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5d5c4e elementor-widget elementor-widget-heading\" data-id=\"c5d5c4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Transform your cybersecurity approach<ul data-start=\"58\" data-end=\"287\"><li data-start=\"236\" data-end=\"287\"><p data-start=\"238\" data-end=\"287\"><br><\/p>\n<\/li>\n<\/ul>\n<p data-start=\"289\" data-end=\"414\" data-is-last-node=\"\" data-is-only-node=\"\"><\/p><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eaace1 elementor-widget elementor-widget-text-editor\" data-id=\"1eaace1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"90\" data-end=\"268\">Begin strengthening your organization\u2019s defense against phishing threats today. Reach out to us to arrange a free trial of CyberOne PhishPath and empower your employees to become cybersecurity defenders. Click here to start your path toward uncompromised data security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-401ff13 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"401ff13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberone.com.sa\/index.php\/request-demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79afd0b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79afd0b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle-asymmetrical&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle-asymmetrical&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M737.9,94.7L0,0v100h1000V0L737.9,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M737.9,94.7L0,0v100h1000V0L737.9,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d7748ea\" data-id=\"d7748ea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50f907f elementor-widget elementor-widget-heading\" data-id=\"50f907f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prepared to protect what matters most?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7387aa elementor-widget elementor-widget-heading\" data-id=\"d7387aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strengthen your cybersecurity with CYBERONE\u2019s cutting-edge protection solutions. Explore our seamless, easy-to-use tools built to safeguard your digital world.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92c3631 elementor-tablet-align-center elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"92c3631\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;_animation&quot;:&quot;flash&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-2d4e2d5\" data-id=\"2d4e2d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3313e05\" data-id=\"3313e05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-eb0c307\" data-id=\"eb0c307\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-d50cac3 e-flex e-con-boxed e-con e-parent\" data-id=\"d50cac3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-38ded41 e-con-full e-flex e-con e-child\" data-id=\"38ded41\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-f6aa2c3 e-con-full e-flex e-con e-child\" data-id=\"f6aa2c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a7ee58 elementor-widget elementor-widget-elementskit-heading\" data-id=\"0a7ee58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title \">Quick Links<\/h3><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a655c6b elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a655c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberone.com.sa\/index.php\/about-cybersecurity-awareness-training\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">About Us<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberone.com.sa\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Products<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberone.com.sa\/index.php\/contact-cybersecurity-training\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Contact us<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83db465 e-con-full e-flex e-con e-child\" data-id=\"83db465\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f389bba elementor-widget elementor-widget-elementskit-heading\" data-id=\"f389bba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title \">Contact Info<\/h3><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bb511f ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"8bb511f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-lef-right-aligin elementor-animation- media  \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  text-center\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-phone-call1\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Phone                <\/h3>\n                        \t\t  \t<p>+966115121746<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-607b103 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"607b103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-left text-left icon-lef-right-aligin elementor-animation- media  \">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon  text-center\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-envelope2\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Email                <\/h3>\n                        \t\t  \t<p>sales@cyberone.com.sa\nsupport@cyberone.com.sa<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db5fca6 e-con-full e-flex e-con e-child\" data-id=\"db5fca6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-47f27bf e-con-full e-flex e-con e-child\" data-id=\"47f27bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PRODUCTS Cyberone PhishPath An Advanced Solution for Detecting and Managing Email Threats In today\u2019s complex digital threat environment, Cyberone PhishPath [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":52,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-62","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Email Threat Intelligence &amp; Phishing Trace | CyberOne<\/title>\n<meta name=\"description\" content=\"Track and analyze phishing threats in real time with CyberOne PhishTrace. Uncover email attack origins, boost security, and protect your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Threat Intelligence &amp; Phishing Trace | CyberOne\" \/>\n<meta property=\"og:description\" content=\"Track and analyze phishing threats in real time with CyberOne PhishTrace. Uncover email attack origins, boost security, and protect your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T10:46:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"531\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/\",\"url\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/\",\"name\":\"Email Threat Intelligence & Phishing Trace | CyberOne\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberone.com.sa\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/path.jpeg\",\"datePublished\":\"2025-08-03T10:06:23+00:00\",\"dateModified\":\"2026-01-20T10:46:42+00:00\",\"description\":\"Track and analyze phishing threats in real time with CyberOne PhishTrace. Uncover email attack origins, boost security, and protect your organization.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberone.com.sa\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/path.jpeg\",\"contentUrl\":\"https:\\\/\\\/cyberone.com.sa\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/path.jpeg\",\"width\":531,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/cyberone-phishtrace\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberone.com.sa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\\\/\\\/cyberone.com.sa\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Awareness Training\",\"item\":\"https:\\\/\\\/cyberone.com.sa\\\/index.php\\\/cybersecurity-awareness-training\\\/cybersecurity-awareness-training-2\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CyberOne PhishPath\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberone.com.sa\\\/#website\",\"url\":\"https:\\\/\\\/cyberone.com.sa\\\/\",\"name\":\"\",\"description\":\"Cyber Safety Training for Organization and Kids\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberone.com.sa\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Threat Intelligence & Phishing Trace | CyberOne","description":"Track and analyze phishing threats in real time with CyberOne PhishTrace. Uncover email attack origins, boost security, and protect your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/","og_locale":"en_US","og_type":"article","og_title":"Email Threat Intelligence & Phishing Trace | CyberOne","og_description":"Track and analyze phishing threats in real time with CyberOne PhishTrace. Uncover email attack origins, boost security, and protect your organization.","og_url":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/","article_modified_time":"2026-01-20T10:46:42+00:00","og_image":[{"width":531,"height":422,"url":"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/","url":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/","name":"Email Threat Intelligence & Phishing Trace | CyberOne","isPartOf":{"@id":"https:\/\/cyberone.com.sa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/#primaryimage"},"image":{"@id":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg","datePublished":"2025-08-03T10:06:23+00:00","dateModified":"2026-01-20T10:46:42+00:00","description":"Track and analyze phishing threats in real time with CyberOne PhishTrace. Uncover email attack origins, boost security, and protect your organization.","breadcrumb":{"@id":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/#primaryimage","url":"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg","contentUrl":"https:\/\/cyberone.com.sa\/wp-content\/uploads\/2025\/08\/path.jpeg","width":531,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/cyberone-phishtrace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberone.com.sa\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/cyberone.com.sa\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Awareness Training","item":"https:\/\/cyberone.com.sa\/index.php\/cybersecurity-awareness-training\/cybersecurity-awareness-training-2\/"},{"@type":"ListItem","position":4,"name":"CyberOne PhishPath"}]},{"@type":"WebSite","@id":"https:\/\/cyberone.com.sa\/#website","url":"https:\/\/cyberone.com.sa\/","name":"","description":"Cyber Safety Training for Organization and Kids","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberone.com.sa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"yusuf Ogunsanya","author_link":"https:\/\/cyberone.com.sa\/index.php\/author\/yusuf\/"},"uagb_comment_info":0,"uagb_excerpt":"PRODUCTS Cyberone PhishPath An Advanced Solution for Detecting and Managing Email Threats In today\u2019s complex digital threat environment, Cyberone PhishPath [&hellip;]","_links":{"self":[{"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/pages\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":59,"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/pages\/62\/revisions"}],"predecessor-version":[{"id":1182,"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/pages\/62\/revisions\/1182"}],"up":[{"embeddable":true,"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/pages\/52"}],"wp:attachment":[{"href":"https:\/\/cyberone.com.sa\/index.php\/wp-json\/wp\/v2\/media?parent=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}