Email Security

Expert Panel: How To Choose The Right Phishing Protection Solution

We asked 5 phishing protection experts for their advice on finding the right solution.

Last updated on Feb 3, 2025
Joel Witts
Written by Joel Witts
How To Choose The Right Phishing Protection SOlution

Choosing the right anti-phishing solution is crucial for defending against sophisticated social engineering attacks that target unsuspecting users.

How can organizations select a solution that effectively trains users, adapts to evolving phishing tactics, and ensures user engagement?

We asked 5 experts to provide their insights on the key considerations for selecting the most effective anti-phishing solution.


Mika Aalto, CEO of Hoxhunt: For CISOs evaluating solutions, my first recommendation is to understand that human-based attacks can be your biggest opportunity for risk reduction if you look for training solutions that go beyond compliance and create measurable behavior and culture change. Ensure that the solution you choose changes behavior with real attacks and that they have reporting capabilities to actually measure the impact across the organization. Engaging training with tailored learning paths is key to empowering your workforce as an effective line of defense.

Second, integration with your existing tech stack is crucial. The solution should work with your SOC tools and enhance your overall threat intelligence. This way, your investment in training feeds directly into a stronger, more coordinated security posture.

Third, demand Outcome-Driven Metrics (ODMs) from your security awareness team. Evidence of a solution’s impact on real threat detection and employee behavior change will help you discern results and justify a dedicated investment in human risk reduction. 

Lastly, choose a partner, not just a product. Select a vendor that will evolve with your organization’s needs and provide ongoing support, insights, and enhancements. Phishing tactics evolve, and so should your training. Read the full Q&A.


John Wilson, Senior fellow, threat research at Fortra: There is a plethora of phishing protection solutions on the market today. CISOs should seek to incorporate multiple layers of protection in their email security stack. Solutions that can quarantine messages after delivery are extremely helpful for handling threats that managed to get past other security layers.

CISOs should understand that no email security solution is 100% effective, despite what the vendor may tell you. Therefore, phishing simulation and training is a crucial part of a comprehensive security strategy.

It is important to select a solution that will integrate with your current email platform, without requiring significant changes to your existing mail flow. Finally, CISOs should prioritize solutions that utilize vast amounts of threat intelligence, as well as machine learning to stay on top of emerging threats. Read the full Q&A.


Roger Grimes, Data-driven defense evangelist, KnowBe4: Make sure the solution embraces all of human risk management, from culture to individual, customized feedback on down. Security awareness training is a big part of the solution, but only part of it. You have to use every tool, technical and educational, to decrease human risk. For example, a huge mistake many employees make is in visiting inappropriate websites, which are more likely to contain malware.

You not only want to teach and educate about it, but you also need tools to help do site content-filtering and teach right away when a user makes a mistake and goes to a bad website. We have a tool called Security Coach that, when told by your content filtering system that an employee went to a bad website, sends a message immediately to the employee, shows them company policy, and educates them about why it’s important not to do it. The closer you can do the coaching to the violation, the better the lesson will stick. Read the full Q&A.


Arnout van de Meulebroucke, CTO, Phished: Placing employee education at the forefront is crucial. Regular and effective training goes beyond raising awareness; it fosters meaningful behavioral change. This approach can reduce phishing incidents by as much as 97%. Equally important is ensuring that threats can be easily identified and reported, enabling employees to respond effectively. When evaluating potential solutions, it is essential to assess the provider’s reputation and reliability. Do they adhere to required standards and regulations? What level of customer support do they offer? A reputable vendor with a demonstrated track record provides not only technical expertise, but also timely support for addressing incidents or inquiries—critical elements for a secure and seamless implementation. Read the full Q&A.


Javvad Malik, Lead security awareness advocate, KnowBe4: Firstly, look beyond the veneer of features. The core of a sound phishing and security awareness program is its ability to engage and resonate with employees. Assess potential offerings not only on their technological merits but on how effectively they can change behavior and culture within your organization.

Secondly, demand adaptability. The threat landscape is perpetually in flux, necessitating an offering that evolves with emerging threats. A product should offer customization that allows your organization to simulate relevant phishing scenarios, gauging and enhancing your team’s resilience against them.

Lastly, seek offerings that offer comprehensive reporting capabilities. If you are unable to tangibly measure the impact of a training program, you will struggle to justify the investment and ROI. Read the full Q&A.


 Expert Insights Phishing Resources:



Written By Written By

Joel Witts is the Content Director at Expert Insights, meaning he oversees all articles published and topics covered. He is an experienced journalist and writer, specialising in identity and access management, Zero Trust, cloud business technologies, and cybersecurity. Joel is a co-host of the Expert Insights Podcast and conducts regular interviews with leading B2B tech industry experts, including directors at Microsoft and Google. Joel holds a First Class Honours degree in Journalism from Cardiff University.