Join The Herd
Start transforming your trainings at the click of a button.
Templates, guides, and demos to help you get the most out of Herd Security.
A step-by-step playbook for responding to phishing incidents, from detection through remediation and employee follow-up.
PDFA customizable security policy template covering acceptable use, data handling, AI tool usage, and incident reporting procedures.
PDFA comprehensive checklist for security teams to follow during incident response, ensuring no critical steps are missed.
PDFEverything you need to know to deploy Herd Security in your organization, from initial setup to your first automated intervention.
PDFA detailed guide to configuring Herd's policy engine, risk thresholds, escalation rules, and reporting dashboards.
PDFStep-by-step instructions for connecting Herd to your security stack, including Okta, CrowdStrike, Slack, and Google Workspace.
PDFAn interactive walkthrough of the Herd Security platform, covering the dashboard, policy engine, and intervention workflows.
InteractiveSee how Herd's real-time risk dashboard visualizes employee risk scores, behavioral trends, and intervention outcomes.
InteractiveExperience how Herd's autopilot mode automatically detects risky behavior and delivers personalized interventions without manual effort.
InteractiveNo resources found for this category. Check back soon.