AI Buyer Insights:

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Michelin, an e2open customer evaluated Oracle Transportation Management

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Michelin, an e2open customer evaluated Oracle Transportation Management

List of Microsoft Attack Simulator Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
BP Oil, Gas and Chemicals 100500 $189.2B United Kingdom Microsoft Microsoft Attack Simulator Phishing Protection 2022 n/a
In 2021, BP deployed Microsoft Attack Simulator within Microsoft Defender for Office 365 to automate ethical phishing campaigns and deliver security-awareness training. The implementation uses Microsoft Attack Simulator as the Phishing Protection capability to run scheduled simulation campaigns two times per month targeting about 75,000 employees as part of a UK enterprise security employee awareness use case. The deployment centralized simulation orchestration and campaign scheduling to reduce manual effort, leveraging automated phishing campaign templates and integrated reporting workflows to measure user responses. Microsoft Attack Simulator was configured to provide recurring simulations and to feed consolidated campaign metrics for ongoing measurement and reinforcement of positive security behaviour. Operational coverage focused on organization wide employee awareness, with security operations and training functions consuming simulation reports and trends. The solution was embedded inside Defender for Office 365, producing unified telemetry and campaign reporting for security teams. Governance established a two simulations per month cadence and centralized reporting to support measurement and reinforcement, improving the frequency and integration of phishing simulations and reporting while reducing manual administration. This positions Microsoft Attack Simulator as BP Phishing Protection for employee awareness within the enterprise security program.
Dogus Group Professional Services 21000 $1.0B Turkey Microsoft Microsoft Attack Simulator Phishing Protection 2021 Groupe Adeo
In 2021, Dogus Group implemented Microsoft Attack Simulator as part of a broader rollout of Microsoft 365 E5 and Microsoft Defender including Defender for Office 365 to strengthen phishing defenses. The deployment positioned Microsoft Attack Simulator within a Phishing Protection posture aimed at improving threat detection and accelerating investigations across the conglomerate. The implementation used Microsoft Attack Simulator to run controlled phishing simulation campaigns and awareness training, integrated with Defender for Office 365 detection and reporting capabilities. Configuration emphasis included simulation scheduling, campaign templates and training remediation workflows, aligning simulated attack telemetry with Defender for Office 365 incident alerts for unified phishing protection and user risk assessment. The solution was integrated into the Microsoft 365 E5 security stack, providing consolidated telemetry into security operations workflows and investigation tooling. Groupe Adeo supported the deployment, and operational coverage targeted security operations, IT and end user awareness across Dogus Group entities in Turkey, enabling incident queues and reporting to be surfaced centrally. Governance changes centered on embedding simulation cadence into security operations and formalizing phishing training follow up, with investigations accelerated through Defender for Office 365 alignment. Outcomes documented by the customer include faster incident response, improved reporting and strengthened protections for users through Microsoft Attack Simulator driven Phishing Protection.
Galp Oil, Gas and Chemicals 750 $188M Portugal Microsoft Microsoft Attack Simulator Phishing Protection 2021 n/a
In 2021, Galp deployed Microsoft Attack Simulator alongside Microsoft 365 E5 and Defender for Office 365 to strengthen security operations. The implementation emphasized Phishing Protection and was applied across Galp’s multinational workforce supporting critical energy services in Portugal and other regions. The Microsoft Attack Simulator implementation concentrated on regular phishing simulations and attack simulation training, with configuration focused on campaign orchestration, user awareness workflows, and simulation reporting. Galp used Microsoft Attack Simulator together with Defender for Office 365 detection telemetry to drive simulated attack campaigns and to exercise user response and training enrollment. Integration points centered on Defender for Office 365 and the Microsoft 365 E5 telemetry stack, enabling security operations teams to correlate simulation outcomes with real phishing detections and email protection signals. Operational coverage included company-wide user populations and security and IT teams, with simulations run on a recurring cadence to maintain awareness and testing. Governance and process changes emphasized scheduled simulation campaigns, centralized reporting into security operations workflows, and training escalation for users flagged by simulations. The deployment improved visibility and threat detection for Galp’s critical energy services in Portugal and other regions, aligning the Microsoft Attack Simulator Phishing Protection capabilities with operational security functions.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating Microsoft Attack Simulator

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Microsoft Attack Simulator. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Microsoft Attack Simulator Coverage

Microsoft Attack Simulator is a Phishing Protection solution from Microsoft.

Companies worldwide use Microsoft Attack Simulator, from small firms to large enterprises across 21+ industries.

Organizations such as BP, Dogus Group and Galp are recorded users of Microsoft Attack Simulator for Phishing Protection.

Companies using Microsoft Attack Simulator are most concentrated in Oil, Gas and Chemicals and Professional Services, with adoption spanning over 21 industries.

Companies using Microsoft Attack Simulator are most concentrated in United Kingdom, Turkey and Portugal, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Microsoft Attack Simulator across Americas, EMEA, and APAC.

Companies using Microsoft Attack Simulator range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 33.33%, large organizations with 1,001-10,000 employees - 0%, and global enterprises with 10,000+ employees - 66.67%.

Customers of Microsoft Attack Simulator include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Microsoft Attack Simulator customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Phishing Protection.