Cloud Range HAS revolutionizED cybersecurity training.
By giving security professionals the opportunity to practice detection, investigation, and response in a protected environment, they have the ability and confidence to be prepared for any type of cyber attack.
Why cyber defenders require SIMULATION to be prepared
Simulation Training provides your security teams with the ability to practice-and that shouldn’t be a luxury. Cloud Range arms your security team with skills, problem solving, and critical thinking capabilities that will take your team to the next level.
A Safe Environment allows analysts to hone their skills in a safe and controlled environment where scenarios can be custom-built to reflect attacks that teams have faced or fear they will face in the future, or randomized, to reflect the constantly changing nature of today’s threats.
CLOUD RANGE’S NEXT-GEN CYBER RANGE
Not all cyber ranges are created equally. Traditionally, a cyber range was used as a simulation platform to assess technical and network vulnerabilities. Today, that is not enough. Cloud Range’s Next Generation Cyber Range combines the world’s leading simulation technology with world-class services to provide SOC Operations and Incident Response teams with customized, hands-on training in a controlled and secure environment.
Integration with Market-Leading Security Products
Cloud Range leverages commercially licensed, market-leading security products that your team will find in a real-world SOC, including SIEMs, firewalls, IDS’s, endpoint security systems, and analysis tools. This allows your trainees to practice using the same products they will use in real-life scenarios.
Customized Network Replica
Cloud Range can replicate your network infrastructure, offering rich, multi-segment virtual replicas of enterprise IT and OT networks that include application servers, database servers, email servers, switches, routers and PLCs. We can tailor your training environment to include the exact cybersecurity tools your team uses every day, including SIEM, Firewall, endpoint security, or forensic tools, to achieve hyper-realistic training in real-life settings.
Unlimited Attack Scenarios
Cloud Range provides a wide array of training offerings, each one including multiple attack scenarios that your cybersecurity can train on. These scenarios simulate up-to-date attacks in varying levels of difficulty.
Cloud Range includes an ICS (Industrial Control System) security package for critical infrastructure organizations, which emulates an industrial control network and the most recent ICS/OT attack scenarios.
Local and Remote Training
Cloud Range can deliver training directly to your site, or you can access the Cloud Range network and training platform remotely by logging onto our server. Trainees may therefore either train onsite as a fully-functional SOC team, or may connect to the range remotely over a convenient web-based interface, to develop their individual skills in stand-alone sessions.
The Trainer’S ROLE
Cloud Range provides optional trainers have complete visibility over any training session, with a centralized view into all trainee screens. Trainers can configure the training scenario, take over a trainee workstation any time, send private and group chat messages, and add comments into the recorded timeline which can later be reviewed during debriefing. With these immersive, monitored training sessions, Cloud Range trainees can better understand each training session on a deeper level and from different perspectives.
Extensive Debrief Capabilities
Leveraging debrief capabilities are key to an effective training session. Cloud Range trainers can record training sessions with screens, session events, trainee goals, and trainer comments. After each session, trainers have the ability to easily fast forward to crucial moments and focus on them with trainees. Trainees are automatically evaluated and graded, making it easy to track performance and goal achievements.