Standoff Defend

New version coming in April

A cyberrange where infosec teams can master their attack detection and investigation skills online 24/7

Don't miss the launch of the updated cyberrange

Train on the virtual IT infrastructure of a typical company

At the Standoff Defend cyberrange, infosec specialists can investigate attacks 24/7 and enhance their expertise with mentor support.

screenshots

Get attack-ready by learning tactics and techniques you've never encountered before

Your team is in for a lot a great lot of real practice

Controlled attacks

Every month, handle a new attack from Archer—a module for simulating user activity and reproducing APT attack scenarios.

Workshops with mentors

Get professional analysis of the attacks and challenging cases your team encounters while training at the cyberrange.

Mini cyberbattle

Harness your skills with a cyberbattle: detect and investigate a mixture of controlled attacks from Archer and real attacks by white hat hackers.

Knowledge base

Explore a collection of theoretical materials and tasks from our experts, tailored for each member of your team.

Standoff Cyberbones

With the online simulator, you can investigate the most interesting cases from the Standoff Cyberbattle.

Powerful preparation

Realistic experience

Round-the-clock access

Get hands-on practice with up to 15 scenarios of cyberattacks by major APT groups as well as live hacker traffic.

Train within an interconnected infrastructure made up of 1,500+ VMs and 500+ software units, closely resembling the ones you deal with in your everyday work.

Investigate controlled attacks or the most interesting Standoff Cyberbattle cases whenever it suits you.

Utmost preparation for real-world cyberthreats

Enterprise-level domain infrastructure
Emulation of external attacks
Dynamic modeling of user activity
In-depth vulnerability analysis
Centralized collection of security events
New version coming in April

Don't miss the launch of the updated Standoff Defend cyberrange

Start training now

01
Fill out the form
We will contact you within five days to clarify your request and your team's needs.
02
Discuss the terms
Based on your request and needs, choose to sign up for 6 or 12 months of access to training.
03
Go through the initial assessment
Each participant will undergo a knowledge assessment so we can evaluate the team's readiness and provide relevant tasks.

Take the first step to upgrade
your team's skills

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulator
Standoff Defend cyberrange
Standoff Cyberbattle
Objective
Self-guided practice in incident investigation using information security tools
Comprehensive development of defensive security skills with mentor support
Intensive assessment of the team's readiness for real-time cyberattack response
Features
Use of different security tools 
Analysis of attacks from past Standoff cyberbattles
Use of different security tools 
Analysis of attacks from past Standoff cyberbattles
Investigation of live attacks
Mentor support
Investigation of controlled attacks simulating APT scenarios
Access to the defensive security knowledge base
Use of different security tools 
Investigation of live attacks
Mentor support (optional)
Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
Tasks based on Standoff Cyberbattle incidents
Detection and investigation of live attacks (a custom cyberbattle)
15 APT scenarios with attack chains consisting of 8–25 steps
Detection and investigation of live attacks
Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
Incidents from past Standoff cyberbattles
Live hacker attacks
Controlled attacks
Live hacker attacks
Training format
Self-guided
Individual and team-based with mentor support
Team-based with optional mentor support
Duration
6 weeks
6 or 12 months
3–5 days
Mentor support
Individual and team mentoring
Optional
Number of security tools
5
5
5 or more
Number of team members
Up to 10
Up to 15
Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
Quick start guides for security tools
Knowledge base with theoretical and practical materials
Personalized recommendations
Optional