Standoff Defend

New version

The cyberrange where infosec teams can master their APT attack detection and investigation skills online 24/7

Included in the Unified Register of Russian Software

Emulated tactics of real APT groups

With the Standoff Defend cyberrange, you can enjoy a unique experience in a safe environment, realistic infrastructure, and round-the-clock access.

screenshots

Common challenges cybersecurity teams face

Threats evolve faster than skills

As attack methods are getting more and more complex, security teams struggle to promptly develop response measures for new threat scenarios.

Lack of hands-on experience

Training sessions often take place in isolated environments that don't give a sense of the complexity and scale of real-world corporate infrastructure.

Inability to track team progress

The shortage of specialists and lack of measurable performance metrics make it difficult to give an objective assessment of the team's skills.

Standoff Defend is your answer to modern cyberthreats

Progress tracking

Individual and team analytics with comprehensive reports provide objective metrics to assess performance dynamics.

skillsGrowth

Realistic experience

Train within an interconnected infrastructure of 1,500+ VMs and 500+ software units, closely resembling the ones you deal with in your everyday work.

asInRealLifeImg

Real-world APT attacks

We accurately simulate tactics used by APT groups so that you can engage with authentic attack scenarios.

realAPTAttacksImg

Standoff Defend benefits

For cybersecurity specialists

·Receive an assessment of your skills.
·Improve expertise through constant exposure to attacks.
·Gain hands-on experience using a variety of cybersecurity tools.
·Get recommendations on how to develop your competencies from leading industry experts.
informationSecurity

Cyberrange overview

polygonSchema

Begin your investigation now

Attack by the APT group Charming Kitten

Attack by the APT group Charming Kitten

Investigate the attack based on the activities of a real APT group Study the most up-to-date techniques and tactics of threat actors to be prepared for real-life cyberattacks

Getting started with team training

01
Request to sign up
We'll contact you within five days of receiving your request to clarify your team's needs and goals.
02
Discuss the terms
Choose the most fitting option for your team and sign up for 12 months of access to training.
03
Go through the initial test
After each participant undergoes a knowledge assessment, we'll evaluate your skills and provide relevant tasks.

Take the first step to upgrade your team's skills

mail

Our products for cyberattack investigation training

For businesses and cybersecurity professionals

Standoff Cyberbones online simulatorStandoff Defend cyberrangeStandoff Cyberbattle
ObjectiveSelf-guided practice in incident investigation using information security toolsComprehensive development of defensive security skills with mentor supportIntensive assessment of the team's readiness for real-time cyberattack response
Features
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Use of different security tools
  • Analysis of attacks from past Standoff cyberbattles
  • Investigation of live attacks
  • Mentor support
  • Investigation of controlled attacks simulating APT scenarios
  • Access to the defensive security knowledge base
  • Use of different security tools
  • Investigation of live attacks
  • Mentor support (optional)
  • Response to live attacks (optional)
Task types
Tasks based on Standoff Cyberbattle incidents
  • Tasks based on Standoff Cyberbattle incidents
  • 15 APT scenarios with
attack chains consisting of
8–25 steps
  • PRO version extras:
  • Detection and investigation of live attacks (a custom cyberbattle)
  • Response mode
  • Detection and investigation of live attacks
  • Response to live attacks (optional)
Attack format
Incidents from past Standoff cyberbattles
  • Incidents from past Standoff cyberbattles
  • Live hacker attacks
  • Controlled attacks
Live hacker attacks
Training formatSelf-guidedIndividual and team-based with mentor supportTeam-based with optional mentor support
Duration3 or 12 months12 months3–5 days
Mentor supportExpert support via Telegram botIndividual and team mentoringOptional
Number of security tools555 or more
Number of team membersFrom 5 to 15Up to 15Up to 15
Service manager
Supplementary materials
Quick start guides for security tools
  • Quick start guides for security tools
  • Knowledge base with theoretical and practical materials
  • Personalized recommendations
Optional