Standoff Defend
New version
The cyberrange where infosec teams master APT attack detection and investigation skills online 24/7
Emulated tactics of real APT groups
Standoff Defend offers a unique experience in a safe environment with realistic infrastructure and round-the-clock access.

Common challenges cybersecurity teams face
Threats evolve faster than skills
As attack methods grow more complex, security teams struggle to develop timely responses to new threat scenarios.
Lack of hands-on experience
Training sessions often take place in isolated environments that do not reflect the complexity and scale of real-world corporate infrastructure.
Inability to track team progress
A shortage of specialists and lack of measurable metrics make it difficult to assess the team's skills objectively.
Standoff Defend is your answer to modern cyberthreats
Progress tracking
Individual and team analytics with comprehensive reports provide objective metrics to assess performance.

Realistic experience
Train within an interconnected infrastructure of 1,500+ VMs and 500+ software components that resembles the systems you use every day.

Real-world APT attacks
We accurately simulate tactics used by APT groups so that you can engage with authentic attack scenarios.

Standoff Defend benefits
For cybersecurity specialists
·Receive an assessment of your skills
·Improve expertise through constant exposure to attacks
·Gain hands-on experience using a variety of cybersecurity tools
·Get recommendations on how to develop your competencies from leading industry experts

Cyberrange overview

Getting started with team training
01
Request to sign up
We'll contact you within five days of receiving your request to clarify your team's needs and goals.
02
Discuss the terms
Choose the most fitting option for your team and sign up for 12 months of access to training.
03
Go through the initial test
After each participant undergoes a knowledge assessment, we'll evaluate your skills and provide relevant tasks.
Take the first step to upgrade your team's skills

Our products for cyberattack investigation training
For businesses and cybersecurity professionals
| Standoff Cyberbones online simulator | Standoff Defend cyberrange | Standoff Cyberbattle | |
|---|---|---|---|
| Objective | ObjectiveSelf-guided practice in incident investigation using information security tools | ObjectiveComprehensive development of defensive security skills with mentor support | ObjectiveIntensive assessment of the team's readiness for real-time cyberattack response |
| Features | Features
| Features
| Features
|
| Task types | Task types Tasks based on Standoff Cyberbattle incidents | Task types
| Task types
|
| Attack format | Attack format Incidents from past Standoff cyberbattles | Attack format
| Attack format Live hacker attacks |
| Training format | Training formatSelf-guided | Training formatIndividual and team-based with mentor support | Training formatTeam-based with optional mentor support |
| Duration | Duration3 or 12 months | Duration12 months | Duration3–5 days |
| Mentor support | Mentor supportExpert support via Telegram bot | Mentor supportIndividual and team mentoring | Mentor supportOptional |
| Number of security tools | Number of security tools5 | Number of security tools5 | Number of security tools5 or more |
| Number of team members | Number of team membersFrom 5 to 15 | Number of team membersUp to 15 | Number of team membersUp to 15 |
| Service manager | Service manager— | Service manager | Service manager |
| Supplementary materials | Supplementary materials Quick start guides for security tools | Supplementary materials
| Supplementary materialsOptional |