Threat and event scenarios
- Threat and event scenarios simulate networks, traffic, attacks, and defense components to train and test security personnel and expose them to new intervention procedures and technologies in a safe and controllable environment.
- Multi-tenant architecture enables simultaneous users to run out-of-the-box, or custom attack/defense scenarios, using a friendly and intuitive web interface.
- Pre-packaged threat scenarios enable a variety of real user exercises in an isolated and sandboxedenvironment.
- Enhanced threat and event scenario editor for easy customization.
- Step-by-step visual documentation for each pre-packaged scenario.
- Dynamic scenario networking diagram
- Scenarios mimic an organization’s infrastructure enabling realistic attacks and real-time incident response
- Template editor.
Gamification
- Multi-tenant architecture enables multiple teams to compete, by scoring the most points in an allotted time, in a user-collaborative event
- Creation and management of gaming events including team management, scheduling and eventpublication control
- Event reporting (scoring dashboard, and flag journal)
- In-chat feature enables real-time communications during events
- User profile, history and reporting, group management.
Framework
- Simple update mechanism for the framework, and Virtual Routing Forwarding (VRF) components. The framework automatically includes VRF component for update
- Intuitive web interface with same look-and-feel for different permission-level users. The Framework incorporates role-based access control.
- Transparent environment deployment and orchestration.
- Custom VLAN editor for separating and naming customer logical network segments.
- Built-in isolation mechanisms to prevent interference between different tenants.
- Continuous resource monitoring (CPU, RAM, Disk) across all cluster VMs.
- On-the-fly VM template custom sizing (vCPU and RAM).
- Export event data to external database (for customized post-reporting and historic data retention).
Administration
- Admin tools – backup/restore/upgrade.
- Centralized Licensing Manager for Keysight product licenses.
- Secure terminal console + SSH CLI for administrative and network configuration purposes.
- SSL Certificate Manager.
- Centralized logging and diagnostics.
Reviews
There are no reviews yet.