Cloud Range icon for how Cloud Range works

How Cloud Range
Works

Measurably Improve Your SOC and IR Teams’ Performance

A CYBER RANGE ISN’T A LUXURY ANYMORE.
IT’S A NECESSITY.

When security professionals have the opportunity to practice detection, investigation, and response in a protected, live-fire environment, they have the ability and confidence to be prepared for any type of cyberattack.

Cloud Range’s Flexible Cyber Range Subscriptions

Not all cyber ranges are created equally. Traditionally, a cyber range was used as a simulation platform to assess technical and network vulnerabilities. Today, that is not enough. Cloud Range’s next-generation cyber range combines the world’s leading simulation technology with world-class subscription-based programs. Leading SOC Operations and Incident Response teams depend on Cloud Range’s customized, hands-on training in a controlled and secure environment.

REQUEST A DEMO

Why Cyber Defenders Require Simulation to Be Prepared

Simulation Training provides your security teams with the ability to practice — and that shouldn’t be a luxury. Cloud Range arms your security team with skills, problem-solving, and critical thinking capabilities that will take your team to the next level.

A Safe Environment allows analysts to hone their skills in a safe and controlled environment where scenarios can be custom-built to reflect attacks that teams have faced or fear they will face in the future, or randomized, to reflect the constantly changing nature of today’s threats.

Flexible, Subscription-Based Cyber Range Programs are tailored to fit the needs and learning objectives of security teams of all sizes and skill levels. Cloud Range’s expert instructors will work with you to design and execute a program that will help measurably increase your organization’s cyber preparedness and decrease overall risk.

LIVE-FIRE CYBER SIMULATION EXERCISES FOR TEAMS

Maximize the effectiveness of your cyber defenders in our collaborative, real-world environment that measures cyber readiness

INDIVIDUAL CYBERSECURITY SKILLS DEVELOPMENT

Upskill your team with interactive, hands-on skills development so they’re prepared to defend against the latest threats

ASSESSMENTS TO HIRE AND RETAIN CYBER TALENT

Hire the best with our cognitive and role-based assessments that measure aptitude, skills and abilities

TABLETOP 2.0 EXECUTIVE INCIDENT RESPONSE

Ensure your executive and security teams are both prepared to address threats and reduce risk

 Be confident you can prevent your next cyberattack

Cloud Range’s Cyber Range Program

A successful cyber range program requires more than just world-class technology. In addition to utilizing the world's leading cyber range platform, Cloud Range exists to ensure that our customers and partners build and maintain a successful cyber range and simulation program within their organizations.

Cloud Range phased approach icon

Phased
Approach

  • Phased investment to reflect utilization

  • Varied levels of Cloud Range engagement

  • Instructor involvement: flexible approach allows customers to use their own instructors as they develop their cyber range, or choose to continue to engage our instructors.

Cloud Range instruction icon

Instruction/ Administration Option

  • Cloud Range professional instructors available

  • Self-service option (Customer’s own instructors)

  • Train the Trainer available

  • Onsite or remote trainers

  • Self-guided / Open range time

Cloud Range range icon

Infrastructure/
Range Access

  • Private access from anywhere in the world

  • Segregated network

  • No physical infrastructure or servers required

  • Trainees can join group sessions from anywhere in the world

Cloud Range access icon

Flexible Access
Options

  • FlexRange: subscription based on range utilization/ time

  • Range365: unlimited use

  • OpenRange: practice sessions

  • Phased utilization planning to minimize initial investment

Cloud Range tools icon

Custom
Environments

  • Integration of industry-leading security tools into the range environment

  • Train on the same tools you use every day

  • SIEM, firewalls, and other SOC tools from leading manufacturers can be integrated

  • Phased approach for additional integrations, as more people/teams participate in range simulation activities

Cloud Range curriculum icon

Curriculum Development

  • Initial team and individual skills assessments

  • Program adjustments as needed, based on progress

  • Team & individual training recommendations throughout employee lifecycle

  • Allows managers/leaders to focus on security (vs. training)

  • Scheduled program assessments for recommended content/ scenarios based on team and individual progress

Cloud Range content icon

Content
Design

  • Catalog of out-of-the-box attack simulations

  • Scenario design and customization option

  • Industry-specific scenario planning

  • Optional Tabletop 2.0 planning to enhance traditional tabletop exercises

  • Phased approach allows customers' skills to remain up to date, as the threat landscape evolves and new threat vectors emerge.

Cloud Range trainee development icon

Trainee
Development

  • Personalized assessments after each session

  • Skill enhancement recommendations

  • Sessions include soft skills training and assessment

  • Trainees have exposure to different roles and challenges

  • Tracking of team and individual progress

  • Increase employee skills, satisfaction, confidence, and retention rates

Integration with Market-Leading Security Products

Cloud Range leverages commercially licensed, market-leading security products that your team will find in a real-world SOC, including SIEMs, firewalls, IDSs, endpoint security systems, and analysis tools. This allows your trainees to practice using the same products they will use in real-life scenarios.

Customized Network Replica

Cloud Range can replicate your network infrastructure, offering rich, multi-segment virtual replicas of enterprise IT and OT networks that include application servers, database servers, email servers, switches, routers and PLCs. We can tailor your training environment to include the exact cybersecurity tools your team uses every day, including SIEM, Firewall, endpoint security, or forensic tools, to achieve hyper-realistic training in real-life settings.

Unlimited Attack Scenarios

Cloud Range provides a wide array of training offerings, each one including multiple attack scenarios that your cybersecurity can train on. These scenarios simulate up-to-date attacks with varying levels of difficulty.

ICS/OT Options

Cloud Range includes an ICS (Industrial Control System) security package for critical infrastructure organizations, which emulates an industrial control network and the most recent ICS/OT attack scenarios. 

Local and Remote Training

Cloud Range can deliver training directly to your site, or you can access the Cloud Range network and training platform remotely by logging onto our server. Trainees may therefore either train onsite as a fully functional SOC team, or they may connect to the range remotely over a convenient web-based interface, to develop their individual skills in stand-alone sessions.

The Trainer’s Role

Cloud Range provides optional trainers that have complete visibility over any training session, with a centralized view into all trainee screens. Trainers can configure the training scenario, take over a trainee workstation any time, send private and group chat messages, and add comments into the recorded timeline which can later be reviewed during debriefing. With these immersive, monitored training sessions, Cloud Range trainees can better understand each training session on a deeper level and from different perspectives.

Extensive Debrief Capabilities

Leveraging debrief capabilities are key to an effective training session. Cloud Range trainers can record training sessions with screens, session events, trainee goals, and trainer comments. After each session, trainers have the ability to easily fast-forward to crucial moments and focus on them with trainees. Trainees are automatically evaluated and graded, making it easy to track performance and goal achievements.

Be proactive about your cyber defense.
Request a demo today.