Column Control DTX

Keysight Cyber Range Solution

Data Sheets

Continuous Challenges Faced by the Industry

 

Expanding adoption of the latest digital technologies creates both opportunities and increased cyber risk. Security practitioners must assess new technologies' potential security impact on the network and educate themselves on the new environment

 

Private businesses as well as government bodies are responsible for protection of their technology, sensitive data, and intellectual property. To support this, organizations must have solid policy and procedure requirements that enable risk identification, prevent data compromise or theft, and provide an appropriately effective response when incidents occur

 

Additionally, private and public sector cybersecurity leaders struggle to attract, hire, and maintain talented security professionals. Newly hired security professionals must be workforce-ready from day one and able to contribute to the team effort of reacting to every incident. This cybersecurity resource and skills gap can easily translate into costly breaches

 

Traditional approaches to security training, such as classroom training and tabletop exercises, do not adequately prepare front-line security employees with the ability to effectively detect and manage the complexities of an actual cyber incident. Security teams often train on security attacks that are unrelated to their current network infrastructure, day-to-day tools, and processes

 

As a result, the need for hands-on experiential learning has expanded. This type of learning enables security professionals to practice realistic attacks and defense responses in a simulated environment, as well as explore ways to mitigate cybersecurity risks

 

Highlights

 

• Easy-to-use solution for cyber security assessment

• Multi-tenant architecture

• Security tool agnostic

• Predefined and customizable threat scenarios

• Real-world simulations using Keysight tools (optional)

• Capture the Flag events promote increased team collaboration  

 

Our Solution: Keysight Cyber Range

 

The Keysight cyber range is a complete solution that provides a controlled protected environment for security professionals to gain hands-on cyber skills and to test the organization’s security posture. The solution consists of

 

• Cyber Security Operations Platform – the solution foundation with cyber range orchestration, management, reporting, platform administration, and data export gamification (capture the flag (CTF)).

• Tools – traffic generators (i.e., BreakingPoint), SIEM, exploit tools and frameworks, web servers, firewalls, IDS/IPS and more.

• Threat scenarios – a library of predefined threat scenarios, and the ability to create customized scenarios.

• Event scenarios – predefined or custom event scenarios specifically targeted for team-based gamification events, such as Capture the Flag.

• Learning content – educational and instructional materials on each cyber exercise.

• Consulting services – expertise to build the right solution for each organization, including customized threat scenarios and event scenarios, as well as integration of 3rd party, commercial or open-source components.

• Training services – training on solution implementation and Keysight tools.

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX