Cybersecurity solutions provider Cloud Range unveiled its latest innovation – Range365, a fully customizable, live-fire cyber range-as-a-service platform.
The new offering is a departure from the conventional hardware-based solutions that have long dominated the cybersecurity sector. Instead, it offers a streamlined, cost-effective, and self-service approach for building and maintaining cyber ranges so that the technology is accessible to even more organizations.
Most companies run into roadblocks when it comes to managing cyber range - from complexity, cost, and time to maintaining an up-to-date cyber range - it has simply been far out of reach for many.
Now, with the power of the cloud, Range365 makes it possible for organizations to create their own virtual cyber ranges. They can model IT/OT cyber environments, complete with applications, data, tools, services, and physical and virtual resources tailored to their infrastructure and inventory.
Cyber defenders can easily simulate an array of attack scenarios, so they can stay ahead of the threat landscape and the cloud-based simulation platform makes it possible in a safe, scalable, and adaptable way for both training and testing.
“Range365 was born from the desire of our customers who saw the enormous benefits that live-fire simulation training had brought to their organization and wanted even more access and deeper customization from our industry-leading cyber range platform,” said Debbie Gordon, CEO and founder of Cloud Range.
The versatile platform can be used for various security and infrastructure testing needs.
This includes red team and blue team training as well creating malware, testing for vulnerabilities, making threat intelligence simulations, analyzing digital evidence, trying out new products, checking runbooks, and running tests for IT/OT convergence, among other things.
“Our new cyber range-as-a-service opens the door for limitless testing and training opportunities by delivering a cyber range that is capable of replicating any IT and/or OT infrastructure and security tool sets with the ability to launch live attacks and traffic in a fully virtualized environment,” said Gordon.
Edited by Greg Tavarez