CyberShield Training and Simulation (TnS) offers a virtual cyber environment designed to train cyber-security professionals and decision makers in securing isolated and non-isolated networks against a broad spectrum of cyber-attacks.
The solution offers a scalable and realistic training experience where trainees are exposed to various attack scenarios and security breaches to improve their hands-on skills. CyberShield TnS simulates large-scale virtual networks (IT &SCADA) and attacks based on previous real-world incidents. It can also pinpoint system vulnerabilities and help security professionals develop Countermeasures and improved protocols for dealing with cyber-attacks on critical network systems.
The solution offers a holistic approach to training and simulation and includes a range of Security tools and systems, including:
Security information and eventmanagement (SIEM) systems
Forensic tools and supporting databases
Other network, security and cyber components
The solution’s advanced network traffic generator engine simulates attacks, legitimate traffic and normal user behavior to enable real-time training on multiple security systems and tools – across the various training teams.
The solution includes pre-built advanced cyber-attack scenarios, with comprehensive training materials and a simulated environment for training set-up, execution, monitoring and debriefing.
Leider gibt es für diesen Aussteller kein deutsches Firmenprofil.
The world has changed. Mankind technological leap holds within as much risks as opportunities due to the exponential growth in persistent, well-funded and highly targeted cyber-attacks (APT’s). Enterprises and nations today confront grave challenges in order to secure customers and public privacy, maintain operational continuity, and protect their employees and customers from harm.
The cyber cat and mouse race between attackers and defenders has spread into every computerized system and “safe” environments such as “isolated“ IT networks, Industrial Control Systems and heavy machinery. CyberBit’s technologies and methodologies address the widespread challenge based on the following best practices:
There will never be 100% prevention.
Efficient detection can be achieved only by putting singular pieces of information into greater context in time & in space.
Detection should always be accompanied with ad-hoc Forensics and Response capabilities.
Mitigation of cyber-attacks needs cross-organization attention from many parties besides the SOC (Legal, PR, Stack holders, Etc.).
Technology comprises but a portion of the solution; but trained personnel, policy and procedures are crucial for the protection of the organization.
CyberBit’s CyberShieldTM Products were designed to provide an intelligent holistic view of advanced cyber threats across multiple types of infrastructure for early detection and effective response. CyberShield Portfolio organizations can:
Identify high priority cyber incidents across the entire organization (IT networks, SCADA networks and more)
Gain a comprehensive understanding and drill down into advanced threat patterns
Respond quickly and effectively to the most severe threats
Constantly monitor system health and availability, as well as manage Quality of Service
Efficiently manage cyber operations, including implementing best practices throughout all teams, across
all sites, around the clock
Effectively train response teams across a range of complex APT scenarios
CYBERBIT was founded based on Elbit Systems existing cyber security technologies and activities, leveraging its capabilities by acquiring NICE Cyber & Intelligence Solutions. The merge of NICE Cyber & Intelligence Solutions into CYBERBIT completes the company's portfolio and places CYBERBIT as a global leader, offering end-to-end solutions. The combination of field-proven technologies and over two decades of global experience, as well as the knowledge, expertise, wide customer base and superior technology derived from the union between these two entities, positions CYBERBIT as a true market leader, operating to solve emerging cyber threats of Public Utilities, Financial enterprises, Oil & Gas and Heavy industries, National Critical Infrastructures and Global Enterprises.