Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Cloud Range offers a comprehensive cyber range-as-a-service platform aimed at training and evaluating cybersecurity teams through realistic live-fire attack simulations that mirror genuine threats in a secure, controlled virtual setting. This platform allows organizations to build tailored replicas of their IT, OT, and cloud environments, enabling teams to hone their skills in detecting, responding to, and alleviating cyberattacks using the same tools and systems utilized in their operations. Featuring a multitude of attack scenarios grounded in actual threat intelligence, Cloud Range supports a variety of exercises for red teams, blue teams, and purple teams, along with capture-the-flag events and tabletop simulations that enhance both technical abilities and strategic decision-making. Additionally, Cloud Range delivers a seamlessly integrated solution that incorporates customizable learning paths, skill development labs, hiring evaluations, and performance tracking, empowering organizations to pinpoint weaknesses, assess readiness, and consistently elevate the capabilities of their workforce. Ultimately, this robust training platform not only prepares teams for potential threats but also fosters a culture of continuous improvement in cybersecurity practices.

Description

Parallel Domain Replica Sim empowers users to create highly detailed, fully annotated simulation environments using their own captured data, such as images, videos, and scans. With this innovative tool, you can achieve near-pixel-perfect recreations of actual scenes, effectively converting them into virtual settings that maintain their visual fidelity and realism. Additionally, PD Sim offers a Python API, allowing teams focused on perception, machine learning, and autonomy to design and execute extensive testing scenarios while simulating various sensor inputs like cameras, lidar, and radar in both open- and closed-loop modes. These simulated sensor data streams come fully annotated, enabling developers to evaluate their perception systems across diverse conditions, including different lighting, weather scenarios, object arrangements, and edge cases. This approach significantly reduces the need for extensive real-world data collection, facilitating quicker and more efficient testing processes. Ultimately, PD Replica not only enhances the accuracy of simulations but also streamlines the development cycle for autonomous systems.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Claroty
CrowdStrike Falcon
Fortinet
Juniper Secure Connect
Kali Linux
Microsoft 365
Nozomi Networks
Palo Alto Networks Strata
Python
Red Hat OpenShift
Security Onion
Splunk Cloud Platform
Ubuntu
pfSense

Integrations

Claroty
CrowdStrike Falcon
Fortinet
Juniper Secure Connect
Kali Linux
Microsoft 365
Nozomi Networks
Palo Alto Networks Strata
Python
Red Hat OpenShift
Security Onion
Splunk Cloud Platform
Ubuntu
pfSense

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cloud Range

Founded

2018

Country

United States

Website

www.cloudrangecyber.com

Vendor Details

Company Name

Parallel Domain

Founded

2017

Country

United States

Website

paralleldomain.com/product

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

Simulation

1D Simulation
3D Modeling
3D Simulation
Agent-Based Modeling
Continuous Modeling
Design Analysis
Direct Manipulation
Discrete Event Modeling
Dynamic Modeling
Graphical Modeling
Industry Specific Database
Monte Carlo Simulation
Motion Modeling
Presentation Tools
Stochastic Modeling
Turbulence Modeling

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike

Alternatives

MetaPhish Reviews

MetaPhish

MetaCompliance
Bifrost Reviews

Bifrost

Bifrost AI
ThreatX Reviews

ThreatX

A10 Networks
WaveFarer Reviews

WaveFarer

Remcom