Standoff Cyberbattle

A legendary international cyber exercise for information security specialists

Since 2016
Standoff has been an annual event
1,500+
virtual machines to create an ultrarealistic environment
4,000+
infosec experts from all over the globe are Standoff veterans

The cyberbattle is...

A cyber exercise for information security professionals from around the world to test their skills in highly realistic conditions

Red teams, the attackersBlue teams, the defenders

Cyberbattle mechanics

The cyber exercise takes place in a specially created virtual environment that simulates business processes from various industries, including energy, oil and gas, metallurgy, finance, and IT.

Depending on their objectives, participants are divided into attackers (red teams) and defenders (
blue teams
).

Participants' roles and goals

For each cyberbattle, we develop a unique scenario and design new tasks, but one thing remains the same: there are two types of participants.

Red teams

Red teams attack the infrastructure of companies residing in a virtual state and look for vulnerabilities in various systems.

This firsthand experience equips specialists to deliver high-quality security testing in real life and identify vulnerabilities before malicious actors do.

Blue teams

Blue teams are tasked with detecting and investigating cyberattacks. When participating in response mode, they can also repel and block attacker actions.

By challenging their skills in the battle, security professionals gain expertise to better protect real companies.

The one and only cyberbattle
that features real industrial controllers and ICS/SCADA systems as well as a physical 3D model so that anyone can see red teams' attacks with their own eyes
background

What's your angle?

Business
Hacking
Blue team

Your experts will gain hands-on experience in detecting, investigating, and responding to attacks to ensure robust protection of your organization from real-life cyberthreats

2 participation modes
Detect and investigate attacks in monitoring mode, or counter them in response mode
5 classes of security tools
Try out the most up-to-date software for detecting and preventing cyberthreats
1,000+ attacks
Level up your skills by dealing with automated synthetic attacks and attacks conducted by ethical hackers
Professional support
Professional support
If you want to participate in the next cyberbattle or set up your own, contact us.

Technology partners

The cyberrange is made possible thanks to the efforts of a huge team of industry experts, including contributions from our partners.

eKassir

eKassir

Software developer for banks and financial institutions

Netris

Netris

Competency Center of PJSC Rostelecom for video surveillance in smart cities and large businesses

SafeTech

SafeTech

Developer of innovative solutions for protecting remote banking systems and e-document management systems