CyberRange is an advanced simulation solution that allows you to easily model IT/OT systems composed of tens or hundreds of machines and simulate realistic scenarios including real cyber attacks.
- Build complex virtual and physical systems close to your environment
- Replicate activities representative of your operations
- Simulate realistic scenarios including real cyber-attacks
Cyber Threat Intelligence
Collect, analyse, disseminate
Protecting a company against cyber-attacks involves all stakeholders within the organisation. We at Airbus CyberSecurity have therefore developed a Cyber Threat Intelligence (CTI) service that enables knowledge-sharing for better decision-making. Our CTI solution also facilitates cost-optimisation of the operational teams.
Airbus CyberSecurity’s CTI constantly monitors more than 130 Advanced Persistent Threats (APT) groups and gives our partners and customers early-warning signals on incoming attacks in order to properly prepare counter-measures in protecting themselves and reducing attack impact.
Cyber Threat Executive Report
We provide customised quarterly reports on APTs for the CIOs and CISOs in your organisation. These reports provide the insight required to facilitate strategic decision-making and the intelligence needed to implement the right security policies for your organisation and in accordance to unique business needs.
Cyber Advanced Threat Description Feed
Airbus CyberSecurity offers a a visibility platform that shows the latest cyber-attacks and results of analysis carried out by our CTI team on more than 130 APT groups. The aim of this intelligence is ultimately to provide a link between technical indicators and context elements (TTP, motivations etc.). The information from the feed is depicted in a standard format that makes it easily digestible. This information is also utilised by your SOC / CERT / CSIRT / CTI analysts.
Rules and Signatures Detection
Delivered in a standard/easily digestible format that facilitates integration into current market security products (agnostic). Our rules and signatures feeds also contain the technical elements needed to detect network, system and log-level threats.
Marker qualification and provided context-elements allow efficient detection and a rapid reaction to APT threats.