Agricultural Factory & Plant Red vs. Blue Scenario
DCS, ICS, manufacturing, SCADA, scenario, ThreatGEN® Red vs. Blue
|The Plant Factory & Store is a sprawling, digitally integrated manufacturing environment (one of the largest in ThreatGEN® Red vs. Blue version 1.x). It leverages advanced Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS), to automate production and manage logistics. The network map reveals a complex web of interconnected OT (Operational Technology) and IT assets, spanning from field devices and PLCs to business systems and remote access point.
Car Manufacturing Facility Red vs. Blue Scenario
industrial cybersecurity, scenario, ThreatGEN® Red vs. Blue
|A major American automotive manufacturing facility (“The Plant”) that produces vehicles for the domestic and international markets has detected unusual network activity within its industrial control systems. The Plant is renowned for its advanced robotics, just-in-time production systems, and innovative electric vehicle development, contributing significantly to American manufacturing leadership.
Active Directory and other nodes in ThreatGEN® Red vs. Blue
Active Directory, network environments, scenario, ThreatGEN® Red vs. Blue
|ThreatGEN® Red vs. Blue capabilities associated with specific network node types, such as Active Directory nodes. Limitations and specific examples are included in this often asked FAQ.
Red vs. Blue Environments Available
network environments, scenario, ThreatGEN® Red vs. Blue
|This FAQ details the different ThreatGENâ„¢ Red vs. Blue network environments and scenarios that are available.
Research Laboratory Red vs. Blue Scenario
biomedical, laboratory, research, scenario, ThreatGEN® Red vs. Blue
|A leading biomedical research institution (“The Institute”) dedicated to advancing human health through genomic research and animal models has detected unusual network activity. The Institute is renowned for its work in genetics, cancer research, and immunology, contributing significantly to global medical advancements.
Differentiators between the Steam and Professional version?
game edition, professional version, steam, versions
|These are the key differentiators between the STEAM, game edition, and Professional versions of ThreatGEN® Red vs. Blue.
IT Management Software Development Company, Red vs. Blue Scenario
scenario, solarwinds, ThreatGEN® Red vs. Blue
|Inspired by the SolarWinds incident, our team has decided to build an amazing IT Management Software Development Company environment.
Call Center Red vs. Blue Scenario
call center, scenario, ThreatGEN® Red vs. Blue
|The “Call Center” ThreatGEN® Red vs. Blue scenario demonstrates a bustling call center environment, wherein customer service is paramount, and data security is critical.
Blue Team – Recovering from Ransomware
blue team, ransomware, ThreatGEN® Red vs. Blue
|Within the Blue Team game play, how do I remove ransomware if it is already present and active? More importantly, how do I prevent it from being installed in the first place?
Red Team – attack detection evasion
cover tracks, evade network detection, game mechanics, prepare covert attack, red team, ThreatGEN® Red vs. Blue
|From the Red Team’s perspective, does the “Attack Detection Evasion” actually work? Walk through how this action to evade the Blue Team’s IDS sensors and EDR works for the Red Team.