
ThreatSpace
Practice responding to real-world threats — without real-world consequences
ThreatSpace is a technology-enabled service that allows you to assess and develop — in a consequence-free environment — your security team’s technical capabilities, processes and procedures to respond to real-world threats.
Datasheet
ThreatSpace Datasheet
ThreatSpace Features

Identify areas for team improvement
Investigate real-world incidents to identify gaps in training, processes, procedures and communication plans.

Learn from incident response experts
Work closely with experienced Mandiant incident responders with years of intelligence-led expertise.

Investigate critical security incidents
Familiarize your response and intelligence teams with the latest attack scenarios and attacker TTPs.

Get experience with different scenarios
Evaluate and improve the abilities of your incident response and intelligence teams as they respond to various attack scenarios and actors.

Research and analyze identified threats
Learn to research attacker TTPs and identify IOCs from host- and network-based artifacts.
Assess and improve your ability to respond to real-world threats

Virtualized Environment
This environment helps teams assess their technical and investigative skills against real-world threats in simulated attack scenarios.
- Virtual space simulates complete IT infrastructure
- Environment is risk and consequence free

Scenarios From the Frontlines
ThreatSpace scenarios are based on Mandiant’s extensive incident response experience responding to thousands of breaches.
- Scenarios feature the latest adversary tactics, techniques and procedures (TTPs)
- Mandiant incident response experts provide real-time coaching

Technology-Agnostic Approach
Experts work with your existing systems and practices to test your team’s ability to identify and prioritize systems and forensic artifacts for analysis.
- Target affected systems, networks, user accounts, and applications
- Address malicious software, exploited vulnerabilities and accessed or stolen information
Ready to get started?
Our security experts are
standing by to help you with an incident or answer questions about
our
consulting and managed detection and response services.