ThreatSpace

Practice responding to real-world threats — without real-world consequences

ThreatSpace is a technology-enabled service that allows you to assess and develop — in a consequence-free environment — your security team’s technical capabilities, processes and procedures to respond to real-world threats.

Datasheet

ThreatSpace Datasheet

Assess and improve your ability to respond to real-world threats

Virtualized environment

Virtualized environment

This environment helps teams assess their technical and investigative skills against real-world threats in simulated attack scenarios.

  • Virtual space simulates complete IT infrastructure
  • Environment is risk and consequence free
Scenarios from the front lines

Scenarios from the front lines

ThreatSpace scenarios are based on Mandiant’s extensive incident response experience responding to thousands of breaches.

  • Scenarios feature the latest adversary tactics, techniques and procedures (TTPs)
  • Mandiant incident response experts provide real-time coaching
Technology-agnostic approach

Technology-agnostic approach

Experts work with your existing systems and practices to test your team’s ability to identify and prioritize systems and forensic artifacts for analysis.

  • Target affected systems, networks, user accounts, and applications
  • Address malicious software, exploited vulnerabilities and accessed or stolen information

Assess and improve your ability to respond to real-world threats

Identify areas for team improvement

Identify areas for team improvement

Investigate real-world incidents to identify gaps in training, processes, procedures and communication plans.

Learn from incident response experts

Learn from incident response experts

Work closely with experienced Mandiant incident responders with years of intelligence-led expertise.

Investigate critical security incidents

Investigate critical security incidents

Familiarize your response and intelligence teams with the latest attack scenarios and attacker TTPs.

Get experience with different scenarios

Get experience with different scenarios

Evaluate and improve the abilities of your incident response and intelligence teams as they respond to various attack scenarios and actors.

Research and analyze identified threats

Research and analyze identified threats

Learn to research attacker TTPs and identify IOCs from host- and network-based artifacts.

Simulate all phases of the attack lifecycle

ThreatSpace scenarios cover all phases of the targeted attack lifecycle.

threatspace-attack-lifecycle

Assess and improve your ability to respond to real-world threats

Remote preparation

Remote preparation

  • Identify scenarios
  • Review goals, expectations and logistics
  • Discuss incident response processes and procedures
Onsite scenarios

Onsite scenarios

  • Half-day training and range familiarization
  • Two days of hands-on investigation
  • Debriefs to review team strengths and gaps
Deliverables

Deliverables

  • Post-engagement report
  • List of observed incident response strengths
  • Recommendations for enhancements

Related services

related-education

 

Education Services

Train your cyber security team to secure and defend the enterprise.

related-tabletop-exercise

 

Tabletop Exercise

Test your organization’s cyber incident response plan with scenario gameplay.

related-red-team

 

Red Team Operations

Test how well your people, processes and technology protect your most critical assets.

Ready to get started?

Our security experts are standing by to help you with an incident or answer questions about consulting services.

+1 888-227-2721 +61 281034308 +1 866-962-6342 +358 942451151 +33 170612726 +49 35185034500 +852 3975-1882 +91 80 6671 1241 +39 0294750535 +81 345888169 +03 77248276 +52 5585268207 +64 32880234 +48 223072296 +7 4954658084 +65 31585101 +27 105008408 +82 7076860238 +34 932203202 +94 788155851 +886 2-5551-1268 +27873392 +44 2036087538 +842444581914