Request a demo

SimSpace Resource Center

Battle-ready solutions for continuous security improvement

Analyst Reports

ESG Whitepaper: The Case for Cyber Force Platforms

This paper explores how cyber force platforms are becoming a foundational requirement for enterprise security programs.

READ MORE

Calculators

Case Studies

Case Study: Naval Postgraduate School

The Naval Postgraduate School boosts allies’ cyber readiness with the SimSpace Cyber Force Platform’s high fidelity IT/OT simulation.

READ MORE

Case Study: Xtreme Solutions, Inc

Xtreme Solutions, Inc. expanded its IT offering by deploying a SimSpace cyber range that provides superior flexibility, capacity, and access.

READ MORE

Data Sheets

(ISC)2 Continuing Professional Education (CPE) Handbook

Policies and procedures for actively maintaining your (ISC)2 membership.

READ MORE

Company Overview

Evaluate security products and prepare individuals and teams to defend against advanced cyber threats.

READ MORE

Critical Infrastructure Datasheet

Keep critical systems and networks online by training security teams on a military-grade cyber range that replicates your entire production environment.

READ MORE

Infographics

5 Critical Cyber Range Exercises

What types of threats can be simulated in a cyber range? Here are 5 examples.

READ MORE

5 Ways to Drive Growth Through the SimSpace Partner Program

Improve your cybersecurity offering and win more customers with the SimSpace Partner Program.

READ MORE

5 Ways to Improve your Security Offers

Help your customers prepare for cyberattacks through hands-on training and technology optimization within a realistic simulated environment.

READ MORE

Training Content Catalogs

[PDF] SimSpace Attack Catalog

Find attack content on tradecraft, methodologies, technologies, vulnerabilities, and exploits in this PDF version of our catalog.

READ MORE

[PDF] SimSpace Training Catalog

View our extensive training catalog with on-demand learning experiences and available hands-on content covering specific topics and roles in this PDF version of our catalog.

READ MORE

SimSpace Attack Catalog

Find attack content on tradecraft, methodologies, technologies, vulnerabilities, and exploits

READ MORE

Videos

9 Cyber Range Use Cases

The video explores the basics of a cyber range and the top use cases.

WATCH VIDEO

How to Conduct a Red vs. Blue Cyber Event

Learn the five elements of an effective Red vs. Blue event from the experts at SimSpace.

WATCH VIDEO

Introduction to User Emulation

Learn how user emulation mimics day to day activities and helps create a high-fidelity cyber range.

WATCH VIDEO

White Papers

Cybersecurity Transparency and the New SEC Regulation

This paper explores the implications of the Cybersecurity Incident Reporting for Critical Infrastructures Act of 2022 and how to use transparency as a differentiator.

READ MORE

Four Reasons to Use a Cyber Range

You've invested in the tools and personnel to get the job done - how do you know what's working?

READ MORE

Improving Realism in Cyber Ranges with User Emulation

Facilitate realistic security team training and product evaluations using user emulation.

READ MORE

Webinars

2022 Cyber Readiness Plan

Join Shaun Walsh from Simspace as he discusses cybersecurity and how organizations can be more prepared in 2022.

WATCH VIDEO

Building Confidence in Every Layer of Your Security Stack

David Berlinger from SimSpace is featured, and talks about using cyber ranges to evaluate and improve each layer of your security stack.

WATCH VIDEO

Cyber Range Overview

This webinar features Kent Wilson of Simspace presenting on a complete list cyber range capabilities.

WATCH VIDEO

Defend Confidently Against Log4J

SimSpace experts detail the inner workings of and defenses against Log4J vulnerabilities and log4shell exploits from both an offensive and defensive position (CVE-2021-44228 and CVE-2021-45046).

WATCH VIDEO

Defend With Confidence Against PWNKIT

Matt Kiely and Alex Jones from SimSpace review what you can do to protect your organization from the PWNKIT vulnerability

WATCH VIDEO

ESG Panel: Your Approach to Security Operations Must Evolve

ESG Panel discussion about key challenges, emerging concepts, and opportunities happening across the cybersecurity landscape.

READ MORE