Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Blue Team
Browse 39 security tools
A super-simple, modern framework for organizing and automating cybersecurity tasks.
R&D firm providing cyber defense & operational tech for DoD and DHS.
Web-based cyber hacking defense training platform with CTF-style exercises.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
Live, simulated cyber attack drills to test org-wide incident response.
Team-based cyber range platform for IR simulation, training & benchmarking.
Cyber range platform for simulating real-world attacks in risk-free environments.
Hands-on blue team training platform for SOC, DFIR, and threat intel roles.
Gamified CTF platform for hosting cybersecurity team assessments and training.
Enterprise platform for cybersecurity team training, labs, and skill gap assessment.
Cyber range platform for purple team training, APT emulation & detection.
Platform for validating security team readiness via threat emulation & purple-team ranges.
Enterprise platform for cybersecurity workforce training via hands-on labs & CTFs.
Enterprise cyber resilience platform with hands-on labs mapped to MITRE & NIST.
Threat hunting platform with free hunt packages and educational resources.
Cyber range platform for hands-on KSA assessments mapped to NIST-NICE.
Cloud-hosted cyber range platform for SOC & IR team live-fire simulation training.
Instructor-led training courses focused on counter-APT tactics and cyber defense.
Hands-on SOC training platform for blue team skill development
SOC analyst skill assessment platform using real-world cyber incident challenges
Mobile app for learning cybersecurity and blue team skills on smartphones
Platform for operational cyber readiness training and exercises
Cooperative incident response card game for tabletop exercises and IR training
Catalog of simulated attack scenarios for cyber defense training and validation
Get strategic cybersecurity insights in your inbox