SecureLink launches Cloud Cybersecurity Simulation training in MENA

Signs distribution agreement with Cloud Range to enable SecureLink partners in providing cybersecurity services directly to customers

SecureLink, Cloud, Security, Cybersecurity

SecureLink has announced a distribution agreement with Cloud Range, a global provider of cyber ranges and simulation-based virtual cyber defence training. Cloud Range provides Security Operations Centre (SOC) Analysts and incident response teams the opportunity to regularly practice detection, response and remediation of cyber-attacks. Regular simulated trainings give SOC’s the ability and confidence to detect and defend against the most advanced malicious cyber-attacks before they occur.

The distribution agreement now allows SecureLink partners the ability to provide next generation cyber security innovative services directly to their customers.

“We are pleased to partner with SecureLink to bring their partners and customers the most advanced solution in cyber security preparedness. Now, companies throughout the Middle East can be more prepared to defend against future cyber-attacks,” says Debbie Gordon, CEO of Cloud Range.

“Until now, traditional cyber security certifications and product training had been the only way for cybersecurity professionals to train. Cloud Range brings the necessary experiential training element, no different than a flight simulator is required to prepare pilots for flying.”

Cloud Range simulates cyber-attacks in a hyper-realistic environment where teams use industry-leading security tools combined with live simulated cyberattacks to ensure they are prepared for potential threats. Utilising Cloud Range's next generation cyber range, companies can now provide SOC operations and incident response teams with customised, hands-on simulation training in a controlled and secure environment.

Simulation training allows security professionals to hone technical skills, problem solving, and critical thinking capabilities. These skills are crucial in various scenarios that are custom-built to reflect attacks that teams have faced or will potentially face in the future. Attack scenarios are regularly updated and added to reflect the latest threat landscape.

Most Popular

Digital Edition

Subscribe today and get your copy of the magazine for free