English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    Security Compliance

    Turn policies into protection

    Vulnerability Management

    Stop being an easy target

    Utilities

    Industrial-grade cybersecurity

    Financial Services

    Can your security keep up with you?

    ERP Security

    Take control of your ERP security

    View all →
  • Products
    MaxPatrol

    Vulnerability and compliance management system.

    PT Application Inspector

    Source code analysis tool.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    PT MultiScanner

    Multilayered protection against malware attacks.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    XSpider

    Vulnerability scanner.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Network Attack Discovery

    NTA system to detect attacks on the perimeter and inside the network.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Penetration Testing

    A Comprehensive Approach

    ATM Security Assessments

    Uncover Your Weaknesses

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Forensic Investigation Services

    Prevent Future Incidents

    Web Application Security Services

    Black Box and White Box Analysis

    SSDL Implementation

    Secure Application Development at Your Organization

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    Research Blog
    View all →
  • Partners
    Authorized Partners
    Distributors
    Technology Partners
    View all →
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • About
  • Events
  • The Standoff recap

The Standoff recap

Held on December, 15 11:00 GMT
Online

The Standoff is a cyber-range platform for creating the truly secure IT infrastructure of the future. This year at The Standoff, 29 offensive and 6 defensive teams battled each other non-stop in a mock digital city for 123 hours from November 12 to November 17.

During the battle, professional hackers successfully breached the perimeter of all six companies and gained persistence on corporate networks. Systems were taken offline at the airport, amusement park, chemical plant, and oil company. The business center and bank were hit as well.

On December 15, our SOC experts will reconstruct the kill chain of several successful attacks to show just how hackers found their way in. As a bonus, we will show how to detect such network activity using Positive Technologies monitoring tools. 

Other events

  • Will be held on February, 26 10:30 GMT+1 Positive Partner’s Day Italy 2021
  • Held on October 23, 2018 Regional Cybersecurity Summit
  • Held on September 13, 2018 Positive Guide to a Successful Signaling Protection Strategy
Share:
Link copied
All events
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
  • Research Blog
Partners
  • Authorized Partners
  • Distributors
  • Technology Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002-2021 Positive Technologies
Find us:
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002-2021 Positive Technologies
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap