* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/category/cybersecurity-2/) * Palo Alto Networks at Pac... # Palo Alto Networks at Pacific Endeavor 2014: Training Next-generation Cyber Defenders for HADR Networks [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2014%2F09%2Fpalo-alto-networks-pacific-endeavor-2014-kathmandu-training-next-generation-cyber-defenders-hadr-networks%2F) [](https://twitter.com/share?text=Palo+Alto+Networks+at+Pacific+Endeavor+2014%3A+Training+Next-generation+Cyber+Defenders+for+HADR+Networks&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2014%2F09%2Fpalo-alto-networks-pacific-endeavor-2014-kathmandu-training-next-generation-cyber-defenders-hadr-networks%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2014%2F09%2Fpalo-alto-networks-pacific-endeavor-2014-kathmandu-training-next-generation-cyber-defenders-hadr-networks%2F&title=Palo+Alto+Networks+at+Pacific+Endeavor+2014%3A+Training+Next-generation+Cyber+Defenders+for+HADR+Networks&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2014/09/palo-alto-networks-pacific-endeavor-2014-kathmandu-training-next-generation-cyber-defenders-hadr-networks/&ts=markdown) \[\](mailto:?subject=Palo Alto Networks at Pacific Endeavor 2014: Training Next-generation Cyber Defenders for HADR Networks) Link copied By [Aylwin Lam](https://www.paloaltonetworks.com/blog/author/aylwin-lam/?ts=markdown "Posts by Aylwin Lam") Sep 07, 2014 4 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown) [APAC](https://www.paloaltonetworks.com/blog/tag/apac/?ts=markdown) [HADR](https://www.paloaltonetworks.com/blog/tag/hadr/?ts=markdown) [Kathmandu](https://www.paloaltonetworks.com/blog/tag/kathmandu/?ts=markdown) [Pacific Endeavor](https://www.paloaltonetworks.com/blog/tag/pacific-endeavor/?ts=markdown) [PE14](https://www.paloaltonetworks.com/blog/tag/pe14/?ts=markdown) ![pacific end](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/09/pacific-end.jpg) Palo Alto Networks recently participated in U.S Pacific Command co-hosted event Pacific Endeavor 2014, an annual multinational, multiservice workshop in which independent countries learn how to support disaster relief operations by using a broad range of technologies to coordinate inter-country communications. Critical communication systems such as satellite, video, radio, telephone, and other technologies are included. Pacific Endeavor 2014 was split into smaller sub-workshops where each focused on specific communications criteria to ensure preparatory measures are in place in the event of a major natural disaster. Cyber Endeavor is one of these sub-workshops, and focuses on developing core competencies and discusses in depth how to provide confidentiality, integrity and availability to communications. Palo Alto Networks and partner Cyber Test Systems conducted an interactive Cyber test range Exercise for Participants of Cyber Endeavor. The purpose of the Cyber test range exercise is to let participants learn how to build, deploy and use a Cyber Test Range to train a team replicating a real environment in test lab environment. This team trains to defend against cyber attack scenarios such as infection by virus, trojans, worms, spyware, adware, malware, DOS attacks, DDOS attacks and also network attacks using combination of well-known vulnerabilities, zero day vulnerabilities or unknown vulnerabilities that would qualify as Advanced Persistent Threats (APTs). These real-world scenarios run by the Palo Alto Networks and Cyber Test Systems teams covered the following: ![endev 1](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/09/endev-1-500x281.jpg) ### Blue Team Simulated by 18 participants using Palo Alto Networks security platforms that managed the availability, the scalability, the security and the stability of network infrastructure and application infrastructure for the Green Team and protected it from the cyber attacks simulated by the Red Team. ### Green Team Simulated by Cyber Test Systems using a network traffic generator simulating the legitimate users accessing to a large diversity of applications using wire or wireless connections with their desktops, laptops, tablets, smartphones to the application infrastructure hosted on the network infrastructure managed by Blue Team. ### Red Team Simulated by Cyber Test Systems using a network traffic generator simulating the malicious users sending advance cyber attacks to the user's computers using different vectors of infection to install viruses, trojans, worms, spyware, adware and malware. The Red Team also sends cyber attacks to the network infrastructure and the application infrastructure to bring it down using DOS attacks or DDOS attacks, or leak information, or use the network or servers as relay to launch other cyber attacks using network attacks using combination of well-known vulnerabilities or zero day vulnerabilities or unknown vulnerabilities. ### White Team The White Team involved Cyber Test Systems for creating the cyber attacks scenarios running and monitoring the success or failure of the participants simulating the Blue Team to defend properly against the cyber attacks scenarios launched by the Red Team and keep the availability, scalability, security and stability of network infrastructure and application infrastructure for the Green Team. Also in the White Team, Palo Alto Networks ensured the participants were well equipped with the right visibility into network security infrastructure so as to defend against cyber attacks scenarios launched by the Red Team. ![endev 2](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/09/endev-2-500x276.jpg) The Cyber test range exercise was conducted over two days where participants built network security infrastructure using routers, switches, wireless access points, and next-generation security platforms from Palo Alto Networks to provide Intrusion Prevention Systems (IPS), Anti-Virus, Anti-Spyware, URL Filtering as well as Anti-DDoS and Advance Persistence Threat Prevention in accordance with the Cyber test range Lab Setup. After the setup, participants learned how to defend against more than 50 different cyber attacks simulated by Cyber Test Systems network traffic generators. On every hour of the cyber attack launched, a debrief was conducted to make sure participants were adequately defending the network as well as effectively managing risk. ![endev 3](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/09/endev-3-500x374.jpg) Bringing together all elements of effective risk management for network security, participants identified the need to improve the skills of security professionals using the right technology and processes. It's for those experiences that these Cyber test range exercises are hugely important and we look forward to many more involving Palo Alto Networks and Cyber Test Systems! ![endev 5](https://www.paloaltonetworks.com/blog/wp-content/uploads/2014/09/endev-5-500x374.jpg) *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Operationalizing the Call for a Cybersecurity Moonshot](https://origin-researchcenter.paloaltonetworks.com/blog/2018/04/gov-operationalizing-call-cybersecurity-moonshot/) ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Improving National Security Through Secure AI](https://origin-researchcenter.paloaltonetworks.com/blog/2025/05/improving-national-security-through-secure-ai/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Making Every Dollar Count for Federal Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/2025/03/making-every-dollar-count-federal-cybersecurity/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown) [#### Build Those Cyber Skills: Here's How to Host a Successful Capture the Flag Event](https://origin-researchcenter.paloaltonetworks.com/blog/2018/07/build-cyber-skills-heres-host-successful-capture-flag-event/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Commitment to Educating European CEOs and Boards on Cybersecurity as a Business Issue](https://origin-researchcenter.paloaltonetworks.com/blog/2018/06/gov-palo-alto-networks-commitment-educating-european-ceos-boards-cybersecurity-business-issue/) ### [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Davos 2018: Hot Topics in Cyber Risk](https://origin-researchcenter.paloaltonetworks.com/blog/2018/02/cso-davos-2018-hot-topics-cyber-risk/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language