{"id":5948,"date":"2014-06-26T05:00:48","date_gmt":"2014-06-26T12:00:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5948"},"modified":"2014-06-25T14:46:21","modified_gmt":"2014-06-25T21:46:21","slug":"palo-alto-networks-ixia-complete-first-cyber-range-exercise-singapore","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/palo-alto-networks-ixia-complete-first-cyber-range-exercise-singapore\/","title":{"rendered":"Palo Alto Networks and Ixia Complete First Cyber Range Exercise in Singapore"},"content":{"rendered":"<p>In collaboration with Singapore\u2019s Infocomm Development Authority (IDA) Labs, Palo Alto Networks and partner Ixia earlier this month conducted the first Cyber Range exercise to train IDA Technical Services Professional Services Group officers at the IDA Labs National Design Center.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:133.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5950 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image6-500x666.jpeg\" alt=\"image6\" width=\"500\" height=\"666\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image6-500x666.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image6-230x306.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image6-225x300.jpeg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image6-30x40.jpeg 30w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image6.jpeg 1224w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>The purpose of the Cyber Range exercise is to train global cyber security professionals to improve the resiliency of vital government infrastructure and strengthen their defensive skills against cyber threats.<\/p>\n<p>The Cyber Range exercise recreates the behavior of millions of users using actual applications, live cyber attacks and malformed traffic. These real-world scenarios run by the Palo Alto Networks and Ixia teams covered the following:<!--more--><\/p>\n<p><strong>Blue team:<\/strong><\/p>\n<p>Managed network infrastructure using Palo Alto Networks solutions for next-generation firewall, Advanced Persistent Threat, application identification, intrusion prevent system (IPS), anti-virus, anti-malware and anti-spyware.<\/p>\n<p><strong>Green team:<\/strong><\/p>\n<p>Employed the Ixia BreakingPoint solutions to simulate legitimate user communications, using more than 180 applications and accessing the same number of simulated application servers hosted on the network infrastructure managed by the Blue team.<\/p>\n<p><strong>Red team:<\/strong><\/p>\n<p>Used the Ixia BreakingPoint solutions to simulate malicious users sending malicious traffic to the network infrastructure, incorporating more than 5,000 network attacks and more than 28,000 pieces of live malware.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5949 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image5-500x375.jpeg\" alt=\"image5\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image5-500x375.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image5-230x172.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image5-400x300.jpeg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image5-53x40.jpeg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image5.jpeg 1632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Bringing together all three elements of this exercise allowed participants to identify current infrastructure vulnerabilities, optimize performance and security and ultimately train personnel to react correctly while under attack in order to keep business applications running. These training exercises are hugely important and we look forward to many more.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5951 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-500x375.jpeg\" alt=\"image7\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-500x375.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-230x172.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-400x300.jpeg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7-53x40.jpeg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/image7.jpeg 1632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<h3>For more on recent Palo Alto Networks activities in Asia Pacific<\/h3>\n<ul>\n<li><a style=\"color: #70901b;\" href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/03\/palo-alto-networks-kicks-next-phase-growth-apac-region\/\" target=\"_blank\">Read Sharat Sinha\u2019s highlights from our March launch in Singapore<\/a><\/li>\n<li><a style=\"color: #70901b;\" href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/breakthrough-training-soc-professionals\/\" target=\"_blank\">Read about Pamela Warren\u2019s recent trip to Singapore\u2019s ST Electronics DigiSAFE Cyber Security Centre<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/signs-fast-growth-asia-pacific\/\" target=\"_blank\">Read an interview with Jonathan Tan about the growth of business and cybersecurity needs in Indonesia<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In collaboration with Singapore\u2019s Infocomm Development Authority (IDA) Labs, Palo Alto Networks and partner Ixia earlier this month conducted the first Cyber Range exercise to train IDA Technical Services Professional Services Group &hellip;<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,484,108],"tags":[537,536,535,534,379],"coauthors":[],"class_list":["post-5948","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-government","category-threat-prevention-2","tag-breakingpoint","tag-cyber-range","tag-infocomm-development-authority","tag-ixia","tag-singapore"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5948"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5948\/revisions"}],"predecessor-version":[{"id":5957,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5948\/revisions\/5957"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5948"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}