SYS-CON MEDIA Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, William Schmarzo, Dana Gardner

News Feed Item

Cyberbit Technology Powers New Cyber Range for A1 Telekom Austria

New security training center will train cybersecurity professionals to secure government, commercial and critical infrastructure from cyber threats

RA'ANANA, Israel, April 17, 2018 /PRNewswire/ --

A1, Austria's largest telco, and Cyberbit Ltd., a world leading provider of cybersecurity simulation and IT/OT detection and response platforms, announced today the opening of A1 Cyber Range, a new cybersecurity training center powered by Cyberbit Range technology in Wiener Neustadt, Austria. A1 CEO and CTO Marcus Grausam and CFO Sonja Wallner attended the opening ceremony along with State Secretary Karoline Edtstadler and Mayor of Wr. Neustadt, Klaus Schneeberger, on behalf of provincial governor Johanna Mikl-Leitner and other distinguished guests.

In its recently published 5 year national plan, the Austrian government identified the cybersecurity skill gap as a problem that must be addressed by developing a highly-skilled workforce. The new A1 Cyber Range training center will deliver hyper-realistic training to all levels of cybersecurity professionals, from certifying entry level SOC analysts to advanced training of experienced SOC managers and company executives.

"With its new A1 Cyber Range security training center in Wiener Neustadt, A1 now offers the opportunity to identify threats early on, to test protective and defensive mechanisms and to train proficiency in defending against cybercrime attacks. This ensures that IT specialists will be even better prepared for the future and companies or institutions with a well-developed IT infrastructure will be protected from online attacks. Professional training, simulating and repelling such threat-scenarios is vitally important for businesses and the operators of critical infrastructure so they can increase their overall level of security," Marcus Grausam, A1 CEO and CTO describes the operational scope of the A1 Cyber Range.

"We are proud to join forces with Austria's leading telecom and cybersecurity provider to be a part of building up the nation's cybersecurity workforce,' said Cyberbit CEO Adi Dar. "Our team worked closely with A1 to deploy the project in just three months. We are dedicated to continually bringing the most advanced security technologies to defend against growing cyber threats in the DACH region."

The Cyberbit Range technology can simulate a wide range of network environments and attack scenarios, enabling the training center to deliver customized training for security personnel in any sector; commercial, government and industrial operational technology (OT) networks used to run manufacturing plants and critical infrastructure such as energy, water and transportation.

As the most widely deployed cybersecurity training and simulation platform for higher education, service providers, governments and enterprises, Cyberbit Range has already been selected by cyber training facilities in the US, Europe, Asia and Australia, with new training centers continuously launched around the globe.

Additional resources  

About Cyberbit 

Cyberbit provides a consolidated detection and response platform that protects an organization's entire attack surface across IT, OT and IoT networks. Cyberbit products have been forged in the toughest environments on the globe and include: endpoint detection and response powered by behavioral analysis, security automation, orchestration and response (SOAR), ICS/SCADA security (OT security), and the world's leading cyber range for simulated cyber training.

Since founded in mid-2015 Cyberbit's products were rapidly adopted by enterprises, governments, academic institutions and MSSPs around the world. Cyberbit is a subsidiary of Elbit Systems (NASDAQ: ESLT) and has offices in Israel, the US, Europe, and Asia.

Follow Cyberbit on Xing, Facebook, LinkedIn and Twitter (@CYBERBITHQ).

Cyberbit Contacts: 
Sharon Rosenman, VP Marketing
Cyberbit
[email protected]

Dana Tal-Noyman
Manager Corporate Communications & Digital, Elbit Systems
Tel: 972-77-298809  
Cell: 972-54-9998809
[email protected]

SOURCE Cyberbit Ltd.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
The current environment of Continuous Disruption requires companies to transform how they work and how they engineer their products. Transformations are notoriously hard to execute, yet many companies have succeeded. What can we learn from them? Can we produce a blueprint for a transformation? This presentation will cover several distinct approaches that companies take to achieve transformation. Each approach utilizes different levers and comes with its own advantages, tradeoffs, costs, risks, a...
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, int...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.