Overview
CastleClone is an on-demand, secure software-as-a-service cyber platform that enables cyber security missions with capabilities for creating “digital twins”, performing adversary emulation, forensics, penetration tests, skill-based assessments, and testing AI agents. Leidos collaborated with AWS to ensure that CastleClone was risk-free for our customers. Each environment is sandboxed from the internet, with no way to communicate out. Additionally, with a focus on ease of use, we made CastleClone completely interactive from the browser. Customers can deploy and interact with entire networks all from their browser and don’t need a powerful computer. Inside of these environments a variety of cybersecurity roles can be performed. Some examples include:
- Security operations center analysts can deploy a detection lab to see how well their latest defensive signatures do against specific MITRE ATT&CK technique IDs.
- Malware analysts can perform static and dynamic malware analysis in a risk-free environment. Red and blue teams can do team exercises.
- Penetration testers can practice against target virtual machines. Exploit developers can create new exploits and test them.
- Machine learning engineers and data scientists can create custom cyber datasets to train new models on by collecting all the network traffic and host data from attack simulations.
CastleClone helps provide organizations with cyber confidence.
CastleClone's capabilities include:
- Creation of “Digital Twins” - Import your workstations, servers, network configurations and deploy your organizations digital twin. This enables threat emulation, threat analysis and helps to ensure an organization is cyber ready.
- Emulation of Adversary threats - Simulate cyber-attacks mapped to the MITRE ATT&CK Framework. DNC hack to see how well your security posture holds up.
- Analyze Threats - Using the threat emulation capabilities of CastleClone, analysts can use the data captured from the simulation that they uploaded to their bucket to create custom detections, signatures, queries, YARA rules, and additional analytics that are then passed to incident responders.
- Evaluate Products - Evaluate new products, infrastructure, and applications in a risk-free environment to ensure risk compliance. secure vulnerability analysis.
- Build Cyber Datasets - Export captured network or host-based data to form your own custom datasets so that your organizations data scientists and machine learning engineers can create tailored analytics and detections.
- Perform Team Assessments - Train your analysts, operators, and engineers in your organizations digital twin in a risk-free environment, where they are free to make mistakes and learn.
Sold by | Leidos |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
Leidos is an end-to-end solutions provider with a relentless focus on helping customers adapt to the cloud. With CastleClone our team will work with you to determine your needs and create a custom plan tailored to you. Other products in the cyber market can also do advanced simulations, and cyber training / evaluations, but they do not create digital twin environments. We continuously optimize the platform with the latest technology and cost savings, so you can achieve your objectives at the lowest possible price and the best experience. To learn how Leidos’ CastleClone solution can provide you with an on-demand, scalable, and secure “digital twin” of your computing environment enabling cost-effective threat injection, data collection, testing of threat mitigations, and training without endangering your production environments contact us today to speak with one of our CastleClone experts.
CastleClone leverages the following AWS services to function:
- AWS CDK
- AWS Lambda
- AWS EKS
- AWS ECR
- AWS API Gateway
- AWS DynamoDB
- AWS S3
- AWS EC2
- AWS Fargate
- AWS Cognito
- AWS Route 53
- AWS Step Functions
Email: LeidosCloud@Leidos.com Website: https://www.leidos.com/capabilities/cyber#cyber-resiliency