Network-Battle Field: Cyber Attackers and Defenders
June 25, 2022

Network-Battle Field: Cyber Attackers and Defenders

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with CyberBattleSim

Microsoft Cyber BattleSim or Simulation provides us to investigate the interactions of automated agents in an abstract, Stimulated network environment as it provides a high-level abstraction of cyber security concepts and computer networks. It is basically a simulated environment to check the strength of our network and is Python Based open AI.
  • Python Based open AI.
  • Uses reinforcement Algorithms for Training Purpose to Agents.
  • Simulation environment sets different for Attacker and Defender.
  • Needs to create various nodes on the network and have to indicate that services are running, it might be good if automated.
  • I think everything is perfect, teaches us a lot.
  • Environment consists of Network of computer nodes.
  • Researchers indicate the services are running, vulnerabilities, and how the device is protected.
  • Nice Implication for learning.
  • Open source application so no Investment is applicable.
  • Helps to understand and analyse the networks security for the device.
  • Trigger alerts in XDr or SIEM systems.
As compared to the battles with AttackIQ both applications are stable and stimulate the work given, However, while using the attackIQ the architect can automate the testing process and engineering team and fill the gaps. And it offers robust security through continuous, automated security control validation.

Do you think CyberBattleSim delivers good value for the price?

Yes

Are you happy with CyberBattleSim's feature set?

Yes

Did CyberBattleSim live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of CyberBattleSim go as expected?

Yes

Would you buy CyberBattleSim again?

Yes

Cyberbattle SIm is actually a simulation application with the implementation of Python Based open AI to implement automated cyber agents and to deploy them on stimulating environments and networks with vulnerabilities and attack vectors to analyze and implement the learnings.