Skip to main content

Threat Simulator

logo keysight

“Continuous breach and attack simulation to validate and improve your security posture.”

 What is Threat Simulator?

Threat Simulator is Keysight’s Breach and Attack Simulation (BAS) platform.
It continuously emulates the latest cyberattacks, malware, and adversary behaviors to help organizations validate the effectiveness of their security tools, processes, and teams — 24/7, in production environments, without disruption.

By running safe, automated attack campaigns, Threat Simulator provides security teams with a continuous assessment of their real defensive posture, highlighting misconfigurations, gaps, and blind spots before attackers can exploit them.


Key Features

  • Continuous Breach & Attack Simulation
    • Safe emulation of tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK.
    • Covers endpoints, networks, cloud workloads, and email/phishing vectors.
  • Always Updated Attack Library
    • Backed by Threat Intelligence from Keysight Application and Threat Intelligence (ATI) Research Center.
    • New malware, exploits, and evasion techniques added regularly.
  • End-to-End Security Validation
    • Test firewalls, IPS, proxies, email security, endpoint protection (EDR/XDR), SIEM/SOC workflows.
    • Validate how controls behave against both known and emerging threats.
  • Actionable Remediation Guidance
    • Detailed reporting highlights misconfigurations, coverage gaps, and false negatives.
    • Provides clear recommendations to strengthen defenses.
  • Cloud-Native Delivery
    • SaaS-based platform with agent deployment across hybrid and multi-cloud environments.
    • Easy integration with existing SOC and SIEM tools.

Benefits for the Client

  • Proactive defense: identify and fix weaknesses before adversaries exploit them.
  • Reduce dwell time: validate detection and response across the full kill chain.
  • Optimize security tools: ensure EDR, SIEM, IDS/IPS are configured and tuned correctly.
  • Continuous assurance: unlike one-off pen tests, Threat Simulator runs all year round, not just annual snapshots
  • Compliance support: evidence for audits and regulatory frameworks.
  • Strengthens regulatory alignment with DORA’s security testing obligations.
  • Reduces cost and complexity by industrializing security validation.
  • Delivers auditable evidence for regulators and boards.
  • Improves overall cybersecurity maturity and governance posture.

Support for DORA Compliance

The Digital Operational Resilience Act (DORA) applies to financial entities in the EU (banks, insurers, asset managers, and critical IT providers).
It emphasizes:

  • Operational resilience of digital systems
  • Detection, prevention, and resistance to cyber threats
  • Regular and advanced testing of security and resilience

This platforms (e.g., Keysight Threat Simulator) bring tangible value to DORA programs:

  • Continuous Testing
    • Unlike one-off penetration tests, BAS runs 24/7 simulations of real-world attacks.
    • Matches DORA’s requirement for recurring and consistent testing.
  • Realistic Threat Simulation
    • Emulates tactics, techniques, and procedures (TTPs) based on MITRE ATT&CK.
    • Validates detection, prevention, and incident response across the entire kill chain.
  • Validation of Security Controls
    • Assesses the effectiveness of firewalls, SIEM, IDS/IPS, EDR/XDR, and SOC processes.
    • Detects misconfigurations, blind spots, and false negatives.
  • Audit-Ready Reporting
    • Produces clear, repeatable evidence of resilience testing.
    • Supports compliance reporting and strengthens governance frameworks.
  • Support for TLPT (Threat-Led Penetration Testing)
    • DORA mandates advanced testing aligned with TIBER-EU for critical entities.
    • Threat Simulator acts as a complementary, automated layer that prepares, enriches, and extends TLPT exercises.

Threat Simulator as BAS tools is not a replacement for formal TLPT/TIBER-EU exercises, but it is a powerful enabler. It allow financial institutions to move from point-in-time compliance to continuous resilience assurance, fully aligned with DORA’s intent.

Why Threat Simulator is Different ?

  • Continuous BAS vs. point-in-time penetration testing.
  • Safe for production: realistic attack simulation without risk of outage.
  • MITRE ATT&CK-based: aligned to the industry’s de facto adversary model.
  • Global threat intelligence: powered by Keysight’s ATI Research Center.
  • SaaS delivery: scalable, always up to date, quick to deploy.

Typical Use Cases

  • Validate if EDR/XDR solutions detect current malware campaigns.
  • Test email security against phishing and BEC (Business Email Compromise).
  • Check if firewalls, IPS, and proxies block modern exploits.
  • Run continuous red team exercises without needing internal red teams.
  • Provide audit-ready reports for compliance frameworks (ISO, NIST, PCI DSS).

 Services & Support (What We Offer)

  • BAS Readiness Assessment – define scope and deployment of Threat Simulator.
  • Integration Services – connect with SIEM, SOAR, and SOC processes.
  • Continuous Security Validation – as-a-service validation campaigns.
  • Workshops – MITRE ATT&CK simulation training for SOC analysts.

 


Address
  • Simac BMS BE
    HQ Industrieweg 8
    B-3001 Heverlee Belgium
  • Simac BMS BE
    Bosstraat 54
    3560 Lummen Belgium
  • WAVETEL IDF Porte de Versailles 374, rue de Vaugirard
    F-75015 Paris
  • WAVETEL (HQ)
    Espace du Ter
    13, Bd Jean Monnet
    F-56260 Larmor-Plage
Follow-us
Address
  • Simac BMS GmbH
    Riehler Str. 33
    50668 Köln
  • Simac BMS NL
    De Run 1101
    5503 LB Veldhoven
  • WAVETEL OUEST
    Parc de La Conterie
    18, rue Léo Lagrange F-35131 Chartres de Bretagne
  • WAVETEL TRÉGOR
    Espace Ampère
    4, rue Ampère
    F-22300 Lannion
En construction
mail

Ce site est en cours de développement. Pour vous assurer de bien voir les dernières modifications, pensez à recharger la page sans cache (sur PC utilisez la combinaison de touches CTRL + F5) ou à vider les fichiers en cache de votre navigateur.