ThreatGEN
Back to Red vs. Blue

Use cases

Four audiences. One game.

Red vs. Blue isn't a one-audience product. Pick whichever role you're playing — operator, instructor, student, or event organizer — and we've scoped a portal bundle to fit.

Security team running a live tabletop exercise

Businesses & organizations

Run incident response drills your team will actually remember.

Move past slides and spreadsheets. Run live multiplayer tabletop exercises against an adaptive AI opponent. Cover the full incident lifecycle — detection, containment, eradication, recovery — with consequences your team feels in real time. Bring leadership in for a non-technical version. Bring SOC analysts in for the technical one. Run them on the same scenario and watch the gaps surface.

  • Cybersecurity awareness training for non-technical staff
  • Hands-on technical practice for analysts and engineers
  • Strategic + GRC training for CISOs and managers
  • IR plan validation — score your team against your actual playbook
Students collaborating in a cybersecurity training session

Educators & training providers

Cybersecurity curriculum that holds attention for 90 minutes.

Drop Red vs. Blue into a course, a workshop, or a multi-week curriculum. Students retain interactive game-based learning measurably better than lectures and CBT modules — and they actually want to come back next class. Built-in performance analytics let you grade objectively. Aligns with NIST NICE framework, NICCS roles, and most CompTIA / EC-Council certification preparation tracks.

  • Drop-in curriculum module for cybersecurity programs
  • Per-student performance analytics + progress tracking
  • Aligned with NIST NICE / NICCS / certification prep tracks
  • Workshop-friendly — runs as a single session or a full semester
Cybersecurity professional self-studying with Red vs. Blue

Individual students & professionals

Self-directed practice. No command line required.

Whether you're studying for your first cybersecurity certification or you're a working analyst sharpening pattern recognition, Red vs. Blue gives you a practice surface no textbook can match. Play either side. Run as many scenarios as you want. Get realistic exposure to ICS, OT, and IT incident response — without a prior technical background, even on the attacker side.

  • Self-paced — play whenever, as many runs as you want
  • Beginner-friendly — no command-line experience needed
  • Realistic exposure to ICS, OT, and IT scenarios
  • Track your own progress against the metrics dashboard
Cybersecurity tournament with audience watching

Event & workshop organizers

CTF competitions that watchers can actually follow.

Most cybersecurity competitions are unwatchable from the outside — terminals scrolling past, no visual stakes. Red vs. Blue is built for spectators: visible board state, clear consequence per move, replayable for finals. Run a tournament at a security conference. Run a hackathon. Run a corporate team-building event. Run a finals stream that actually generates engagement.

  • Spectator-friendly — visible game state, dramatic stakes
  • Replayable matches for finals broadcasting
  • Plug-and-play tournament structure (brackets, scoring)
  • Used at security conferences, universities, and corporate events

Not sure which fits?

Tell us how you'd use it. We'll pick the bundle.