simlight
Think You're Secure? Prove It with SimLight
SimLight by Thawd is an advanced Attack Simulation solution designed to deploy in minutes and continuously validate your security controls by simulating realistic attacker behaviors. SimLight provides comprehensive visibility into your organization's security posture, empowering proactive defense against real-world threats.

Reasons to Choose SimLight
Fast & Easy Deployment
Install and start simulating attacks within minutes — no complex setup required.
Aligned with NCA Standards
Built to meet Saudi Arabia’s cybersecurity regulations, including Sigma rule validation and audit policy checks.
Realistic Attack Simulations
Simulates real-world tactics like credential dumping, lateral movement, and data exfiltration using local threat intel.
Continuous & Automated
Runs 24/7 in the background without disrupting operations, providing ongoing validation of your defenses.
Clear, Actionable Reports
Generates MITRE-aligned reports with practical recommendations for closing security gaps.
Enhances SOC Performance
Helps train and measure your security team’s response to realistic threats in a controlled environment.
Attack Scenarios Covered
SimLight tests multiple cyber-attack techniques, including:
Zero-Day Behavior
Privilege Escalation
Lateral Movement
Credential Dumping
Defense Evasion
Persistence
Data Exfiltration
Command & Control
How SimLight Attack Simulation Works?
Step 1
Choose or Customize a Threat
Select a prebuilt threat scenario from the library or create your own custom threat. Review the attack steps and techniques that will be executed during the simulation.
Step 2
Run the Simulation
Launch the simulation and monitor it in real time as each attack step is executed. Watch the simulation unfold live until completion.
Step 3
Review the Results
Access a detailed simulation report, including attack steps, execution status, and validation results. Use these insights to enhance detection, response capabilities, and your overall security posture.

Example of Usage
NCA Compliance & Audit Policy Validation
National entity used SimLight to validate Sigma rules and Windows audit policies automatically.
Outcomes:
Identified misconfigurations
Align with NCA standards
Validates detection rules easily
SOC Readiness Testing
An enterprise simulated real attacks to test their SOC’s detection and response capabilities.
Outcomes:
Identify and fix critical detection gaps.
Improve SOC readiness against threats.
Maximize value from security controls.
EDR & SIEM Validation in an Organization
SimLight continuously tested EDR and SIEM tools using realistic attack behaviors.
Outcomes:
Identified hidden blind spots
Proved security control effectiveness
Validated threat detection coverage across MITRE ATT&CK
Compliance Achieved



See SimLight In Action
Submit a request and we'll share answers to your top security validation and exposure management questions.
Contact Us
