We devise Innovative solutions to evaluate performance and compliance of network equipments


The word range in the term cyber range is military wording for a typical targeting or kinetic range where you can send troops to hone their fighting skills with a variety of realistic well-planned exercises that may include interactions with guns and ammunition, tanks, war planes, war ships, and so on. In that manner, the war fighter is able to train as they would fight. Similarly, a Cyber Range provides your network and IT technology personnel with a realistic platform for training related to network offense and defense scenarios, mimicking real-world scenarios in the lab so that they too can train as they would fight. Cyber Range training focuses on how to evaluate situations and apply the correct policy/configuration for specific real-life attack situations.

The traditional method has failed. We have seen ongoing rapid cyber-attacks hitting our infrastructure and damage our cyberspace every day. The lack of skills and confidence to operate sophisticated tools, poor networking and security knowledge in critical areas are vulnerabilities to the ever-increasing problem. The situation gets worse when most network and applications are susceptible to the threat too.

Traditional training methods are failing:

  • "On the Job" = "Wait for the next attack and hope we are ready"

  • Vendor training models focused on teaching how to use, not react

  • Certification models (CISSP, CEH, and other vendor based like Cisco, Juniper, etc.) build knowledge base, but once again don't teach how to react.

  • Amateurs practice until they get it right; Professionals practice until they can't get it wrong.

With Cyber Range Lab capabilities, you will enjoy:

  • Architecture, Design Validation

  • Building and Improving Incident Response Playbook (creation/validation)

  • War Game excercises (Blue/Red Teaming, Threat Hunting, Capture The Flag (CTF), Persistant and Coordinated Attacks, Offensive and Defensive

  • Hands-On Training for individual technologies

  • Threat Mitigation Process verification

  • Simulating advanced threats (Zero Day/APT)

  • Research emerging trends and understand "What If scenarios", "Why is it", "How" and anticipate probability and reducing the surface attacks.

For this Cyber Range Lab, there are three (3) major core components which can be used.

  1. Cyber Research Range

  2. Cyber Simulation and Test Range

  3. Cyber Training and Exercise Range