|
Bet on human resources
|
|
Improve your skill level
|
|
Observe the reactions of your teams
|
|
Prevention exercises
|
|
React against real threats
|
|
Learn the limits of your infrastructure
|
Largest Technology Catalog
Network Traffic Generator | Transparent and Explicit Proxy | Anti-DDoS System |
Application Traffic Generator | Anti-Adwares | Anti-Botnet System |
Penetration Testing Platform | Anti-Virus | Lawful Intercept System |
Incident Response and Malware Analysis | Anti-Malwares | Data Retention System |
TAP and Aggregator | Anti-Spywares | Full Packet Capture System |
Network Packet Brocker | URL Filter | Network Monitoring Platform |
Switch | SMTP Relay | SIEM |
Router | Anti-Spam | Desktop End Point Security |
Next Generation Firewall | WAN Accelerator | Mobile End Point Security |
IPSec VPN Gateway | Anti-Advanced Persistent Threat (APT) | ICS / SCADA Security Solution |
SSN VPN Gateway | NetWork Data Loss Prevention | Desktop / Laptop / Mobile / Tablets |
Web Application Firewall (WAF) | QoS DPI | IoT Devices |
IDS/IPS | Application DPI | ICS / SCADA DEvices |
Cache | Load Balancer | Civilian and Military Drone |
Cyber Test Systems is able to configure and integrate the widest variety of equipment and components into a Cyber Range. Combined with the largest variety of attack vectors generated, technologies are selected based on your needs to protect the infrastructure against a host of malicious scenarios. While competitors will say they have the most important test and scenario database, Cyber Test Systems offers the widest variety of technologies and scenarios to push the exercise to the limit. |
100+
|
How to push your training with us?
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
The Administration Team can supervise the entire network, devices and portals. Administrators are in charge of the global running of the session. | The White Team are the instructor and creates the Cyber Attack Scenarios | The Blue Team generates the IT, NoC, SoC, CIRT, Forensic users | The Red Team generates malicious users sending cyber attacks | The Green Team generates legitimate users and servers | The Yellow Team generates innocent users installing malicious content without knowing | Deals with Legal and Media, handle by partners |
Each role benefits from specific exercise, equipment and dedicated tools to improve the technical skills of all levels participants. |
Tools used per Team | Administration | White Team | Blue Team | Red Team | Green Team | Yellow Team | Purple Team |
Cyber Range Appliances | X | X | X | X | |||
Cyber Range Portal CTS-CRP | X | X | X | X | X | X |
Who use Cyber Test Systems Cyber Range?
Hinterlassen Sie uns eine Nachricht – wir werden Sie schnellstmöglich kontaktieren.