RAAS
Cyber Range As A Service
A Scalable and Realistic Cyber Security Training Experience in Atlanta, GA & Across the U.S.
SECURITY SIMULATIONS
High-fidelity virtual defense training and simulation environment
Simulation of multiple automatic and repeatable cyber attack scenarios
Simulation of diverse networks from small-medium businesses up to large- scale enterprise /government networks
ATTACK SCENARIOS
Virtualization and emulation of any network device and protocol
Advanced network traffic generator engine
Built in attack scenarios for both IT and OT (SCADA) networks
FULLY SCALABLE
Fully scalable and modular design
Skill assessment analysis and debriefing in AAR stations
Ability to integrate any third party or customer application and hardware
Real-time training on multiple security systems and tools
Conducted in a generic, isolated and secured environment, the Xtreme I.C.E. offers a scalable and realistic training experience where trainees are exposed to various attack scenarios and security breaches to improve their hands-on skills.
The solution enables automated scenarios which can run repeatedly through each training session to promise consistency and continuous improvement. Xtreme I.C.E. can simulate large-scale virtual networks (IT, SCADA, tactical communications, etc.) and attacks based on previous real-world incidents, including SCADA attack scenarios. It can also pinpoint system vulnerabilities and help security professionals develop countermeasures and improved protocols for dealing with cyber attacks on critical network systems – such as communications networks and utility grids.
Xtreme I.C.E. is supported by proprietary architecture and application, advanced software and large-scale COTS hardware. Its semi-automatic (manned and unmanned) environment utilizes live network and traffic simulation to train users in real-time. Easily adapted to the customer’s actual work environment, the Xtreme I.C.E. offers a range of security tools, monitoring systems, security information and event management (SIEM) systems, forensic tools and supporting databases, as well as other network, security and cyber components.