A Learn-by-doing Cyber Range Platform

WE TRAIN AS WE FIGHT

It is essential to train operational staff in a hyper realistic and dedicated environment outside production systems.

Our Learn-by-doing Cyber Range Platform gives you the best answers for a technical and operational preparedness of civilian and military cyber defenders.

Like for top-level sportsmen, preparation needed to be responsive requires a cyber strengthening action plan and simulation exercises with test fights.

A Learn-by-doing Cyber Range Platform

WE TRAIN AS WE FIGHT

It is essential to train operational staff in a hyper realistic and dedicated environment outside production systems.

Our Learn-by-doing Cyber Range Platform gives you the best answers for a technical and operational preparedness of civilian and military cyber defenders.

Like for top-level sportsmen, preparation needed to be responsive requires a cyber strengthening action plan and simulation exercises with test fights.

Cyber Range Multiple Use

Our solutions are designed and developed to meet a wide range of cybersecurity needs:

Learning and training for cyber-defenders and operational auditors.
Our Cyber Range solutions meet the needs of key players such as: Computer Emergency Response Team, Operations Center, Forensics, judicial investigation, Pentesters, computer network defense, SOC, SIEM Operators.

Given the shortage of cybersecurity talents, diateam’s Cyber Range solutions are very good pedagogical assets to help engineering schools and universities offer their students optimal conditions to develop cyber skills and in the long term, offer them real opportunities for sustainable careers.

Cooperation exercises and challenges, competitions and gamification for Blue team and Red team (CTF AKA Capture The Flag “Attack/Defense”, cyber crisis,…)

Experiments & simulations of IT industrial and SCADA infrastructures for analysis, prototyping or research (infrastructure migration, pre-production environments, pre-approval, design and testing of new architectures, etc.)

Cyber security tests and «benchmark» in a fully-mastered and controlled environment (sandboxing, pentest, malware analysis, honeypots, solutions comparisons, realistic scenarios, legitimate and malicious traffic and behaviors simulation, …)

“TurnKey” Platform

  • Mobile & projectable environment

  • «Desktop One Node» integrated solution

  • Compact & standalone bay from two compute nodes

  • Custom «as needed» platform building & integration to your environment

NUMEROUS FEATURES
AND A POWERFUL GRAPHICAL INTERFACE

  • Multi-view, multi-user

  • Multi-architecture/multi-topology

  • Easily accessible catalog

  • Load balancing

  • User-friendly remote screens

  • USB redirection

  • Network capture

  • Linked clones

  • Memory dumps (forensics)

  • Custom network links simulation

    (latency, packet loss and/or

    duplication…)

MAKE YOUR INFORMATION

SYSTEMS LIVELY

  • Platform control API

  • Action Manager

    • Launch actions in VMs
    • Create your own actions
    • REST API: script action sequences
  • Workflow

    • Graphically create complex scenarios
    • Sequentially perform platform control actions and actions in the VMs

FUNCTIONAL CORE

  • Virtualization and simulation environment

  • Traffic generator

  • Distributed architecture

  • Real products (hybrid functionality)

Cyber Range Training Session for industrial, governments and academia.

ASSOCIATED SERVICES

  • Specific and «as needed» developments

  • Cyber crisis management exercises

  • Cyber security consulting and expertise

  • On-demand contents / Topologies

  • Dedicated learning catalog (https://www.bluecyforce.com/)

  • Organization of «Attack/Defense» type Capture The Flag challenges