CyberRange as a Service™

We have been cataloging various cyber range implementations across the many different types of ranges, everything from full physical to only in the public cloud and across different end user cases such as the Warfighter's exercises/training ranges, higher ed, and commercial cyber groups. In each case, the setup and automation of the implementation of the range is a constant challenge because of the changing landscape of tools, threats and demands by users. We have deduced from this review that there are a few common themes to how best to meet these changing needs and the life-cycle management for a typical cyber range use case. 1 –There needs to be a common, easy to use interface (ie a Cyber

Featured Posts
Recent Posts
Archive
Search By Tags
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square

Proud supporters and members of the groups below

AFCEA.jfif
ATI_Spec.JPG
CMG_C5.JPG
itea_logo_footer-large.png
NDIA.png
NSTXL.JPG

Cage Code:  1Q4D2

© 2020 by Technical Systems Integrators, Inc. (TSI) United States.

  • LinkedIn

Mailing Address:

PO Box 941510

Maitland, FL 32794-1510