QualNet: (network simulator) accurate, faster-than-real-time network simulation software that can scale to large enterprise-wide systems.
EXata: (network simulator and emulator) for real-time network emulation and system-in-the-loop operation, integrating hardware, applications, and humans.
EXata Cyber: (EXata plus the Cyber Behavior Model Library) evaluate networks for their resiliency or vulnerability to cyber attack.
Joint Network Emulator (JNE)
The Joint Network Emulator (JNE) GOTS library is a live-virtual-constructive network simulation platform for the development, test, and evaluation of battlefield communications networks, applications, and net-centric systems. JNE provides a realistic network operational environment to test and evaluate performance at scale for a fraction of the cost of field exercises.
Network Defense Trainer (NDT) integrates real and simulated cyber-attacks, wired and wireless virtual networks, live and virtual equipment and applications, and traditional kinetic warfare training simulators into a full, instrumented, synthetic cyber warfare training environment.
Cyber Test, and Analysis
StealthNet enables an environment and methodology for testing blue systems against cyber attacks in order to discover and validate vulnerabilities and to assess mission impact. It has the ability to interoperate in both live and virtual environments helping to determine and understand user behavior on how people communicate with each other in a distributed test-bed with live cyber threats.
Network Digital Twin for Cyber, Test, Training, and Analysis
New and Enhanced Features To our Network Digital Twin Technology
Press Release Feed
As communication networks become ubiquitous, there is continuous innovation both in the technologies they employ and the services they are expected to provide, creating new challenges for equipment manufacturers, service providers, network planners, and operators.
A cyber attack is a deliberate attempt, using malicious software, to degrade or disable the target network’s operations or to steal or corrupt sensitive data.