QualNet: (network simulator) accurate, faster-than-real-time network simulation software that can scale to large enterprise-wide systems.
EXata: (network simulator and emulator) for real-time network emulation and system-in-the-loop operation, integrating hardware, applications, and humans.
EXata Cyber: (EXata plus the Cyber Behavior Model Library) evaluate networks for their resiliency or vulnerability to cyber attack.
Joint Network Emulator (JNE)
The Joint Network Emulator (JNE) GOTS library is a live-virtual-constructive network simulation platform for the development, test, and evaluation of battlefield communications networks, applications, and net-centric systems. JNE provides a realistic network operational environment to test and evaluate performance at scale for a fraction of the cost of field exercises.
Network Defense Trainer (NDT) integrates real and simulated cyber-attacks, wired and wireless virtual networks, live and virtual equipment and applications, and traditional kinetic warfare training simulators into a full, instrumented, synthetic cyber warfare training environment.
Cyber Test, and Analysis
StealthNet enables an environment and methodology for testing blue systems against cyber attacks in order to discover and validate vulnerabilities and to assess mission impact. It has the ability to interoperate in both live and virtual environments helping to determine and understand user behavior on how people communicate with each other in a distributed test-bed with live cyber threats.
Network Digital Twin for Cyber, Test, Training, and Analysis
New and Enhanced Features To our Network Digital Twin Technology
Press Release Feed
New Techniques for High-Fidelity Modeling and Simulation in 5G Mobile Network Environments: Part One
Digital twin simulation modeling of Industrial Control Systems in conjunction with operator processes and procedures offer significant value for assessment of cyber resilience of Cyber Physical System (CPS) infrastructure, identifying and mitigating risk of unacceptable consequences while simultaneously reducing expenditures for unnecessary cybersecurity capabilities.