Improved Features and Enhancements to Increase Productivity in the Cyber Range Environment
QualNet: (network simulator) accurate, faster-than-real-time network simulation software that can scale to large enterprise-wide systems.
EXata: (network simulator and emulator) for real-time network emulation and system-in-the-loop operation, integrating hardware, applications, and humans.
EXata Cyber: (EXata plus the Cyber Behavior Model Library) evaluate networks for their resiliency or vulnerability to cyber attack.
Joint Network Emulator (JNE)
The Joint Network Emulator (JNE) GOTS library is a live-virtual-constructive network simulation platform for the development, test, and evaluation of battlefield communications networks, applications, and net-centric systems. JNE provides a realistic network operational environment to test and evaluate performance at scale for a fraction of the cost of field exercises.
Network Defense Trainer (NDT) integrates real and simulated cyber-attacks, wired and wireless virtual networks, live and virtual equipment and applications, and traditional kinetic warfare training simulators into a full, instrumented, synthetic cyber warfare training environment.
Cyber Test, and Analysis
StealthNet enables an environment and methodology for testing blue systems against cyber attacks in order to discover and validate vulnerabilities and to assess mission impact. It has the ability to interoperate in both live and virtual environments helping to determine and understand user behavior on how people communicate with each other in a distributed test-bed with live cyber threats.
Complete Solution to Protect Critical Infrastructure
EXata/JNE To Model and Simulate Large Scale Tactical Network Communication Systems
New and Enhanced Features for Productivity
New and Enhanced Features for Improved Productivity
FDECO Integrated Network Simulators (FINS) Demonstration Shows Future of Unmanned Undersea Vehicle Operations
Press Release Feed
As part of our Cyber Resilience series, today’s blog kicks off the important discussion around how cyber attacks can impact the network and ways that ensuring cyber resilience allows the network and the resident applications to deliver the expected service even when under a cyber attack.