Cyber Security Solutions

Cyber Security Solutions

SCALABLE Network Technologies offers a variety of cutting-edge Modeling and Simulation-based capabilities for cyber security training and cyber network defense solutions. Our solutions have been developed to enhance the reliability and security of our customer’s networks and the mission-critical systems that operate across the networks. In order to protect and defend a network against cyber attacks and threats, it is essential to understand and assess the network for vulnerabilities. We offer a sophisticated, high fidelity network emulation capability used to simulate and predict the behavior of networked environments. Our high fidelity, real-time simulation platform incorporates physics-based models of military and commercial satellite, tactical, acoustic and optical networks along with emulation interfaces for live/virtual/constructive integration. Our cyber behavior models provide a vulnerability analysis framework with configurable cyber attack and defense models.

SCALABLE’s solutions are used by our customer’s to assess the resiliency of networked communication environments to diverse cyber threats and to enable system lifecycle management and operator training. Our cyber security tools allow the customer to explore and analyze live early-stage device designs, application code response and overall communications effectiveness in a highly realistic synthetic network at real-time speed to provide a complete cyber security defense solution. In addition, we offer you the ability to evaluate your network design and prepare a cyber threat assessment on its resiliency.

SCALABLE Security Tools to Fit Your Needs

EXata Cyber

EXata simulation/emulation platform plus the Cyber Behavior Model Library to evaluate a network design for resiliency to cyber attack

  • Comprehensive list of cyber attacks to prepare a cyber network defense
  • Enables the user to gain unique visibility into how a network and the applications that use it will respond during a cyber attack
  • Launch cyber warfare features on a model, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd part network intrusion detection software (NIDS) like snort
  • Provides ultra-high fidelity simulated representations of large scale wireless, wired and mixed-platform network performance and behavior
  • Virtual models can be seamlessly integrated with live equipment and applications to create sophisticated live-virtual constructive (LVC) environments

EXata CPS

EXata for Cyber-Physical Systems simulates the underlying communication fabric of electrical grids to test their cyber resiliency.

  • Integrates with OPAL-RT’s HYPERSIM simulator on the same hardware (or box) to offer a complete real-time hyperphysical solution
  • Enables development, testing, and assessment of electrical grids with communication networks
  • Measure and improve system resiliency, and develop plans to mitigate risks from cyber attacks



Watch Webnar


Network Defense Trainer

A Live-Virtual-Constructive (LCV) cyber range to train cyber warriors, commanders and network operators

  • Includes representation of wireless equipment and applications
  • Seamlessly federate with other commercial or military training systems
  • Extensive list of cyber attacks
  • Ability to combine both simulated and real cyber-attacks in an exercise
  • After Action Review module to capture, record and replay all actions and trainee behavior for a complete cyber threat assessment

JNE/Stealthnet

A Government-Off-The-Shelf (GOTS) library that works in conjunction with EXata JNE. Live-Virtual-Constructive (LCV) framework for network simulation, test and evaluation of operational networks defenses against cyber attacks on battlefield communication networks

  • Ability to model large-scale cyber threats on networks with hundreds to thousands of wired and wireless components
  • Scalability to test attacks on large communication networks
  • Interpolate in both live and virtual environments
  • Cyber test and analysis metrics to analyze the operational impact of cyber offense and defense strategies

Cyber Security Tools enables users to:

  • Optimize the network, systems and applications performance and the physical structure to mitigate risks
  • Identify issues, bottlenecks and failure modes before they impact users
  • Create best practices to increase systems availability and lower operational risks
  • Quantify potential business or mission impacts due to cyber attacks and the resulting network disruptions
  • Replicate specific environments in a lab and quickly evaluating “what if” scenarios to determine what happens to physical systems if they are subjected to cyber attacks

Solutions and Projects

Department of Defense
CyberTASE
Cyber Security for Critical Infrastructure
US STRATCOM
Transportation Network Optimization and Network Performance
StealthNet Cyber Library

Network Defense Trainer

As cyber-attacks increase in both scale and frequency it is essential that trainees have the opportunity to apply knowledge in realistic, stressful situations in a high fidelity synthetic environment. Cyber Defense must be taken seriously and it is important to be prepared in order to protect and defend your network from a costly attack. All organizations, both commercial and military should be focused on training exercises, using real tools, and learn what to expect during cyber-attack and how to react. Training prepares you for incidents and lets you focus on awareness, reaction time and correct action (at all levels), cyber defenses, workarounds, and if appropriate, countermeasures before it is too late.

Featured Press Releases

PEO C3T Awards SCALABLE Contract to Support PM Tactical Network Program ($2.8 Million)

July 10, 2018

EXata/JNE To Model and Simulate Large Scale Tactical Network Communication Systems

SCALABLE Releases New Version of QualNet and EXata Modeling and Simulation Tools

May 31, 2018

New and Enhanced Features for Improved Productivity

SCALABLE Releases New Version of Network Defense Trainer

February 6, 2018

Improved Features and Enhancements to Cyber Range Environment

White Papers

Here are a few examples of the Cyber-specific white papers available once you request access to our library

APOLL: Adaptive Polling for Reconfigurable Underwater Data Collection Systems

Advances in technology, systems, computation and storage have led to smaller, more capable underwater vessels with reduced capital and operating costs. Long-lived underwater hubs that can operate with minimal human intervention can be networked and deployed together with other underwater vehicles for diverse uses.

Cognitive Task Analysis Based Training for Cyber Situation Awareness

Cyber attacks have been increasing significantly in both number and complexity, prompting the need for better training of cyber defense analysts. To conduct effective training for cyber situation awareness, it becomes essential to design realistic training scenarios.

Distributed StealthNet (D-SN): Creating a Live, Virtual, Constructive (LVC) Environment for Simulating Cyber-Attacks for Test and Evaluation (T&E)

The Services have become increasingly dependent on their tactical networks for mission command functions, situational awareness, and target engagements (terminal weapon guidance). While the network brings an unprecedented ability to project force by all echelons in a mission context, it also brings the increased risk of cyber-attack on the mission operation. With both this network use and vulnerability in mind, it is necessary to test new systems (and networked Systems of Systems (SoS)) in a cyber vulnerable network context.

Training Net-centric Warriors for Digital Battlespace Operations

Today’s military depends on data moved over wired and wireless networks to an extent that would have been unimaginable just a few years ago. Increasing reliance on an ever-growing array of fixed and mobile communications technologies means that there are now few greater challenges facing military leaders than training net-centric warriors for operations in the digital battlespace.

Live, Virtual, and Constructive Simulation Environments

Communication is the core enabler and most important element of network-centric warfare. To prepare soldiers for battle, combat simulators must deliver maximum realism. Realism in combat simulations is achieved by extending a combat model to interact with other simulations, creating a multi-dimensional representation of combat.

A Virtual Cyber Range for Cyber Warfare Analysis and Training

There is a need to accurately model the effects of cyber weapons for analysis, system testing and hardening, and training. Current simulations of the Net-Centric Battlespace do not adequately recreate the impact of cyber warfare due to a lack of realistic cyber threat and defense representations.

Wireless Cyberwarfare: Why Mobile Networks Are The Most Vulnerable and What To Do About It

Cyberwarfare is on the rise. Combatants are waging war with solo cyber attacks and cyber plus ballistic attacks. Cyberspace as a warfare domain is rapidly being viewed as equal to land, sea, air, and space.

Wireless Cyberwarfare: Why Mobile Networks Are The Most Vulnerable and What To Do About It

Cyberwarfare is on the rise. Combatants are waging war with solo cyber attacks and cyber plus ballistic attacks. Cyberspace as a warfare domain is rapidly being viewed as equal to land, sea, air, and space.

Information Warfare

U.S. forces in Afghanistan and Iraq are working daily to defeat radio-controlled improvised explosive devices (IEDs). IEDs have caused more casualties in Iraq than any other weapon. The Defense Department has been battling them for years with a variety of jammers, or counter- IED systems.

Contact Us
White Papers
Newsletter