Cyber Ranges
Prepare for defensive and offensive operations with high-fidelity simulations of networks on custom cyber ranges.
Get to know RangeOS.
On-premises, cloud-based & hybrid cyber range platforms
These platforms not only host learning content, but also model the Internet for users to understand its structure, services, and protocols. By Light’s cyber ranges expand to include operational technology (OT), industrial control systems, Internet of Things (IoT) devices, and any networkable hardware in the loop (HWIL).
Within this safe virtual training environment, threat actors launch campaigns that employ malware, ransomware, and other malicious code to emulate the Internet’s dangers. At the fore of cyberspace, By Light personnel support security research and development for universities and centers of excellence; they run multinational exercises across the globe and operate the largest cyber range in the world.

CENTS®
Cyberoperations Enhanced Network & Training Simulators (CENTS®)
CENTS® is a customizable simulated virtual environment that can be deployed on-prem or remotely via hosted networks. It features fully routable Layer 2 IP-based, allowing Hardware-in-the-Loop (HWIL) connections. Our Linux kernel-based virtual machine (KVM) hypervisor has no additional virtualization costs or difficulties expanding.
CENTS® includes a high-fidelity representation of the Internet “grey space,” network traffic profiles, and has virtual users using applications for host traffic.
The simulated operational environment interacts with the virtualized and physical elements of the system, providing a true-life system response. Each cyber range environment is self-contained, requiring no Internet connectivity, and all virtualized Internet IP space uses real-world geo-IP addresses.
- True-life system response through emulation
- Scenario builder & automated playback
- Multi-mode & re-roll capability
- Open architecture
RangeOS
RangeOS
RangeOS is a software orchestration engine for building and maintaining cyberspace range environments as code. It can provision environments on-demand based on scenario specifications. RangeOS is built for portability and reuse in various environments and uses “K8s as Kernel,” to maximize performance and cost. We use a declarative coding language to define the desired state of your infrastructure in code and K8s operators to maintain the configuration.
- Environments can be configured (Cyber Range-as Code) to deliver software automation, testing, and maintenance.
- Creates a machine-readable definition of the desired state of infrastructure.
- Features standardized objects, content, and mappings for reuse across events.
- Self-testing for internal validation/testing while orchestrating the environment.
CyberCENTS® Customer Portal
Existing clients can access our Customer Portal to connect to the community, report a bug, or suggest new features.
Support for the Cyber Warrior
Cyber Operations & Training Environments
Training for Cyber Warriors
Multi-Domain Operations
Ready Never Waits
Let By Light prepare your team for whatever comes next. Contact us for more information.
© 2025 By Light Professional IT Services LLC. All Rights Reserved.
