While others only simulate...

WE EMULATE

Cyberoperations Enhanced Network and Training Simulators (CENTS®)

Metova’s Cyberoperations Enhanced Network and Training Simulators (CENTS®) were developed in 2006 to support cyber training, exercises, and mission qualification of the cyber mission forces across the US Department of Defense.  Following a decade of success and continual refinement, CENTS® is a pre-eminent portfolio of cyber simulators, ranges and persistent cyber training environments.  Our diverse customer base (US Department of Defense, US Military, Federal and State agencies, Colleges and Universities, and International) is using CENTS to prepare cyber operators, mission forces, and cyber students to detect and defend against malicious events and conduct hunt and counter cyber operations.

Reasons You Should Be Using CENTS®

NETWORK REPLICATION

Only CENTS® has the ability to replicate your network so you can test and validate changes to configurations before you implement them, potentially saving major time and money.

SAFE ENVIRONMENTS

CENTS® provides a network-safe environment for your cyber workforce to react to catastrophic attacks and outages, as well as safe LAN and WAN environments to hone cyber operator tactics, techniques, and procedures.

REALISTIC TRAINING

CENTS® has the unique ability to train individual operators, or entire network teams, to identify if an attack has occurred, contain the attack, remediate and defend.

IDENTIFYING VULNERABILITIES

CENTS® is the most powerful, effective tool ever designed for performing critical network penetration testing to identify and mitigate vulnerabilities before they are exploited.

UPDATED THREATS

CENTS® technicians continually scour the cyber landscape to uncover the latest attack scenarios, which they add to the CENTS® portfolio at no cost to you, thereby keeping your defense posture always current.

What CENTS® Can Do For You

Cyberoperations Enhanced Network and Training Simulators (CENTS®) is the single most powerful and effective suite of tools ever developed to prepare for even the most cunning and sophisticated cyber attacks

Identify Security Weaknesses

Powerful emulation tools with the ability to stress and test a network to evaluate potential operational and security weaknesses.

Prepare for an Attack

No suite of products better prepares cybersecurity operators to identify, isolate, remove, and recover from a cybersecurity attack.

Validate Your Preparedness

Operational assessments including Certification and Accreditation support to improve processes, procedures, checklists, and guidance.

Advanced Features

The most powerful and advanced tools in the cybersecurity industry for detecting and defending against cyber criminals.

What We Offer

CENTS® products are powerful emulation tools that provide an organization with critical benefits.

Support multiple tier: Single Domain/Location, Multi-Tier

Support different missions including training, T&E, target development rehearsal, proof of concept.

Realistic Multi-hop Routing using dynamic routing protocols; multi-layer websites; addresses and websites resolve in DNS.

RFC compliant; dynamic traffic flow; traffic density is customer configured.

Drill-down to the OSI Layer 2; devices/applications are configurable; events occur in real time; users/systems must take corrective actions executed in real-world ops.

Indications and warnings map to unique system configuration; mitigation steps map to customer TTP.