CENTS®

CYBEROPERATIONS ENHANCED NETWORK & TRAINING SIMULATORS (CENTS®)

Our CENTS cyber ranges are fully customizable virtual environments representing transmission control protocol/Internet protocol (TCP/IP) for on-prem or remotely hosted networks. Since it is fully routable at Layer 2, you can easily add other systems or networks that are IP-based to conduct Hardware-in-the-Loop (HWIL) testing. CENTS runs on a Linux kernel-based virtual machine (KVM) hypervisor, so there are no additional virtualization costs or difficulties expanding. CENTS includes a high-fidelity representation of the Internet “grey space,” network traffic profiles, and has virtual users using applications for host traffic.

Our platform solutions provide an integrated, Live-Virtual-Constructive (LVC) cyber range environment that permits closed network engagements or use of a virtual private network (VPN) for engagements with multiple interconnected environments. The emulated operational environment interacts with the virtualized and physical elements of the system providing true-life system response. Each cyber range environment is self-contained and requires no Internet connectivity, and all IP addresses and website URLs resolve in the cyber range’s domain name system (DNS). All virtualized Internet IP space uses real-world geo-IP addresses, and the included cyber scenarios execute in automatic or manual mode.

CENTS is the backbone of the Air Force Virtual Interconnected Training Environment (VITE).

 

CENTS CYBER RANGE/SIMULATOR ENVIRONMENTS

CYbersecurity Network TRaining Simulator (CYNTRS®)

Built to the customer’s specification (hardware/software-in-the-loop solution), a CYNTRS unit contains the necessary components of a single mission partner network and can also be constructed to emulate multi-tiered environments. The CYNTRS platform is ideal for team training, capstone events, and exercises.

Hands-On Training Simulator (HOTSIM®)

The HOTSIM is a completely virtualized single mission partner network comprised of open source devices and applications with a Microsoft network environment.

Range Global Internet (RGI®)

The RGI has a look and feel comparable to the actual Internet. It provides for controlled and secure testing and training scenarios outside of the public realm. The RGI is completely virtualized, using open-source utilities where possible, and utilizes real IPs found in the global Internet structure.

Virtualized Cyber Classroom Environment (VCCE®)

The Virtualized Cyber Classroom Environment (VCCE) provides a virtualized environment to conduct secure network defense and attack training and exercises. The standard VCCE has sufficient space to host five (5) networks (aka pods) for five (5) people (25 users) simultaneously. The five (5) pods are interconnected through the virtualized Internet space.

ONLY CENTS OFFERS

TRUE-LIFE SYSTEM RESPONSE THROUGH EMULATION

Request for comments (RFC)-compliant communications that include actual source/destination nodes and all underlying network protocol signaling and system indicators necessary to perform forensic investigation from open systems interconnection (OSI) layer 2 through 7.

SCENARIO BUILDER & AUTOMATED PLAYBACK

Ability to sequence parameters for traffic generation and attack events (source, destination, parameters, severity, and timeline) to allow for bundling events into scenarios and lesson plans that can be stored and replayed.

MULTI-MODE & RE-ROLL CAPABILITY

Events can be played out in automatic (sequenced) or manual (on demand) mode, and range can be baselined and reconstituted in minutes.

OPEN ARCHITECTURE

Minimize cost through best-of-breed hybrid of hardware (transport) and virtualization (systems) while allowing configuration and technology flexibility, scalability, and interoperability through software/hardware in the loop.

COMMERCIAL PRODUCT

Stable baseline with software development life cycle, new feature integration, system training, and sustainment package.

AUTHORITY TO OPERATE

CENTS/SLAM-R have been issued an ATO by the Headquarters Air Force A3 (HAF-A3) under the risk management framework (RMF).

For more information about our products and services, please complete our contact form.

Contact Us