Cyber Range | KPMG | SG
close
Share with your friends

Cyber Range

Cyber Range

Protect your critical assets and stay ahead with a robust cyber range technology solution.

Protect your critical assets and stay ahead with a robust cyber range technology solution.

In today’s highly connected world, cyber attacks can strike anytime, anywhere. Organizations are constantly challenged with creating and controlling traditional cyber ranges that have large environments spanning hundreds of machines and network nodes, and the massive hardware and software investments required to do so.

KPMG has thus developed a cyber range which can be scaled effectively to address today’s growing network traffic volume and ever-more complex attack vectors.

 

Key features:

  • Integrated graphic user interface (GUI)
    One single pane of UI glass to simplify the user experience, visualize the cyber range environment and automate the command set. This integrated GUI automates resource enrolments and “time-to-production” – the biggest issue faced by cyber range operations today. We have eliminated the challenge in managing the multitudes of application programming interfaces (APIs), GUIs and command interfaces. The technology solution enables a single, automated network test lab that is globally accessible 24/7.
  • Threat and packet generator
    Near real-life simulation tool that is recognized and used by various cyber security laboratories, always updated with the latest threats and attacks. Tightly integrated with our GUI, our Cyber Range allows you to utilize this threat and packet generator in ways that only a real-life Security Operation Centre may experience.
  • Virtualization of operating system
    All endpoints can be virtualized and simulated. Add a software repository and the permutations for simulation environments have the potential to become limitless. We use virtualization platforms that are among the best in the industry to empower users to virtualize any application with confidence, redefine availability and simplify the virtual data center. The result is a highly available, resilient and on-demand infrastructure.

Protect your critical assets and stay ahead with a cyber range technology solution that provides your information technology personnel with a realistic training platform.

Connect with us

 

Request for proposal

 

Submit