We are the leading experts in cyber range technologies. Our team is focused on ensuring highly scalable, flexible, easy-to-use, and high-availability ranges. Our mission has always been to provide our clients with the most relevant and realistic training environments. To reach our goal, the team of CybExer has created award winning solutions that can be implemented in already existing settings.
vLab Manager (vLM) is proprietary software that offers an intelligent automation solution for cyber ranges by handling the deployment and management of different game scenarios. The software is used to manage all the systems of a cyber range; thus provides realistic environments for exercises, trainings, and uses. vLM is also a development tool for preparing and creating new targets for specific cyber ranges tailored to client needs.
Our vLM allows fast scalability and configuration of game networks from the existing target library. vLM includes a library of existing targets that can be quickly deployed for new cyber range creation. Such deployments can be executed merely with a few clicks and do not require any specific technical knowledge on the part of the deployer.
What makes a cyber range special? It is a unique platform where exercises and trainings enable the participants to obtain a real life like experience of a cyber-attack; detect the intrusion, mitigate the damage, access the damage, and secure the systems.
With the range's proprietary orchestration software vLab Manager, we are able to virtualise and integrate essentially all types of technical equipment from traditional office network through industrial OT and SCADA systems up to complex mobile networks (4G and 5G) and physical machines such as drones and oil-pumps.
CybExer has developed an award-winning software for cyber exercise situational awareness and participant scoring. The solution, called the Integrated Scoring and Awareness (ISA), offers an unmatched level of quality through state-of-the-art visualisation techniques and data capture. This provides an exquisite level of detail, sophistication and precision in cyber exercise visualisation. Moreover, the ISA comprehensively captures all exercise data and makes observing the exercises an exciting and engaging experience.
This solution overcomes one of the main challenges in conducting complex technical cybersecurity exercises: to know what is happening; which systems are under attack, how the adversary is moving through the network, impact of exploitations, and how well defenders are performing. Exercises are no longer black boxes but highly transparent and easy-to-follow events for everybody.
CybExer's content library includes more than 700 existing targets that can be used on cyber ranges in different settings. Targets include enterprise systems that are intentionally vulnerable for basic testing, secured (hardened) enterprise systems, and specific business sector systems including Internet of Things (IoT), space, finance, energy, and others.
A key capability separating CybExer from others is that we have a large library that is also easily deployable for our clients at any moment.
DeLRAP is a e-testing module for technical trainings. The platform enables learning and testing processes that provides auditing and risk assessment across all levels of the organization.
The learning module of DeLRAP is an interactive, engaging, and effective tool consisting of a training module and two separate test modules addressing skills and risk behaviour at the user level. It serves as an effective risk-mapping tool because it collects feedback from the participants as they react to the issues the platform presents to them.
Based on these reactions, the tool highlights the risk and skill area of each participant. The results can be then aggregated to departmental, organizational, or other similar levels. The goal of this multi-level analysis is to facilitate the implementation of security policies, decision-making processes, and effective risk mitigation.
The courses on DeLRAP are not "pass or fail"; instead they seek to identify risks. CybExer offers courses on cyber hygiene, GDPR, anti-money laundering, anti-corruption, and a special cyber hygiene course dedicated to remote work.
STRATEX is a unique software platform that facilitates the process of carrying out strategic decision-making exercises. Exercises on the platform are designed to offer the participants a simulated environment for playing out a fictional cyber crisis. STRATEX allows us to integrate the strategic level into our trainings.
The platform includes a collection of threat scenarios based on past real-life incidents and on vast experience in managing cyber exercises at a very high level. Engaging format allows participants to raise the awareness about potential risks by taking concrete crisis management decisions and exploring the (in)formal frameworks that govern decision-making processes. Participants of an exercise go through a threat scenario where they are presented with information regarding the development of a cyber crisis. They need to provide relevant solutions; thereafter their answers are managed via the STRATEX platform.
STRATEX platform can be used independently for purely management training events or in combination with our cyber range to create a holistic technical-strategic exercise experience.
Our overall methodology allows CybExer to conduct cyber security exercises that are effective, engaging, and realistic. A particular emphasis of the exercise curriculum is on decision-making procedures and the current threats and challenges emanating from cyberspace, relevant international, and national laws and regulations.
The exercise will motivate participants to discuss and understand the divergent and often-conflicting issues associated with decision-making in a cyber emergency as well as the consequences of the choices made or prescribed by existing regulations.
CybExer's proprietary technologies allow for the automation of breaches and exploitation of systems based upon real-world events. This allows defenders to have a systemic understanding of both breaches and lateral movements throughout networks and systems.