Trusted by
Technologies Implemented
Case Studies
Palo Alto Firewall
A government organization wanted to be sure to derive best value from their investment into firewall technology. We integrated the firewall in the exercise scenario, allowing participants to boost their skills.

A Training Company
A training company in an EU country wished to implement a cybersecurity training program for municipal authorities. By using our cyber range, customized trainings were created. The company was able to monetize their investment to the cyber range.
Request for a more detailed reference

Trainings for Banking
Estonian National Information System Authority used our cyber range to create scalable trainings for 4 leading banks in Estonia to boost their readiness for cyber attacks in a banking specific scenario.

Why CybExer SaaS Cyber Range is beneficial?
- On-demand content from the library
- Create and monetize your own content
- No user cap
- “Train as you fight”: integrate company specific security tools and technologies
- Fast implementation
- Multiple use cases and industries supported
- Various tier options available
- Low financial threshold to get initial access to the technology
- Volume-based pricing: pay as you go, no large upfront investment
- Boost your range computing power according to the peaks in usage
- Years of cyber range experience with some of the most demanding customers in the world
- Proven scalable technology
- Thorough cyber range operator trainings
- Effective support in getting the cyber range program up and running
- Guaranteed “quick wins” from our existing content library
- Comprehensive customer success and support program
Resources
CybExer’s Cyber Skills Testing offering covers testing services to support […]
The DORA regulation will enter into force in the EU […]
The NIS2 Directive is the new EU-wide legislation on cyber […]
Subscription Plans
Cyber Range Subscription Tiers
- STANDARD
- Range Capacity
- Concurrent Events: 1
- Number of Users: Unlimited
- Concurrent Users: 15
- Managed Cyber Range
- Infrastructure: Shared
- Platform: Shared
- Custom Branding:
- Platform Support (Online):
- Range Setup
- User Profiles and Usage Data: Standard
- NICE Assessment Summary:
- Onboarding Training: 2 days
- Setup Time: 1 week
- Included Training Content
- Training Course: Understanding Exploitation:
- Capture The Flag Module: CTF Essentials:
- Skills Testing Modules:
- Linux Web Server Administrator:
- Cyber Defense Forensics Analyst:
- Possibility to Host Live Fire Exercises:
- Preparation of Customer Specific Use Case: 1 case
- PREMIUM
- Range Capacity
- Concurrent Events: 5
- Number of Users: Unlimited
- Concurrent Users: 120
- Managed Cyber Range
- Infrastructure: Shared
- Platform: Dedicated
- Custom Branding:
- Platform Support (Online):
- Range Setup
- User Profiles and Usage Data: Advanced
- NICE Assessment Summary:
- Onboarding Training: 2 days
- Setup Time: 1 week
- Included Training Content
- Training Course: Understanding Exploitation:
- Capture The Flag Module: CTF Essentials:
- Skills Testing Modules:
- Linux Web Server Administrator:
- Cyber Defense Forensics Analyst:
- Possibility to Host Live Fire Exercises:
- Preparation of Customer Specific Use Case: 1 case
- ENTERPRISE
- Range Capacity
- Concurrent Events: Unlimited
- Number of Users: Unlimited
- Concurrent Users: Unlimited
- Managed Cyber Range
- Infrastructure: Dedicated
- Platform: Dedicated
- Custom Branding:
- Platform Support (Online):
- Range Setup
- User Profiles and Usage Data: Advanced
- NICE Assessment Summary:
- Onboarding Training: 5 days
- Setup Time: 4 weeks
- Included Training Content
- Training Course: Understanding Exploitation:
- Capture The Flag Module: CTF Essentials:
- Skills Testing Modules:
- Linux Web Server Administrator:
- Cyber Defense Forensics Analyst:
- Possibility to Host Live Fire Exercises:
- Preparation of Customer Specific Use Case: Based on Customer Needs
Cyber Range Subscription Tiers | Standard | Premium | Enterprise |
---|---|---|---|
Range Capacity | |||
Concurrent events | 1 | 5 | Unlimited |
Number of Users | Unlimited | Unlimited | Unlimited |
Concurrent users | 15 | 120 | Unlimited |
Managed Cyber Range | |||
Infrastructure | Shared | Shared | Dedicated |
Platform | Shared | Dedicated | Dedicated |
Custom Branding | |||
Platform Support (Online) | |||
Range Setup | |||
User Profiles and Usage Data | Standard | Advanced | Advanced |
NICE Assessment Summary | |||
Onboarding Training | 2 days | 2 days | 5 days |
Setup Time | 1 week | 1 week | 4 weeks |
Included Training Content | |||
Training Course: Understanding Exploitation | |||
Capture The Flag Module: CTF Essentials | |||
Skills Testing Modules: | |||
Linux Web Server Administrator | |||
Cyber Defense Forensics Analyst | |||
Possibility to Host Live Fire Exercises | |||
Preparation of Customer Specific Use Case | 1 case | 1 case | Based on Customer Needs |
Recent news
February 17, 2023
Experienced cyber security expert Rain Nõmmsalu with backround in network security, red teaming and CTF competitions joins CybeExer Technologies to lead the 1.3 million euro smart city cybersecurity project „Applied […]
February 13, 2023
CybExer Technologies, a NATO-awarded deep tech cyber range company, is proud to announce that it has signed a partnership agreement with Rashtriya Raksha University – the National Security and Police University of India. This […]
February 6, 2023
CybExer Technologies is proud to announce that its Chief Operating Officer, Aare Reintam, has received The Order of the White Star from Estonian President Alar Karis for his outstanding efforts […]