Trusted by
Technologies Implemented
Case Studies
Palo Alto Firewall
A government organization wanted to be sure to derive best value from their investment into firewall technology. We integrated the firewall in the exercise scenario, allowing participants to boost their skills.

A Training Company
A training company in an EU country wished to implement a cybersecurity training program for municipal authorities. By using our cyber range, customized trainings were created. The company was able to monetize their investment to the cyber range.
Request for a more detailed reference

Trainings for Banking
Estonian National Information System Authority used our cyber range to create scalable trainings for 4 leading banks in Estonia to boost their readiness for cyber attacks in a banking specific scenario.

Why CybExer SaaS Cyber Range is beneficial?
- On-demand content from the library
- Create and monetize your own content
- No user cap
- “Train as you fight”: integrate company specific security tools and technologies
- Fast implementation
- Multiple use cases and industries supported
- Various tier options available
- Low financial threshold to get initial access to the technology
- Volume-based pricing: pay as you go, no large upfront investment
- Boost your range computing power according to the peaks in usage
- Years of cyber range experience with some of the most demanding customers in the world
- Proven scalable technology
- Thorough cyber range operator trainings
- Effective support in getting the cyber range program up and running
- Guaranteed “quick wins” from our existing content library
- Comprehensive customer success and support program
Resources
Sourcing for a cyber range solution sounds like a hardware-purchasing […]
The Cyber Battle of Estonia is an annual CTF (Capture […]
Increasing accessibility: CybExer’s shift towards a SaaS delivery model Cyber […]
Subscription Plans
Cyber Range Subscription Tiers
- STANDARD
- Range Capacity
- Concurrent Events: 1
- Number of Users: Unlimited
- Concurrent Users: 15
- Managed Cyber Range
- Infrastructure: Shared
- Platform: Shared
- Custom Branding:
- Platform Support (Online):
- Range Setup
- User Profiles and Usage Data: Standard
- NICE Assessment Summary:
- Onboarding Training: 2 days
- Setup Time: 1 week
- Included Training Content
- Training Course: Understanding Exploitation:
- Capture The Flag Module: CTF Essentials:
- Skills Testing Modules:
- Linux Web Server Administrator:
- Cyber Defense Forensics Analyst:
- Possibility to Host Live Fire Exercises:
- Preparation of Customer Specific Use Case: 1 case
- PREMIUM
- Range Capacity
- Concurrent Events: 5
- Number of Users: Unlimited
- Concurrent Users: 120
- Managed Cyber Range
- Infrastructure: Shared
- Platform: Dedicated
- Custom Branding:
- Platform Support (Online):
- Range Setup
- User Profiles and Usage Data: Advanced
- NICE Assessment Summary:
- Onboarding Training: 2 days
- Setup Time: 1 week
- Included Training Content
- Training Course: Understanding Exploitation:
- Capture The Flag Module: CTF Essentials:
- Skills Testing Modules:
- Linux Web Server Administrator:
- Cyber Defense Forensics Analyst:
- Possibility to Host Live Fire Exercises:
- Preparation of Customer Specific Use Case: 1 case
- ENTERPRISE
- Range Capacity
- Concurrent Events: Unlimited
- Number of Users: Unlimited
- Concurrent Users: Unlimited
- Managed Cyber Range
- Infrastructure: Dedicated
- Platform: Dedicated
- Custom Branding:
- Platform Support (Online):
- Range Setup
- User Profiles and Usage Data: Advanced
- NICE Assessment Summary:
- Onboarding Training: 5 days
- Setup Time: 4 weeks
- Included Training Content
- Training Course: Understanding Exploitation:
- Capture The Flag Module: CTF Essentials:
- Skills Testing Modules:
- Linux Web Server Administrator:
- Cyber Defense Forensics Analyst:
- Possibility to Host Live Fire Exercises:
- Preparation of Customer Specific Use Case: Based on Customer Needs
Cyber Range Subscription Tiers | Standard | Premium | Enterprise |
---|---|---|---|
Range Capacity | |||
Concurrent events | 1 | 5 | Unlimited |
Number of Users | Unlimited | Unlimited | Unlimited |
Concurrent users | 15 | 120 | Unlimited |
Managed Cyber Range | |||
Infrastructure | Shared | Shared | Dedicated |
Platform | Shared | Dedicated | Dedicated |
Custom Branding | |||
Platform Support (Online) | |||
Range Setup | |||
User Profiles and Usage Data | Standard | Advanced | Advanced |
NICE Assessment Summary | |||
Onboarding Training | 2 days | 2 days | 5 days |
Setup Time | 1 week | 1 week | 4 weeks |
Included Training Content | |||
Training Course: Understanding Exploitation | |||
Capture The Flag Module: CTF Essentials | |||
Skills Testing Modules: | |||
Linux Web Server Administrator | |||
Cyber Defense Forensics Analyst | |||
Possibility to Host Live Fire Exercises | |||
Preparation of Customer Specific Use Case | 1 case | 1 case | Based on Customer Needs |
Recent news
January 17, 2023
CybExer Technologies is proud to announce the appointment of Bruce Goodwill as the new Vice-President of Channels and Partnerships. Bruce brings extensive experience in leading and building global channel sales […]
January 10, 2023
Tallinn, 10th January 2023: CybExer Technologies, a NATO-awarded deep tech cyber range company, has today announced a significant expansion of its Cyber Range as a Service offering. The next generation […]