Velos Cyber Training Range delivers the training needed to counter cyber threats today and into the future.
The Velos Cyber Training Range creates a high-fidelity mirror of a nation's existing network environment. Through automation, non-player characters or live-action scenarios, red teams can test the cybersecurity of a government's cyber environment — both their technology and IT staff.
Stress testing of security stacks and configurations means an accurate assessment of why, how and what type of response(s) best mitigate an attack and what will provide a resilient network.
Whether on-premises or cloud-based, the Velos Cyber Training Range ensures government's existing IT infrastructure is supported and cyber training can begin immediately.
Built on the same cyber-readiness platform used by the United States Cyber Command (USCYBERCOM) in the Persistent Cyber Training Environment (PCTE), the Velos Cyber Training Range assists foreign governments who want to develop robust cybersecurity and cyber defense capabilities.
Many nations fall below acceptable security levels and are prey to adversary nations offering technology with exploitable components. The U.S. Department of Defense (DoD) has a program standard called Comply-to-Connect (C2C) that could help baseline Partner Nations’ current security levels. The C2C program framework serves as a workable roadmap to enable Partner Nations to achieve U.S.-grade cybersecurity, mutually benefiting the coalition.
The framework allows Partner Nations to:
Understand where and how to assess their current cybersecurity posture
Plan the best technology roadmap for their environment
Acquire and implement the right mix of technology
C2C enables Partner Nations to understand where they stand today and where they should invest to advance their cybersecurity posture. Each step identifies and calls for specific actions and capabilities.
Establish complete visibility to discover, classify and locate connecting devices. Creating an asset inventory encompassing hardware, software and operational technology (OT) is an essential part of this step.
Conduct endpoint detection and response investigation. Scan device properties, determine compliance state, report scan and alert remediation tools.
Orchestrate and automate remediation actions (updates, patches, scans) for non-compliant connections; validate and report findings; and continuously monitor updates and changes.
Control access at the point of connection based on compliance with security policies, including establishing the access level for each device and quarantining non-compliant devices.
Continuously monitor each device, control access and maintain compliance. This step includes ongoing, automated monitoring for configuration changes and orchestration with other compliance tools.
Speak to our Cybersecurity Experts to Receive a Special Assessment Today.
Discover infrastructure
Determine impact
Define baseline
Develop approach