Sign up to get full access to our latest articles, reports, videos and events delivered by military and industry experts and decision makers.

Accelerating the Deployment of the Evolved Cyber Range

Add bookmark

Organizations worldwide face a dangerous shortage of cyber warriors with the skills required to defend against
cyber terrorism. This urgent situation is made worse by the weaknesses and vulnerabilities that continue to
pervade critical IT infrastructures—despite billions of dollars invested in cybersecurity measures.


Answering these problems requires Internet-scale simulation environments, along with a comprehensive training
curriculum and proven methodologies, to develop elite cyber warriors and simulate attacks on IT infrastructures.
Military commanders, defense contractors, and even commercial analysts such as Gartner refer to these
environments as "cyber ranges."

Although cyber ranges are a necessity for training cyber warriors, in recent years the old approach to building
them has been exposed as a costly and futile exercise. Flagship cyber range projects relying on that outmoded
approach have wasted years and hundreds of millions of taxpayer dollars merely to study the problem.

Yet BreakingPoint has harnessed patented network processor technology to deliver a better approach — one that
creates an Internet-scale cyber range environment from a single 7-inch-high device. This breakthrough invention
removes the obstacles that once prevented the widespread deployment of cyber ranges for arming and training
cyber warriors. This paper illustrates how government, intelligence, and military organizations throughout the
world can leverage that innovation to rapidly deploy a battle-proven, operationally relevant closed environment
that reflects the entire Internet for a small fraction of the cost of traditional models.

Leveraging its cyber range experience, BreakingPoint has formulated a four-point strategy for preparing
organizations to defend national interests by assessing, educating, and certifying elite cyber warriors and
equipping those forces to harden the resiliency of critical network and data center infrastructures. The capabilities
and strategy described are not a research project or an exorbitant consulting arrangement; they are available and
ready for cost-effective deployment today.

Upcoming Events

Military Flight Training USA

October 28 - 29, 2025

The Westin San Antonio North, San Antonio, TX

Military Flight Training USA

Biometrics for Government and Law Enforcement

November 19 - 20, 2025

Sheraton Reston Hotel, Reston, VA

Biometrics for Government and Law Enforcement

Next Generation Missiles and Hypersonics Summit

December 9 - 10, 2025

Sheraton Reston Hotel, Reston, VA

Next Generation Missiles and Hypersonics Summit

Future Indirect Fires

January 27 - 28, 2026

The Westin Arlington, Arlington, VA

Future Indirect Fires

Military Simulation Training Summit

February 24 - 25, 2026

The Celeste Hotel, Orlando, FL

Military Simulation Training Summit

Latest Webinars

Responsible and Transparent Approaches to AI in Biometric Algorithm

2024-08-14

01:00 PM - 01:45 PM EDT

Join the Department of Homeland Security and IDEMIA as they discuss how to bring security and transp...

Securing the Defence Industrial Base: Mitigating Risk and Delivering Resiliency in Physical and Digital Supply Chains

2022-04-21

12:00 PM - 01:00 PM EST

This webinar discusses the current risks in today's supply chain and the recent military initiatives...

Treatment Option for Two Subsets of Challenging to Treat Major Depressive Disorder in Adults

2021-08-25

12:00 PM - 01:00 PM EST

The latest IDGA webinar looks at treatment plans for the VA's adult patients with two subtypes of ma...

Recommended