idga stats

Accelerating the Deployment of the Evolved Cyber Range

Organizations worldwide face a dangerous shortage of cyber warriors with the skills required to defend against
cyber terrorism. This urgent situation is made worse by the weaknesses and vulnerabilities that continue to
pervade critical IT infrastructures—despite billions of dollars invested in cybersecurity measures.


Answering these problems requires Internet-scale simulation environments, along with a comprehensive training
curriculum and proven methodologies, to develop elite cyber warriors and simulate attacks on IT infrastructures.
Military commanders, defense contractors, and even commercial analysts such as Gartner refer to these
environments as "cyber ranges."

Although cyber ranges are a necessity for training cyber warriors, in recent years the old approach to building
them has been exposed as a costly and futile exercise. Flagship cyber range projects relying on that outmoded
approach have wasted years and hundreds of millions of taxpayer dollars merely to study the problem.

Yet BreakingPoint has harnessed patented network processor technology to deliver a better approach — one that
creates an Internet-scale cyber range environment from a single 7-inch-high device. This breakthrough invention
removes the obstacles that once prevented the widespread deployment of cyber ranges for arming and training
cyber warriors. This paper illustrates how government, intelligence, and military organizations throughout the
world can leverage that innovation to rapidly deploy a battle-proven, operationally relevant closed environment
that reflects the entire Internet for a small fraction of the cost of traditional models.

Leveraging its cyber range experience, BreakingPoint has formulated a four-point strategy for preparing
organizations to defend national interests by assessing, educating, and certifying elite cyber warriors and
equipping those forces to harden the resiliency of critical network and data center infrastructures. The capabilities
and strategy described are not a research project or an exorbitant consulting arrangement; they are available and
ready for cost-effective deployment today.

Thank you, for your interest in, Accelerating the Deployment of the Evolved Cyber Range.

By entering in your information and submitting the form, you give the sponsor permission to contact you regarding their product.

To continue viewing this content please fill out the form below and become an Management member.
Or if you're already a Management member, sign in below to download.
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Forgot your password?
Not a member?

Reasons for Joining
  • Address your challenges through knowledge sharing with peers from our global network of specialists.
  • Benchmark your business initiatives with the who's who in the field.
  • Hear from industry pioneers how to maximize ROI in today's challenging economy.
  • And best of all It's FREE!