TSI Cyber Range as a Service (CRaaS)
TSI’s CRaaS® is an industry leading automation and orchestration framework for the deployment and consumption of cyber training and exercise environments and workflows. CRaaS® allows our clients to reserve and deploy integrated AND standardized environments accessed by a single pane of glass for all aspects of cyber training. This environment is then provided to end users through a self-service web portal with complete scheduling and multiple levels of LMS if desired. The environments can include both virtual and physical assets and can also include legacy, future, and even proprietary technologies in our ‘Sandbox’.
TSI Options for CRaaS (Note: most commercial and in-house technologies can be added to our CRaaS automation environment)
SCYTHE
An adversary emulation platform for the enterprise and cybersecurity market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. SCYTHE allows organizations to continuously assess their risk posture and exposure.
Campaigns are mapped to the MITRE ATT&CK framework, the industry standard and common language between Cyber Threat Intelligence, Blue Teams, and Red Teams.
IXIA BreakingPoint
Provides scalable real-world application and threat simulation in an elastic deployment model by leveraging virtualization and industry-standard hardware platforms.
CYBRScore
CYBRScore® educates cybersecurity professionals in “hands-on” lab environments on topics that include incident response, malware analysis, computer, media and mobile device exploitation, penetration testing and vulnerability assessment, reverse engineering, information assurance and cyber forensics. CYBRScore courses are mapped directly to specific learning objectives from governing institutions and cybersecurity communities of practice, including the NICE National Cybersecurity Workforce Framework and DoD Directive 8140.
TSI Virtual Machine Library
Various industry standard virtual machines to ‘jump start’ your cyber environment.