Ad hoc Research-Elite Solutions for Warfighters
DarkStax™ core feature simplifies the scenario and content generation process. The approach enables a modern cloud application to be modeled in a fraction of the time, using a building block approach and out-of-the-box automation. DarkStax™ core feature automates infrastructure deployment. It connects to on-premises (e.g., OpenStack, Kubernetes, VMWare) or public (e.g., AWS, Azure, Kubernetes) cloud and automates environment provisioning and deployment. It supports multi-cloud deployment scenarios. Users can drag and drop VM or containers from the image repository and build an infrastructure blueprint. Once the blueprint is created, DarkStax™ generates a Platform as Code (PaC) cloud-compliant file. The multi-cloud feature allows users to bring together multiple cyber ranges to create a federation of cyber ranges which can exchange data with one another to present a more robust Cyber Training environment.
DarkStax™ simulation of internet services adds the realism of scenarios being implemented by the cyber range. It has state-of-the-art capability to crawl social media platforms, e-commerce, new media, dark web, and other real-world websites to replicate the content in an emulated environment. It can also overlay custom scenarios to drive information operations, themes and messaging and intelligence training objectives. This allows the user to not only replicate the internet but create a hyper-realistic scenario development tool for information advantage training, testing, and analysis.
DarkStax™ Emulation Based Model (EBM) features can emulate software-defined radios and commercial mobile wireless networks in a container-based virtualized environment. The replication of the EBM environment expands the ability to train users under hyper-realistic electronic warfare warfighter effects. The EBM capability also allows creating a digital twin of ICS/OT systems in a cyber range by emulating their behavior and replaying recorded traffic, which can be ingested into the training environment and assessed for network configuration and red threat emulated attacks.
 
Category Press Releases

Browse Categories