Listing Thumbnail

    KBR Cyber Range

     Info
    Sold by: KBR 
    KBR's cyber range is a secure, AWS-hosted environment used for testing, vulnerability assessments, and training in both IT and operational technology (OT) environments. It allows users to simulate realistic, complex cyber scenarios to build defensive, "kill chain" technologies without impacting live, mission-critical systems.

    Overview

    KBR's cyber range is a high-fidelity, virtualized, and secure environment designed for testing, training, and developing advanced cyber warfare technologies and defensive countermeasures. It simulates complex IT and Operational Technology (OT) networks, allowing users to safely analyze vulnerabilities, develop "kill chain" strategies, and test IoT/IIoT security without risking live systems. Key features and capabilities include: Virtual Environments: The platform replicates real-world enterprise networks and industrial production backbones, facilitating realistic "art-of-the-possible" cyber-attack simulations. Testing & Development: Users can validate new security tools and applications to understand their performance in a live environment. Training & Simulation: It provides hands-on, on-the-job training, allowing operators to practice incident detection, mitigation, and response in a controlled setting. Advanced Capabilities: Built using SecDevOps, the platform allows for the immediate transfer of information to live networks. It is designed to be updated with new features such as artificial intelligence. Applications: Primarily used for government and defense, the range supports military-grade cybersecurity exercises and critical infrastructure protection. The range is highly accessible, allowing customers to use it remotely, and is designed to help organizations reduce errors by replicating complex operational scenarios. KBR’s Cyber Range is a high‑fidelity cyber training, testing, and mission‑rehearsal environment purpose‑built for government and enterprise cyber operations. The range is architected as a platform‑agnostic, IP‑addressable environment designed to interoperate securely with external enterprise and cloud systems—including AWS—without requiring the core cyber range to be hosted within AWS infrastructure. In AWS‑centric use cases, the KBR Cyber Range can be securely interconnected with customer‑controlled AWS environments using Amazon VPC networking constructs (e.g., VPN, Direct Connect, or VPC peering) to enable realistic cyber exercises against AWS‑hosted workloads. Customers commonly integrate Amazon EC2, Amazon EKS, and other AWS‑resident applications as live or emulated targets within cyber range scenarios to perform defensive cyber operations, red‑team/blue‑team exercises, incident response drills, and mission rehearsal activities. The cyber range can ingest telemetry, logs, and alerts generated by AWS‑hosted systems—including outputs from Amazon CloudWatch, AWS-native security services, or customer-deployed security tools operating in AWS—to drive real‑world detection, analysis, and response workflows. Exercise data, artifacts, and scenario outputs can be exchanged with AWS environments using standard AWS services such as Amazon S3 for data transfer and AWS Key Management Service (AWS KMS) for cryptographic key integration where customer policies require it. This model enables customers to safely train personnel, validate tools, and rehearse cyber missions against realistic AWS‑based environments—while keeping the cyber range itself isolated, controlled, and deployable in accordance with customer security, compliance, and architectural constraints.

    Highlights

    • High-Fidelity Simulation: Replicates realistic IT and OT, including Industrial Internet of Things (IIoT) systems, to test against real-world threats without risking production environments.
    • Comprehensive Training & Testing: Enables hands-on cybersecurity exercises, including malware, ransomware, and phishing, helping teams develop and refine incident response, penetration testing, and forensic skills.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    For support please email us at CyberRange@us.kbr.com