What CENTS can do for you!
Cyberoperations Enhanced Network and Training Simulators (CENTS®) is the single most powerful and effective suite of tools ever developed to prepare for even the most cunning and
sophisticated cyber attack.
Identify Security Weaknesses
Powerful emulation tools with the ability to stress and test a network to evaluate potential operational and security weaknesses.
No suite of products better prepares cybersecurity operators to identify, isolate, remove, and recover from a cybersecurity attack.
Validate your Preparedness
Operational assessments including Certification and Accreditation support to improve processes, procedures, checklists, and guidance.
The most powerful and advanced tools in the cybersecurity industry for detecting and defending against cyber criminals.
Right now there are two kinds of big companies in the U.S. — those that have been hacked, and those that are about to be!
James Comey FBI Director
Cybercrime has become so pervasive, and so lucrative, it is the new face of Organized Crime worldwide.
Jeh Charles Johnson Secretary of the Department of Homeland Security
U.S. computer networks and databases are under daily cyber attack by nation states, international crime organizations, subnational groups, and individual hackers.
John O. Brennan Director, Central Intelligence Agency
What we offer
CENTS® products are powerful emulation tools that provide an organization with critical benefits
Support multiple tier: Single Domain/Location, Multi-Tier
Simulated Internet and Root DNS
Realistic Multi-hop Routing using dynamic routing protocols; multi-layer websites; addresses and websites resolve in DNS
True-life System Response
Drill-down to the OSI Layer 2; devices/applications are configurable; events occur in real time; users/systems must take corrective actions executed in real-world ops
Support different missions including training, T&E, target development rehearsal, proof of concept
RFC compliant; dynamic traffic flow; traffic density is customer configured
Indications and warnings map to unique system configuration; mitigation steps map to customer TTP