Secure Sandbox is ideal for use by an instructor or school for cybersecurity training. It can come fully stocked with tools and targets, allowing for a full range of security exploration in a safe, secure environment. Access to the Sandbox is controlled completely by the instructor, who can create and administer course material.
Your organization can run your own red team-blue team cybersecurity excercise by using the Alphaville cybersecurity training environment in the Secure Sandbox. Alphaville is a simulation environment that features computing resources that are typically found at a city hall, police station, power plant, library, and school.
FOR SOFTWARE TESTING
Since the Secure Sandbox is isolated and not connected to the Internet or other production networks, it is ideal for for testing against live security threats, such as malware, viruses, rootkits and more. It is perfect for testing software vulnerabilities and capabilities.
Bring your IT staff to compete as the Blue Team and defend Alphaville from a Red Team of hackers intent on disrupting communications, stealing critical information or intellectual property, and causing mayhem for political reasons. These exercises create a demanding atmosphere that stresses team communication and documentation in addition to individual skills.
Under the pressure of a timed free-for-all, teams need to penetrate systems, plant their flag, secure the system, and move on. Teams can attack each other, replacing one flag with an opponent’s. The team with the most flags left planted when time is called wins the day.
Alphaville is also an excellent venue for Capture the Flag exercises. Individual participants use penetration testing and forensic skills to gather clues and collect evidence. A self-paced exercise, the CTF is a means to assess individual skills across a broad range of systems and challenges.
Based on NICE Framework
The Michigan Cyber Range provides a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE). The NICE framework organizes the skills that America’s cybersecurity workforce requires to support the National Preparedness Goals of detecting, mitigating, and defeating malicious actors and cyber-based threats.
A Cyber Range Hub is a place where IT professionals and students can obtain cybersecurity certifications to further their careers. There are over 20 different certifications available through the Michigan Cyber Range‘s curriculum providers.
IT professionals acquire valuable cybersecurity knowledge and hands-on experience at a Cyber Range Hub.
IT professionals can test their skills and expertise during cybersecurity exercises within the Michigan Cyber Range’s Alphaville training environment.
A Cyber Range Hub has a secure, dedicated connection to the Michigan Cyber Range’s infrastructure and Alphaville environment.
A Cyber Range Hub is a place where businesses can conduct security reviews and validation checks on software and cybersecurity products.
Organizations can lease virtual space within a secure sandbox that’s stocked with hardware and software.
The location will be a focal point in its community, enabling job and economic development.
Cybersecurity personnel are in high demand, and a Cyber Range Hub can help to educate IT professionals interested in pursuing a cybersecurity career.
Reduce the complexity associated with managing your IP network firewall.Customize Security Policies
Defined levels of security for users and applications.
Industry Leading Technology
Proven and reliable hardware and software.
DMZ and Extranet support on most models.
Available including client-to-site and site-to-site.
Duo gives you insight into the devices, operating systems and software that are accessing your apps. Plus you can restrict access to your applications based on the health of your users’ devices and other settings. With Duo you can identify corporate-owned vs. personal devices and block untrusted endpoints based on certificates to ensure only Trusted Devices access your applications.
One password that grants you access to all your organization’s platforms.
Share access to mission critical resources and content across many organizations.
Cut back on your access-related support costs and reduce administrative workload.
Using Merit’s trusted, secure infrastructure, your personal data is protected while eliminating redundant security principals for every organizational relationship.
- Active Directory / LDAP Integration means control remains with Member organization.
- Merit can provide Hosted Authentication, creating and hosting an Identity Provider on behalf of the Member for a small annual fee.
- Merit facilitates the relationship between Service Providers and Identity Providers.
- Uses SAML, an open standard for exchanging authentication and authorization data between security domains, or between an Identity Provider and a Security Provider.
- Merit Professional Services are available for organizations needing assistance in bringing up an Identity Provider on their own.
Highest Possible Encryption Levels
Your site or server is secured with full 128/256 bit encryption, 2048 bit signatures, and verifies your business credentials in real time for every visitor.
Comodo’s root certificates are embedded in all major browsers and devices.
Industry Leading Expert Support
First class technical support for any issues or questions you may have during any part of the application, installation or life-cycle of your SSL Certificate.
Highest Possible Encryption Levels
Comodo SSL certificates are trusted by 99.9% of the Internet population.
Merit can provide port scans amd system assesments to improve the security of your network.
Secure Network Engineering
We are experts in network engineering. Merit can help design, install and securely configure your local area or wide area networks.
Merit is available to assist you with networking questions, help you in understanding your traffic patterns, and securely optimize your network connections.
Merit offers virtualization service packages that include software implementation and hands-on training.