Now serving India's leading defence, banking, and critical infrastructure organizations. Request a Demo

Plans & Deployment

Choose Your Deployment Model

From cloud-hosted training academies to air-gapped sovereign defence programs. Every deployment model delivers real infrastructure, real attacks, and measurable readiness.

Three Deployment Models

Same platform. Same capabilities. Deployed the way your security posture demands.

Managed SaaS

Ready in hours

Multi-tenant cloud deployment with full isolation. Fastest path to operational readiness.

  • 850+ exercises across 12 categories
  • All 5 exercise families (CTF, CDX, ADX, TLX, Crisis Sim)
  • Multi-tenant isolation (VXLAN, Keycloak, DB partitions)
  • Browser-based lab access
  • Auto-grading and skill tracking
  • SSO / SCIM integration
  • REST API and webhook access
  • Standard SLA with email and chat support

Ideal for: Universities, training academies, mid-size enterprises

Contact Sales
Most Popular

Private Cloud

Your infrastructure, our platform

Dedicated deployment on your private cloud or data center. Full control with managed operations.

  • Everything in Managed SaaS
  • Dedicated compute and storage
  • Custom network topology and firewall rules
  • White-label branding (41 theme presets)
  • Custom exercise creation with Exercise Studio
  • MITRE ATT&CK and NICE framework mapping
  • Advanced analytics and readiness scoring
  • Dedicated support engineer with 4-hour SLA

Ideal for: Enterprises, banks, government agencies, SOC teams

Request Proposal
Sovereign

Sovereign On-Premises

Air-gapped. Classified. Yours.

Fully air-gapped deployment on your classified or restricted networks. Zero external dependencies.

  • Everything in Private Cloud
  • Complete air-gap / offline operation
  • Source code access and security audit
  • Resident engineering team on-site
  • CERT-In / NCIIPC audit compliance
  • Co-development partnership
  • Multi-domain (Cyber + OT/ICS + RF/EW)
  • Custom exercise families and scenarios

Ideal for: Defence forces, intelligence agencies, critical infrastructure operators

Request Briefing

Included in Every Deployment

Every deployment model delivers the full power of Critical Range.

5 Exercise Families

CTF Challenges, Battle Stations (CDX), Wargames (ADX), Training Courses, and Crisis Simulator — all natively built.

850+ Exercises

Web security, network defence, forensics, reverse engineering, OT/ICS, cryptography, and more. Beginner to expert.

200+ Concurrent Users

Per-participant dynamic flags, isolated lab environments, and real infrastructure at enterprise scale.

Open Architecture

Built on OpenStack, Terraform, Keycloak, PostgreSQL. Open protocols: STIX/TAXII, xAPI, SCORM, LTI, OIDC.

AI-Powered Training

Adaptive difficulty, intelligent hints, personalized learning paths, and AI-generated after-action reviews.

Compliance Evidence

Automated compliance mapping for CERT-In, RBI, SEBI, NCIIPC, DPDP, ISO 27001, NIST CSF, and more.

Proven Results

68%
MTTD Improvement
Average across deployments
85%
Skill Retention
At 6 months (vs 23% classroom)
3-8x
Cost Advantage
Vs foreign platforms
42,000+
VM Scale Proven
In production deployments

Frequently Asked Questions

Everything you need to know about deployment, capabilities, and support.

Ready to Build Cyber Readiness?

Talk to our team. We'll recommend the right deployment model based on your mission, scale, and security requirements.