Choose Your Deployment Model
From cloud-hosted training academies to air-gapped sovereign defence programs. Every deployment model delivers real infrastructure, real attacks, and measurable readiness.
Three Deployment Models
Same platform. Same capabilities. Deployed the way your security posture demands.
Managed SaaS
Ready in hours
Multi-tenant cloud deployment with full isolation. Fastest path to operational readiness.
- 850+ exercises across 12 categories
- All 5 exercise families (CTF, CDX, ADX, TLX, Crisis Sim)
- Multi-tenant isolation (VXLAN, Keycloak, DB partitions)
- Browser-based lab access
- Auto-grading and skill tracking
- SSO / SCIM integration
- REST API and webhook access
- Standard SLA with email and chat support
Ideal for: Universities, training academies, mid-size enterprises
Private Cloud
Your infrastructure, our platform
Dedicated deployment on your private cloud or data center. Full control with managed operations.
- Everything in Managed SaaS
- Dedicated compute and storage
- Custom network topology and firewall rules
- White-label branding (41 theme presets)
- Custom exercise creation with Exercise Studio
- MITRE ATT&CK and NICE framework mapping
- Advanced analytics and readiness scoring
- Dedicated support engineer with 4-hour SLA
Ideal for: Enterprises, banks, government agencies, SOC teams
Sovereign On-Premises
Air-gapped. Classified. Yours.
Fully air-gapped deployment on your classified or restricted networks. Zero external dependencies.
- Everything in Private Cloud
- Complete air-gap / offline operation
- Source code access and security audit
- Resident engineering team on-site
- CERT-In / NCIIPC audit compliance
- Co-development partnership
- Multi-domain (Cyber + OT/ICS + RF/EW)
- Custom exercise families and scenarios
Ideal for: Defence forces, intelligence agencies, critical infrastructure operators
Included in Every Deployment
Every deployment model delivers the full power of Critical Range.
5 Exercise Families
CTF Challenges, Battle Stations (CDX), Wargames (ADX), Training Courses, and Crisis Simulator — all natively built.
850+ Exercises
Web security, network defence, forensics, reverse engineering, OT/ICS, cryptography, and more. Beginner to expert.
200+ Concurrent Users
Per-participant dynamic flags, isolated lab environments, and real infrastructure at enterprise scale.
Open Architecture
Built on OpenStack, Terraform, Keycloak, PostgreSQL. Open protocols: STIX/TAXII, xAPI, SCORM, LTI, OIDC.
AI-Powered Training
Adaptive difficulty, intelligent hints, personalized learning paths, and AI-generated after-action reviews.
Compliance Evidence
Automated compliance mapping for CERT-In, RBI, SEBI, NCIIPC, DPDP, ISO 27001, NIST CSF, and more.
Proven Results
Frequently Asked Questions
Everything you need to know about deployment, capabilities, and support.
Ready to Build Cyber Readiness?
Talk to our team. We'll recommend the right deployment model based on your mission, scale, and security requirements.