Weapons for controlled high-volume cyberattacks
Rugged Tooling has sold its heavy-duty IP network emulators, load generators and monitors to 12 countries, most recent customers being NATO, Sandvik, Ericsson and Nokia.
From critical infrastructure to telecom, operational technology and authorities, customers do trust our solutions to improve security, robustness, and quality of IP based devices, networks, and services. In addition, Cyber range operators use our solutions to create very challenging real-life training scenarios with overloaded networks and versatile anomalies.
Authorities may use certain features as a cyberweapon.
With our cyberweapons customers make fully controlled high-volume IP cyberattacks with their own and public anomalies. Further information only upon request.
Rude is a man in the middle (MITM) device. It simulates live network conditions by deviating the IP data passing through it. As an example, customers use it for delaying and corrupting Precision Time Protocol (PTP) which is a protocol used to synchronize clocks throughout a computer network, along with deviating other control and user data.
Ruge is an IP load generator. It acts as a traffic source to provide heavy traffic loads, emulated cyber attacks, and malicious traffic for negative testing. As an example, customers use it for load testing and bombarding systems with DDoS attacks.
PreScope® is a cyber security sensor. It monitors and time-stamps high-speed, high-volume internet traffic, and captures any desired data for further analyses. As an example, customers use it in high-volume networks for collecting metadata from selected IP addresses for further correlation analysis.
Our top-class software runs directly on network processors (NPU), without potentially vulnerable operating systems or open-source components. We have developed and know each and every line of code in our tools.
Company nameRugged Tooling
Contact personRisto Kauppi