
Advanced and unique cyber range
JYVSECTEC has developed its own cyber range called RGCE.
National Cyber Range of Finland

Realistic Global Cyber Environment (RGCE) is a comprehensive and unique cyber range which brings together a realistic global world and real organization environments in an isolated private cloud. RGCE provides state-of-the-art training and exercises that immerse people by realistic cyber attacks to train participants on how to properly prepare for, respond to, and manage a wide variety of threats and cyber incidents.

Realistic and secure environment for exercising
RGCE has been used since 2013 in various large-scale exercises, e.g. Finland's national cyber exercises.

Nominated as Finland's national cyber range
Finland’s Ministry of Defence has nominated RGCE as Finland’s national cyber range.

Recipient of Information Security Service recognition
RGCE receives Information Security Service of the year 2022 recognition by The Finnish Information Security Association.
Unique and realistic environment
The architecture and deployment of RGCE has been designed and conducted by JYVSECTEC specialists.

New technologies
More than 7000 different systems, devices, and services running in a private cloud, and it is expanding with new technologies every year.

More For Many
Provides comprehensive platform for all from technical specialists to upper management, to train and exercise organization's capabilities on handling cyber incidents.

Better Cooperation
Provides possibilities for organizations to train co-operation with their service providers and other third-party organizations on handling cyber incidents.
An Environment of Universal Benefit

Cyber security training for teams and organizations

Digital Forensics and Incident Response trainings and exercises

Individual training for cyber security and pen-testing specialists








Ready-made business sector organization environments

Capability for tailored organization environments

Assessments of individual and team cyber security performance


Quote
Thanks to the precision of the modeling implemented in the RGCE, it is possible to conduct exercises that closely mirror reality and also test interdependencies between the technical systems of organizations.
Marko Vatanen
Chief Technology Officer, JYVSECTEC by Jamk


Business sector organization environments
RGCE contains comprehensive environments that represent certain fields of business, their services, and technical environments. This encompasses over 50 custom business sector organizations. The primary architectures of the environment include:

Commerce

Financial Organizations

Critical Infrastructure Organizations

Electricity Company

Internet Service Providers

Cloud Service Provider

Logistics supply chain

Software Company

Healthcare Cyber Security value chain

Research Facility

Security Operations Center

Food Production value chain organizations

Government organizations
Read more about the showcases where we enhanced business sector cyber resilience by creating a unique cyber exercise environment.

Case food supply chain
The food supply chain cyber range is modelled as part of out RGCE environment. Learn more about what the food supply chain cyber range encompasses.


Case healthcare
The healthcare cyber range is modelled as part of out RGCE environment. The exercise environment built for healthcare actors enables practicing anticipation and acting in difficult and extensive cyberattack situations.

RGCE Whitepaper

About us
19.02.2025
Cyber range
White paper
JYVSECTEC CYBER RANGE — RGCE and solutions
Cyber range collaboration
JYVSECTEC has created a network of similar cyber ranges. Get to know the opportunities provided by the community to develop your own and your organisation's competence.
Any questions left?

Marko Vatanen
Chief Technology Officer
+358405458630
firstname.lastname@jamk.fi