Software Licensing at the Speed of Cyber
On-demand technologies for training, testing, and development
The new standard in software licensing
Simple. Flexible. Fast.
r4's API-based software licensing services remove the friction and complexity associated with purchasing, deploying, and managing software. We work with technology suppliers and distributors so organizations who run on r4 don't have to.
Who is r4 built for?
Security Practitioners
Build replica networks to prepare for real-world threats. Conduct red/blue exercises and execute training to improve detection and response capabilities.
Network Architects
Gain quick access to dozens of technologies for designing and testing networks in low-risk environments prior to production implementation.
Software Developers
Automate tech stack deployments for new projects with r4 and make repetitive SaaS registration and onboarding a thing of the past.
Technical Leadership
Select and deploy a wide range of software for testing security controls and incident response capabilities, product evaluations, and large-scale exercises.
Modular Solutions
A fully integrated suite of software procurement and management products
Swiftly deploy and customize software in minutes, across diverse environments, for any duration. Streamline cyber training, testing, and development with our modular solutions.

Configs

Assets

Licenses

SER

Licenses
Obtain and manage non-production licenses efficiently
Easily request, store, update and track software licenses, license entitlements, subscriptions, and related files.
Explore Licenses
Assets
Access a vast library of virtual appliances and container images
Maintain a continuously updated collection of cyber range assets to meet any need.
SaaS Estate Ranges (SER)
Deploy SER to mimic enterprise environments
Quickly generate and configure SaaS estates for identity-based attack and defense training and development.
Configs (future development)
Configure devices automatically and uniquely
Eliminate manual setup of assets in any cyber range platform using r4's config management solution.
Benefits for government organizations
1
2
3
4
5
6
7
1
Cut commercial software license costs
Pay prices that make sense for cyber ranges with consumption-based and non-production use pricing.
2
Directly license and provision technologies as you need them
No more prolonged quote and deal process. Select and instantly deploy software.
3
Central repository for storing and accessing software
Store license keys, tokens, account credentials, virtual appliances, and more in r4 Vaults.
4
Track, edit, and renew software licenses with ease
Manage and monitor all of your non-production software licenses in one place.
5
Tap cyber range engineering experts for projects
Rely on r4 for range design, development, configuration, and consulting.
6
Efficiently re-allocate software licenses
Move licenses between people, deployments, and platforms.
7
Incorporate SaaS environments
Launch SaaS attack surfaces for exercises and training.
Use cases
1
Cyber Exercises
Leverage commercial enterprise software in cyber range environments for realistic, relevant exercises.
2
Training Courses
Procure security tools and integrate them into hands-on academic material.
3
Mission Rehearsals
Use specific technology versions to create replica environments that look and feel like target networks.
4
RDT&E
Create new detection logic, tune tools in a low-risk environment, and test mission support systems.
Support for any environment
Private Cloud
Public Cloud
Air Gapped
Classified
License any network infrastructure, security, or IT tool in minutes
We partnered with software manufacturers, software distributors, and cyber range platforms to offer you on-demand access to enterprise technologies.
By removing the friction typically associated with launching and configuring commercial software in non-production environments, r4 allows you to focus on pushing the boundaries of cyber training, test, and development.
How licensing works
1
Select software to use in cyber range platforms
Choose from dozens of network infrastructure, security, and IT solutions. Customize each selection – product features, deployment type, and quantity.
2
Files and software account credentials automatically appear in your Vaults
Access virtual appliances, container images, config management scripts, and SaaS-based software account credentials conveniently organized and stored in Vaults.
3
View and manage all of your licenses in one place
Turn consumption-based licenses on or off, increase or decrease the number of active licenses, extend term-based agreements, and add new software to your existing account at any time.
4
Consumption and term-based Licensing costs are billed monthly
No need to pay multiple resellers or technology vendors, request quotes, or re-negotiate contracts. We pass our partner pricing on to you and bill your card or deduct from your balance on a monthly basis.
Diverse asset catalog
We're automating content management for Cyber Range Platforms. White label r4 and offer your customers a cyber range asset catalog with continuously updated and ready-to-deploy virtual appliances, containers, and SaaS tenants.
Networking Devices
Virtual endpoints, firewalls, routers, load balancers, servers, WAN, workload management, and more.
IT Software
Apps for file storage, ITSM, observability, email, devSecOps, CRM, HR, databases, and more.
Security Tools
IdP, asset management, endpoint, threat detection and response, VPNs, vulnerability management, and more.
Technologies we offer
ENDPOINT SECURITY
Next-generation Firewall (NGFW)
Security Information and Event Management (SIEM)
Operational Technology (OT) Security
Network Security
Vulnerability Management
Endpoint Devices
Information Technology Service Management (ITSM)
Email Security
App Security
Identity Security
Microsegmentation, ZTNA, SWG, SASE
Security Testing
Data Loss Prevention (DLP)
Virtual Routers
Observability
Enterprise Resource Planning (ERP)
Workforce Management
SaaS Estate Ranges (SER)
Modern networks look different. Your cyber ranges should, too. With r4, you can instantly deploy and configure SaaS applications to mimic an enterprise environment. Practice identity attack and defense techniques, test drive SaaS products, or add a cloud attack surface to your cyber exercise using SER.
Modern Environments
Rapidly deploy SaaS applications to mimic enterprise networks.
Practice Scenarios
Test identity attack and defense techniques in realistic settings.
Cloud Integration
Add cloud attack surfaces to cyber exercises seamlessly.