Adobestock 208821059 (1)

what is Pattern of Life?

Empowering cyber resilience

Cyber security is critical for all organisations to ensure they are resilient to attack. Your team and technology are the first line of defence. With the upcoming Cyber Security and Resilience Bill likely to drive regulations around cybersecurity, now is the time to put in place appropriate training systems.

Cyber ranges provide a controlled, simulated environment to test, train and drill network security teams, from realistic live-fire training drills to competitive threat-hunting and capture-the-flag exercises. For maximum trainee benefit, the more realistic the training environment, the better the results.

That’s where Roke’s Pattern of Life software comes in. Providing the ability to quickly generate thousands of virtual humans to create realistic internet traffic as part of an existing cyber range, Pattern of Life improves your cyber resilience in a secure environment.

High-fidelity

Pattern of Life’s automation is truly representative of user activity, unlike traffic generators that simply create packets on the network. This is achieved by emulating mouse and keyboard input to drive actual applications - just as if a human were interacting with them. 

Trainees experience an immersive environment with virtual humans using real IT applications, processing written information, creating documents and replying to emails and instant messages with representative content generated by large language models (LLMs). These virtual humans can also click on phishing links, download malware and upload files that hackers have planted.

Flexible

Pattern of Life emulates use of multiple applications, enabling a rich tapestry of virtual user activity across both Windows and Linux. Pattern of Life is also configured to accommodate a range of LLMs for content generation – whether customer-supplied, open source or proprietary. 

Designed to integrate into existing cyber ranges, Pattern of Life enriches training environments providing the confidence and skills to deal with any threat.

User activity can be configured to represent different user types, such as office workers or administrators, as well as varying activity throughout the working day.

Roke's established framework for developing new agents enables Pattern of Life to accommodate requests for interaction with new applications and the generation of traffic from novel devices, such as Supervisory Control and Data Acquisition (SCADA) agents and Industrial Control Systems.

Scalable

Pattern of Life scales to meet your cyber exercise and training requirements, and has been used to generate thousands of emulated users. Pattern of Life includes templates for quick configuration of user behaviour, enabling ease of set up.

Proven

Roke has supported UK government clients for many years in their use of Pattern of Life during tailored large-scale cyber exercises, as well as routine cyber training. Roke provides a product support package that ensures peace of mind for commercial partners and end-users, providing guidance and dedicated customer service throughout. 

Benefits

Richer user experience in cyber ranges to improve training outcomes, saves time and money and equips IT professionals to respond to real attacks 

Provides more realistic environment for testing cyber security solutions, especially where application-layer activity or realistic network events are important 

Enables research and development of new cyber security techniques, including host-based monitoring and insider threat detection 

A proven product which is used by various government agencies

Adobestock 178115326 (1)

end-to-end solutions

Professional services

Our pedigree in cyber security and networking means that we can provide end-to-end solutions for cyber range development and operation. 

Combining a range of expertise, skills and talents, we'll consider the fundamental requirements and architecture of the solution, then manage the integration with your existing systems and processes. Once the system is in place, our systems engineers will be responsible for monitoring its performance to ensure it’s reliable, stable and performs exactly as you need it to.

Our custom range development capability extends to training and exercise delivery, working alongside trusted partners with deep understanding of cyber threat actors. We can work with you to identify training needs and provide detailed post-exercise reporting to evidence that these have been met. 

For more information on professional services at Roke, please contact: [email protected]

A coder works at a computer

Talk to the experts

Get in touch to learn more about Pattern of Life.

Get in touch