Overview
Product Information on Cymulate Exposure Management Platform
What is Cymulate Exposure Management Platform?
Cymulate Exposure Management Platform Pricing
Cymulate Exposure Management Platform Product Images



Overall experience with Cymulate Exposure Management Platform
“Truly exceptional!”
“Easy Setup and Simulation Features Helped With Exposure Management Decision Making”
Badges
Adversarial Exposure Validation
About Company
Company Description
Cymulate’s cybersecurity risk validation and exposure management solution provides security professionals with the tools to continuously challenge, validate, and optimize their on-premises and cloud security postures. The platform offers end-to-end visualization across the MITRE ATT&CK framework, enabling a clear view of potential threats and vulnerabilities. With automated, expert, and threat intelligence-driven risk assessments, Cymulate is simple to deploy and accessible to organizations at any level of cybersecurity maturity. In addition, it features an open framework that supports the automation of red and purple teaming exercises, allowing security teams to generate tailored penetration scenarios and advanced attack campaigns that align with their unique environments and security policies. By leveraging these capabilities, organizations can proactively identify and address security gaps, ensuring a stronger, more resilient cybersecurity posture.
Company Details
Do You Manage Peer Insights at Cymulate?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Cymulate Exposure Management Platform
Reviewer Insights for: Cymulate Exposure Management Platform
Deciding Factors: Cymulate Exposure Management Platform Vs. Market Average
Performance of Cymulate Exposure Management Platform Across Market Features
Cymulate Exposure Management Platform Likes & Dislikes
Continuous improvements and developments. Immediate Threat feature is incredibly useful for our CTEM approach. The UI has improved a lot with 2.0, for instance we can now track our posture for specific APTs or based on geography.
Was easy to use and setup and did meaningful simulations to use for exposure management and provided actual insights and solution within the platform on how to resolve these exposures.
We value the real world threat relevance. And the Immediate Threats module consistently mirroring current campaigns, giving us confidence that our controls are tested against what adversaries are actually using. This has helped us validate endpoint resilience while exposing gaps. - Customer success engagement has been responsive and proactive, especially when we needed quick fixes and guidance.
Previous UI had some minor difficulties trying to find what we were looking for, but with 2.0 that's been fixed and it works like a charm, yet I would love to see more art in it:)
Overall we found insights sometimes lacked a prioritization method on what actions should be taken first with us sometimes disagreeing on criticality or just ease of implementing solutions. In addition we had some trouble implementing our own simulations as we wanted to target certain vulnerabilities we were made aware of in other tests but the learning curve behind building these was very big. We found that for the amount we paid for this product it was not worth keeping as we did not see enough return value while we had other solutions to help manage our exposure.
I do not have any dislikes at this time.
Top Cymulate Exposure Management Platform Alternatives
Peer Discussions
Cymulate Exposure Management Platform Reviews and Ratings
- HEAD OF INFORMATION SECURITY1B-10B USDEnergy and UtilitiesReview Source
Truly exceptional!
Cymulate has enabled us to maintain a strong security posture. We can easily track our score changes even if we apply a new change whether it is planned, unplanned, or accidental which gives us a real peace of mind. Hopper module helps us track significant problems in our networks where human error is more likely to occur. We appreciate how it visualizes our security posture from the outside in, covering phases like initial foothold, execution, C&C, network propogation and action on objectives. User management for our subsidiaries is perfect; as the parent company we can view our subsidiaries' scores while they can't see ours. - Manager, IT Security and Risk Management1B-10B USDBankingReview Source
Immediate Threats Feature Accurately Maps Current Campaigns, Exposing Security Gaps
Cymulate breach and attack simulation platform has given us timely and realistic tests of our controls and a clear lens on where we're exposed. The immediate threats content has been strong and relevant. An execution has been largely non disruptive to endpoints. - Current threat simulations driven by immediate threats intelligence have reliably mapped to real campaigns and techniques. And point controls generally prevented those payloads, which validated our endpoint posture while highlighting gaps we needed to close. - Actionable reporting has been good enough for weekly readouts and comparisons with our detection stack. We value simulate for surfacing concrete near term exposures and for helping us validate control layers quickly. - IT Security & Risk Management Associate50M-1B USDFinance (non-banking)Review Source
Essential tool to test the cybersecurity posture and countermeasure il place; deep know-how needed to understand findings and remediation action to take to improve
It is very useful in evaluate and monitoring continuously the cybersecurity of the Organization; the new interface BAS 2.0 is good, more easy to use; assessments can be quickly scheduled using the "best practice" scenarios and itis also possible to configure them taking advantage of the granularity , even if it is not immediate because of the many options/choises available. - Cybersecurity Analyst1B-10B USDManufacturingReview Source
Easy Setup and Simulation Features Helped With Exposure Management Decision Making
We tried the product for two years and was not as useful as we liked extracted value out of it but was not necessary to continue using. - Manager, It Security And Risk Management50M-1B USDTravel and HospitalityReview Source
Rapid Threat Updates and Ease of Integration Balanced by Cloud Limitations
We use this product to simulate attacks on end-user computers and email systems. The new interface is quite successful. It's much faster. We also use it as a CTI system to feed SOAR systems. It can also perform matching with the MITRE attack database to determine how to take precautions against threats. I also consider its ability to work quickly and continuously to be one of its most important features.


