Review Summary
See a synthesized overview of the key takeaways from verified reviews of XM Cyber Exposure Management Platform.
See a synthesized overview of the key takeaways from verified reviews of XM Cyber Exposure Management Platform.
XM Cyber is a continuous exposure management company that focuses on reducing risk by focusing on the fixes with the highest impact on risk. XM Cyber provides a transformative approach to exposure management by identifying potential vulnerabilities, identity exposures and misconfigurations in AWS, Azure, GCP, and on prem environments. Mapping all potential attack paths into an attack graph allows prioritizing exposure remediation based on its exploitability and impact on critical assets. The primary objective is to facilitate the most effective remediation of exposures with minimum effort. XM Cyber has expanded its operations to North America, EMEA, APJ, and LATAM.
Do You Manage Peer Insights at XM Cyber?
Access Vendor Portal to update and manage your profile.
What we appreciate most about the product is its entirely virtual approach, which allows us to simulate attack scenarios without impacting the production environment. This makes it possible to identify and analyze risks securely, without disrupting ongoing operations or exposing systems to direct modifications. This ability to test continuously, without intrusion or side effects, is particularly reassuring and makes it easier to involve teams in a proactive approach to improving security.
scenario
The monthly support calls with our personal support contact give us insights into the generated reports of items or areas we may have missed while also keeping us up to date on new or extra features that XM Cyber are developing and/or fixes for issues that we may have brought up or that were noticed by other customers that may also affect us.
What we appreciate least is primarily the initial learning curve and the platform's extensive functionality, which can sometimes make it a bit complex to get to grips with at first. Interpreting the attack paths and recommendations requires some time to adapt in order to fully grasp their value.
Limited costomization options in some advanced features
There is a lot of information that can come out of the system and while it does a good job of trying to break the whole picture down into manageable chunks, sometimes it can be hard to find that one piece of information you may require.