Frequently Asked Questions

Product Overview & Purpose

What is Cymulate and what does it do?

Cymulate is a cybersecurity platform designed to help organizations proactively validate their defenses, identify vulnerabilities, and optimize their security posture. It enables continuous threat validation, exposure prioritization, and operational efficiency by simulating real-world attacks and providing actionable insights. [Source]

What is the primary purpose of Cymulate's platform?

The primary purpose of Cymulate's platform is to empower security teams to stay ahead of emerging threats by continuously validating cybersecurity defenses, identifying vulnerabilities, and optimizing security posture across all IT environments. [Source]

How does Cymulate help organizations address cybersecurity challenges?

Cymulate helps organizations address cybersecurity challenges by simulating real-world threats, validating the exploitability of exposures, prioritizing vulnerabilities, and automating remediation processes. This approach improves threat resilience, operational efficiency, and alignment of security strategies with business goals. [Source]

What is Cymulate's vision and mission?

Cymulate's vision is to create an environment where everyone collaborates to make a lasting impact on cybersecurity. Its mission is to transform cybersecurity practices by enabling organizations to proactively validate their defenses, identify vulnerabilities, and optimize their security posture. [Source]

Features & Capabilities

What are the key features of Cymulate's platform?

Cymulate's platform offers continuous threat validation, unified Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), exposure analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, and an extensive threat library with over 100,000 attack actions updated daily. [Source]

Does Cymulate support integration with other security tools?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit our Partnerships and Integrations page.

How does Cymulate automate threat validation?

Cymulate automates threat validation by running 24/7 attack simulations that test security defenses in real-time, leveraging a library of over 100,000 attack actions aligned to MITRE ATT&CK and updated daily. [Source]

What is Cymulate's approach to exposure prioritization?

Cymulate validates the exploitability of exposures and ranks them based on prevention and detection capabilities, business context, and threat intelligence, enabling organizations to focus on the most critical vulnerabilities. [Source]

Does Cymulate provide automated mitigation capabilities?

Yes, Cymulate integrates with security controls to push updates for immediate threat prevention, automating mitigation actions based on validated exposures. [Source]

How does Cymulate support attack path discovery?

Cymulate identifies potential attack paths, privilege escalation, and lateral movement risks through automated testing, helping organizations understand and mitigate complex attack scenarios. [Source]

How often is Cymulate's threat library updated?

Cymulate's threat library is updated daily, ensuring that customers can simulate and defend against the latest threats and attack techniques. [Source]

Implementation & Ease of Use

How easy is it to implement Cymulate?

Cymulate is designed for quick and easy implementation, operating in agentless mode without the need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. [Source]

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive and user-friendly interface. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." [Source]

What support resources are available for Cymulate users?

Cymulate provides comprehensive support, including email support, real-time chat, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for quick answers and guidance. [Source]

How long does it take to start using Cymulate?

Most organizations can start running Cymulate simulations almost immediately after deployment, thanks to its agentless architecture and minimal setup requirements. [Source]

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a personalized quote, you can schedule a demo with the Cymulate team.

How can I get a quote for Cymulate?

You can receive a customized quote by scheduling a demo with Cymulate's team, who will assess your organization's needs and recommend the best package. [Source]

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds several key certifications, including SOC2 Type II (covering security, availability, confidentiality, and privacy), ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to industry-leading security and compliance standards. [Source]

How does Cymulate ensure data security?

Cymulate ensures data security through encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and robust application security practices including secure development lifecycle, vulnerability scanning, and third-party penetration testing. [Source]

Is Cymulate GDPR compliant?

Yes, Cymulate is GDPR compliant. The platform incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). [Source]

What product security features does Cymulate offer?

Cymulate's platform includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), IP address restrictions, and TLS encryption for its Help Center, ensuring robust protection for users and data. [Source]

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. [Source]

What are common pain points Cymulate helps solve?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. [Source]

Are there case studies showing Cymulate's effectiveness?

Yes, for example, Hertz Israel reduced cyber risk by 81% in four months using Cymulate. Other case studies include organizations in finance, healthcare, and energy sectors achieving measurable improvements in security posture. [Source]

How does Cymulate help with compliance for the Hong Kong Protection of Critical Infrastructure Bill?

Cymulate empowers critical infrastructure operators to meet and surpass the Hong Kong Protection of Critical Infrastructure Bill’s strict cybersecurity obligations. For more details, read our whitepaper.

How does Cymulate address lateral movement attacks?

Cymulate provides automated testing for lateral movement and privilege escalation risks. For more information, see the blog post 'Stopping Attackers in Their Tracks' on our blog.

Competition & Differentiation

How does Cymulate differ from other cybersecurity platforms?

Cymulate stands out with its unified platform combining BAS, CART, and exposure analytics, continuous 24/7 threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and proven results such as a 52% reduction in critical exposures and 81% reduction in cyber risk. [Source]

What advantages does Cymulate offer for different user segments?

Cymulate provides CISOs with quantifiable metrics, SecOps teams with automation and efficiency, Red Teams with advanced offensive testing, and vulnerability management teams with automated validation and prioritization. [Source]

How does Cymulate's continuous innovation benefit customers?

Cymulate updates its SaaS platform every two weeks with new features such as AI-powered SIEM rule mapping and advanced exposure prioritization, ensuring customers always have access to the latest capabilities. [Source]

Resources & Education

Where can I find Cymulate's Resource Hub?

Cymulate's Resource Hub is a central location for insights, thought leadership, and product information. Access it at https://cymulate.com/resources/.

Does Cymulate provide a blog and newsroom?

Yes, Cymulate provides a blog for the latest threats and research (our blog) and a newsroom for media mentions and press releases (our newsroom).

Where can I find educational resources like webinars and e-books?

Cymulate offers webinars, e-books, and a knowledge base with technical articles and videos to help users optimize their security validation practices. Visit our Resource Hub for more.

Does Cymulate provide a cybersecurity glossary?

Yes, Cymulate offers a glossary explaining cybersecurity terms, acronyms, and jargon. Access it at our glossary.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

How Cymulate Supports Hong Kong's 2025 Protection of Critical Infrastructure Ordinance

By: Jake O’Donnell

Last Updated: November 16, 2025

image

In March 2025, Hong Kong's Protection of Critical Infrastructure (Computer System) Ordinance was enacted and will go into effect in 2026.  

Critical infrastructure (CI) operators, referring to designated critical infrastructure organizations, face a range of new cybersecurity requirements. These obligations aim to protect the city's essential services from cyber threats by mandating rigorous cybersecurity risk assessments, audits, emergency response plans and more. The primary goal is to minimize essential services disruption from cyberattacks. 

Cymulate is uniquely positioned to help CI Operators meet these requirements effectively and efficiently. Here’s how Cymulate supports organizations in achieving full compliance with the ordinance. 

Demonstrating Compliance with Security Requirements 

The 2025 CII Ordinance mandates a series of assessments, audits and ongoing security management activities which includes penetration testing. Cymulate enables organizations to demonstrate compliance through its exposure management platform, which executes real-world attack tests using the latest threat intelligence to determine if security controls are mitigating these attacks.  Effectively, this serves as continuous automated penetration testing. The continuous piece is critical to demonstrate and ensure threat resilience due to evolving threats and dynamic business and user needs.  Testing results include documented evidence of security control effectiveness. 

  • Section 24: Obligation to conduct computer-system security risk assessments 
  • Section 25: Obligation to carry out computer-system security audits 
  • Schedule 4 & 5: Specifies what must be covered in risk assessments and audits 

By running simulations and generating dashboards and detailed reports, Cymulate delivers organizations documentation for both compliance and risk mitigation efforts, providing proof of due diligence during regulatory reviews. 

Validating Security Controls Effectiveness 

The ordinance emphasizes the ongoing management of security controls for critical systems. 

  • Section 21(1)(a): Obligation to manage the computer-system security of critical computer systems 
  • Section 23: Requires submission and implementation of a computer-system security management plan 

The Cymulate platform, powered with breach and attack simulation (BAS), integrates and validates the effectiveness of security technologies across device, network, application, data and cloud – verifying whether there is existing prevention and/or detection in place for executed attack tests. This gives CI operators visibility into their exposures/security gaps and supports CI Operators in showing regulators the effectiveness and resilience of their deployed security technologies. 

Identifying and Addressing Vulnerabilities 

The CI Bill requires CI operators to conduct yearly risk assessments to identify system weaknesses that can exploited, prioritize these risks, determine the impacts, understand risk tolerance and develop remediation plans. 

  • Section 24: Requires CI Operators to conduct yearly risk assessments  
  • Schedule 4: Outlines the components for the risk assessment and the required steps CI operators are required to take for identified vulnerabilities and risks. 

With automated exposure management, Cymulate integrates with vulnerability management and asset discovery tools to provide a holistic view of all exposures. This asset exposure data is correlated with threat intelligence, business context and existing prevention and detection findings to calculate true risk scores so CI operators can focus on their exploitable gaps – their most critical risks – to improve threat resilience. This continuously uncovers exploitable vulnerabilities using safe, controlled attack simulation and allows CI Operators to effectively prioritize and remediate with automation before real attackers can exploit them. 

Within the platform, Cymulate offers Custom Attacks that streamline the creation of relevant, sophisticated attack simulations. With a user-friendly platform, security teams can quickly build, customize and reuse advanced individual or chained attack simulations. 

Risk Assessment with Real-World Simulations 

Understanding theoretical risks isn't enough. Cymulate shows how real threats behave in your environment, providing an evidence-based picture of your current security posture and gaps. 

  • Section 24: Risk assessments must consider potential threats and system vulnerabilities 
  • Schedule 4: Requires vulnerability and impact assessments 

With attack scenarios tailored to emerging threats, Cymulate enables organizations to quantify their risk exposure. Its Phishing Simulation Add-on plays a vital role by assessing employee susceptibility to social engineering, one of the most common attack vectors. 

These phishing campaigns measure employee risk exposure, directly contributing to the required assessment under Section 24 and Schedule 4. 

Cymulate also offers Attack Path Discovery to safely test for lateral movement, uncover hidden attack paths and identify real-world exposures. It delivers actionable visibility into security gaps — prioritizing remediation based on actual risk, not assumptions. This way you'll validate whether or not attackers can successfully move across your network, compromise user credentials and access sensitive data. 

Incident Response Readiness Testing 

To comply with emergency preparedness mandates, CI Operators must regularly test their incident response capabilities. 

  • Section 27: Requires submission and implementation of an emergency response plan 
  • Schedule 3: Defines the policies and incident handling guidelines required 

Attack Simulation from Cymulate evaluates how well incident response plans hold up under pressure. By simulating a ransomware outbreak, privilege escalation or lateral movement, Cymulate helps uncover gaps in detection, response and recovery — allowing CI Operators to enhance their playbooks accordingly. 

Enhancing Cybersecurity Awareness & Training 

Simulations not only assess infrastructure but also serve as training tools. They provide real-time feedback and educational value to SOC teams and broader security personnel. 

Cymulate empowers security teams with: 

  • Insight into real-world attack paths 
  • Understanding of attack detection and response weaknesses 
  • Awareness of human factors in phishing and social engineering scenarios 

This aligns with the ordinance’s overarching goal of raising cybersecurity maturity across all levels of an organization. 

Continuous Improvement of Security Posture 

Compliance is not a one-time event. The CII Ordinance encourages ongoing improvement of cybersecurity frameworks and controls. 

Cymulate supports this by: 

  • Continuously testing existing and newly deployed controls 
  • Providing prioritized remediation guidance 
  • Monitoring for security drift and reporting on trends 
  • Delivering metrics and dashboards for executives and regulators alike 

By identifying where CI Operators are most vulnerable with actionable dashboards and remediation guidance, Cymulate ensures that organizations not only meet the baseline for compliance, but also continuously evolve their posture to stay ahead of adversaries. This complies with the CI Bill to minimize service disruption from cyberattacks. 

Final Thoughts 

Hong Kong’s 2025 CII Ordinance places cybersecurity at the core of national resilience. As CI Operators race to meet the technical and procedural requirements of the law,  Cymulate offers a practical, powerful toolkit easy to implement and execute for achieving and maintaining compliance. With ease of use and AI and automated features, Cymulate makes automated exposure validation achievable for all organization sizes and technical maturity levels. 

From risk assessments and automated vulnerability assessments (Section 24) to audits (Section 25), from security management plans (Section 23) to incident response readiness (Section 27) Cymulate supports the full compliance lifecycle with real-world simulations, actionable insights and measurable outcomes

For CI Operators in Hong Kong, Cymulate isn't just a compliance enabler — it's a strategic cybersecurity partner for the future. 

If you’re looking for more information on the ordinance, we can help. 

Join Ensign and Cymulate for a focused 40-minute session designed for cybersecurity leaders, compliance owners and CII operators across the Greater China Region. 

In this session, you’ll learn: 

  • Ensign’s latest insights from the Cyber Threat Landscape 2025 report 
  • How organizations in Hong Kong can prepare using MITRE ATT&CK 
  • What “threat-informed defense” means for CII operators, today 
Watch Webinar
Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo