If you have been following our blog, you know that we normally cover the latest trends in cybersecurity, discuss data breaches, and explain compliance issues. This time, I wrote a blog post that is different from my usual ones.
Why? Well, I want to share with you that Cymulate has been recognized by Gartner as a Cool Vendor in Application and Data Security for 2018. Needless to say, the whole Cymulate team is proud of this achievement. What is especially notable, is that Cymulate is the only BAS vendor cited in this year’s report. To quote: “Cymulate offers immediate benefits by automating the process. Having access to more near-real-time security status is an important attribute for security programs because the threat landscape is changing faster than the standard interval used with penetration and more traditional red team exercises”.
Gartner’s Cool Vendors report also mentions that “By 2021, requirements for greater efficiency in threat response will drive 20% of buyers to heavily weight automation in buying criteria. By 2020, 25% of new digital business initiatives will adopt a continuous, adaptive risk and trust
assessment (CARTA) strategic approach, which is an increase from fewer than 5% in 2017.” Being named a ‘Cool Vendor’ validates our mission to improve the way companies test their security posture and verify their resiliency to cyberattacks at any time, from anywhere. It shows that our Breach & Attack Simulation Platform not only meets the needs of our customers but even exceeds their expectations.
So what’s “cool” about Cymulate as a vendor? Well, we believe that we are a Cool Vendor since we identified a gap in the market and provide a solution that meets that need. To specify, we enable any organization, regardless of its size or industry, to assess its security posture at any time from an attacker’s perspective regardless of whether such an attacker is a common cybercriminal, a malicious hacker, or a professional cybercrook. Best of all, it is done in a very simple way without requiring the organization to allocate extensive resources in time, money, or manpower.
How Do We Do It?
Our automated BAS platform enables business and IT personnel to find out if their current security framework is vulnerable to a number of attack vectors that are used daily by attackers. These vectors relate to email, browsing, phishing, lateral movement, endpoint compromise, and data exfiltration. We also provide intelligence capabilities that inform our customers about zero-day attacks as well as the latest cyberattacks which are out in the wild. The assessments correlate different payloads and attack techniques across multiple parameters in real-time to alert the organization regarding its exposure and resiliency level to cyberattacks. Furthermore, suggestions are made regarding what action is needed to mitigate found exposures.
More Information
- Read the full report “Cool Vendors in Application and Data Security, 2018,” authored by Ayal Tirosh, Neil MacDonald, Jeremy D’Hoinne, Dale Gardner, Pete Shoard and Tricia Phillips, 04 May 2018 (requires Gartner subscription).
- Read the press release here
- Read more about the Cymulate solution here
- Request a demo
Disclaimer:
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.