Frequently Asked Questions

Customer Feedback & Success Stories

What do customers say about Cymulate's impact on board-level communication?

Customers report that Cymulate provides comprehensive visibility into their security posture, making it easier to communicate risk and value to the board of directors. One customer shared, “I showed our board of directors the comprehensive visibility that Cymulate provides, and they told me that we needed it before I even had the budget to purchase it.” (Source: Cymulate Blog, Dec 12, 2024)

How does Cymulate help organizations save time and money?

Customers highlight substantial savings with Cymulate, noting that the platform eliminates the need for manual investigations. As one customer stated, “Cymulate saves us a lot of time and money because we don’t need to investigate anything.” (Source: Cymulate Blog, Dec 12, 2024)

What benefits do customers see in maximizing their cybersecurity effectiveness with Cymulate?

Customers appreciate that Cymulate provides actionable insights to close security gaps and optimize existing controls, reducing the need to purchase additional tools. One customer shared, “Cymulate provides us with the insights to close gaps and optimize the controls we already have in our security stack. We don’t need to waste time or money looking for new tools to improve our security.” (Source: Cymulate Blog, Dec 12, 2024)

How does Cymulate support SOC and incident response validation?

Customers value Cymulate's ability to run simulations in real environments, closely mirroring real incident response exercises. As one customer noted, “Running simulations in a real environment is as close as you get to a real incident response exercise.” (Source: Cymulate Blog, Dec 12, 2024)

What do customers say about Cymulate's attack path discovery capabilities?

Customers report that Cymulate provides ongoing insights into potential attack paths and mitigation strategies. One customer stated, “At any given time, Cymulate provides us insights into attacks that can penetrate us and how to mitigate the attack.” (Source: Cymulate Blog, Dec 12, 2024)

How does Cymulate provide prescriptive remediation guidance?

Customers benefit from Cymulate's ability to validate remediation efforts and confirm that controls are functioning as intended. As one user shared, “I can check my remediation efforts, know that I am protected, and that all my controls are working as they should.” (Source: Cymulate Blog, Dec 12, 2024)

What improvements in risk management do customers experience with Cymulate?

Customers report better overall cybersecurity management, with improved risk management processes and decision-making. One customer said, “Cymulate improved our risk management process and decision-making.” (Source: Cymulate Blog, Dec 12, 2024)

How do customers rate Cymulate's customer support?

Cymulate's customer support is highly praised, with one customer stating, “I have never worked with a better customer success team.” (Source: Cymulate Blog, Dec 12, 2024)

What types of security gaps have customers discovered and remediated with Cymulate?

Customers have identified and quickly remediated issues such as admin rights on backup tasks, DNS tunneling risks, data exfiltration via Telnet, and successful spoofed email simulations. These discoveries help prevent data loss, service disruption, and phishing attacks. (Source: Cymulate Blog, Dec 12, 2024)

How do customers describe the overall value of Cymulate's technology?

Customers affirm that Cymulate provides meaningful benefits to business operations, offering a breadth and depth of security and business solutions that address real-world challenges. (Source: Cymulate Blog, Dec 12, 2024)

What do customers say about the ease of use of Cymulate?

Customers consistently praise Cymulate for its intuitive and user-friendly interface. Feedback includes comments such as “It is easy to use and the platform is very easy to understand,” and “Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights.” (Source: Cymulate Demo Page)

How quickly can organizations implement Cymulate and start seeing results?

Cymulate is designed for rapid deployment, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. (Source: Knowledge Base)

What kind of support does Cymulate offer to new customers?

Cymulate provides comprehensive support, including email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for real-time assistance. (Source: Knowledge Base)

How does Cymulate help organizations discover and remediate security gaps?

Cymulate enables organizations to identify and quickly remediate security gaps such as misconfigured admin rights, DNS tunneling, data exfiltration, and phishing vulnerabilities through automated security assessments. (Source: Cymulate Blog)

What are some real-world examples of security issues found with Cymulate?

Examples include discovering admin rights on backup tasks, successful DNS tunneling, data exfiltration via Telnet, and spoofed emails bypassing security controls. These findings allow for immediate remediation. (Source: Cymulate Blog)

How does Cymulate's Exposure Validation feature benefit security teams?

Cymulate Exposure Validation makes advanced security testing fast and easy, allowing teams to build custom attack chains and validate exposures in one place. (Source: Exposure Validation Data Sheet)

What do customers say about Cymulate's dashboard and reporting?

Customers describe Cymulate's dashboard as intuitive and user-friendly, providing high functionality for assessing risk vectors and security posture. (Source: Knowledge Base)

How does Cymulate help with board-level reporting and decision-making?

Cymulate provides quantifiable metrics and comprehensive visibility, making it easier for security leaders to communicate risk and justify investments to the board. (Source: Cymulate Blog)

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, you can schedule a demo with Cymulate's team. (Source: Knowledge Base)

Features & Capabilities

What are the key features of Cymulate's platform?

Cymulate offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. (Source: Knowledge Base)

How does Cymulate help organizations prioritize exposures and vulnerabilities?

Cymulate validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, enabling organizations to focus on the most critical vulnerabilities. (Source: Knowledge Base)

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page. (Source: Knowledge Base)

How does Cymulate automate security validation?

Cymulate automates security validation by running 24/7 attack simulations, integrating with security controls to push updates, and providing automated offensive testing aligned to MITRE ATT&CK with daily threat intelligence updates. (Source: Knowledge Base)

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and compliance standards. (Source: Security at Cymulate)

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and annual third-party penetration tests. (Source: Knowledge Base)

Does Cymulate comply with GDPR?

Yes, Cymulate incorporates data protection by design and maintains a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), to ensure GDPR compliance. (Source: Knowledge Base)

What are the main benefits of using Cymulate?

Cymulate delivers improved security posture (up to 52% reduction in critical exposures), operational efficiency (60% increase in team efficiency), faster threat validation (40X faster than manual methods), cost savings, and enhanced threat resilience (81% reduction in cyber risk within four months). (Source: Knowledge Base)

How does Cymulate support different roles within an organization?

Cymulate provides tailored solutions for CISOs, SecOps teams, Red Teams, and Vulnerability Management teams, addressing their unique pain points and delivering quantifiable metrics, automation, and advanced testing capabilities. (Source: Knowledge Base)

Who can benefit from using Cymulate?

Cymulate is designed for organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. It supports roles such as CISOs, SecOps, Red Teams, and Vulnerability Management teams. (Source: Knowledge Base)

What pain points does Cymulate address for security teams?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. (Source: Knowledge Base)

How does Cymulate compare to other security validation platforms?

Cymulate stands out with its unified platform combining BAS, CART, and Exposure Analytics, continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and measurable outcomes such as a 52% reduction in critical exposures and 81% reduction in cyber risk. (Source: Knowledge Base)

What case studies demonstrate Cymulate's effectiveness?

Case studies include Hertz Israel reducing cyber risk by 81% in four months, a sustainable energy company scaling penetration testing, and Nemours Children's Health improving detection in hybrid environments. See more at the Cymulate Case Studies page. (Source: Knowledge Base)

Where can I find Cymulate's latest news, research, and resources?

You can stay updated through the Cymulate Blog, Newsroom, and Resource Hub for insights, thought leadership, and product information. (Source: Knowledge Base)

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity strategies. (Source: Knowledge Base)

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

What Do Customers Say About Cymulate?

By:

Last Updated: December 12, 2024

Nicknamed “Guru of Happiness,” psychiatrist and psychoanalyst Professor Yoram Yovell, suggests in his research that the two major contributing factors to long-term happiness are pleasure and meaning. Pleasure, as in joy, and meaning, as in relationships or actions (for example, contribution). Last week Cymulate held its annual Sales Kick Off (SKO). Reflection, recognition, and celebration are part of the journey of every individual and business. But it's much more meanginful when others, especially customers, recognize these achievements and the value that the company brings to their lives. During the SKO, several customers enthusiastically shared how Cymulate makes their teams’ day-to-day lives easier in a myriad of fashions. Here are some of the benefits they mentioned: 
  1. Improved Communication with the Board of Directors: “I showed our board of directors the comprehensive visibility that Cymulate provides, and they told me that we needed it before I even had the budget to purchase it.” 
  2. Substantial Savings: “Cymulate saves us a lot of time and money because we don’t need to investigate anything.” 
  3. Maximized Cybersecurity Effectiveness: “Cymulate provides us with the insights to close gaps and optimize the controls we already have in our security stack. We don’t need to waste time or money looking for new tools to improve our security.” 
  4. Validated SOC and Incident Response: “Running simulations in a real environment is as close as you get to a real incident response exercise.” 
  5. Mapped Attack Paths: “At any given time, Cymulate provides us insights into attacks that can penetrate us and how to mitigate the attack.” 
  6. Prescriptive Remediation Guidance: “I can check my remediation efforts, know that I am protected, and that all my controls are working as they should.” 
  7. Better Overall Cybersecurity Management: “Cymulate improved our risk management process and decision-making.” 
  8. Excellent Customer Support: “I have never worked with a better customer success team.” 
The customers also shared a few examples of security gaps that they discovered and quickly remediated following Cymulate’s security assessments: 
  • A daily backup task was running with admin rights on all machines in the network. Such a flaw can lead to data loss or service disruption. 
  • A successful simulated DNS tunneling attempt surfaced the risk of C&C communication and data theft. 
  • Data exfiltration using Telnet after the handshake has been made, despite the FW policy being configured to block it. 
  • Spoofed email simulation has made it to employees’ inboxes, leaving a crack for phishing attempts and malware to get in. 
Hearing the customers affirm Cymulate’s strategy and execution by calling out the value they get directly from the platform and their relationship with customer success is a far better endorsement and motivation boost than any self-tapping. Either way, Cymulate is proud of: 
  • The myriad of ways in which organizations around the world find benefit in using Cymulate’s technology 
  • The breadth and depth of security and business solutions that only Cymulate provides organizations 
Not only does it yield pleasure, but for the most part, it also demonstrates how Cymulate is meaningful to business operations, and this makes us happy!  Learn more about the value that businesses get from Cymulalte’s solutions.
Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo