Frequently Asked Questions

Customer Success & Case Study Results

How much did Hertz Israel reduce its cyber risk using Cymulate?

Hertz Israel reduced its overall cyber risk by 81% within just four months of using Cymulate. This significant reduction was achieved by continuously validating and optimizing their security controls with the Cymulate platform. Source

What specific security risks did Hertz Israel reduce with Cymulate?

Hertz Israel reduced its network security risk by 98% and overall cyber risk by 81% after configuring and fine-tuning its firewall, web application firewall, endpoint, and email gateway using Cymulate's continuous validation capabilities. Source

How quickly can organizations see results with Cymulate?

Organizations like Hertz Israel have seen measurable results within four months, including an 81% reduction in cyber risk. The platform's agentless mode and ease of deployment allow for rapid implementation and immediate value. Source

What feedback did Hertz Israel's CISO provide about Cymulate?

Ariel Kashir, CISO of Hertz Israel, stated: "I use many security solutions, but Cymulate is a must if you want to ensure your organization is safe from cyber threats. It's easy to use, intuitive, and the customer support is unparalleled." Source

How did Cymulate help Hertz Israel validate new security controls?

Hertz Israel used Cymulate to independently validate the effectiveness of newly configured security controls. The platform revealed that a new control was not monitoring or mitigating threats as expected, prompting further optimization. Source

What is the Hopper capability in Cymulate and how did Hertz Israel use it?

The Hopper capability in Cymulate enables automated network penetration testing. Hertz Israel used Hopper to simulate attacker scenarios, initially scoring 100/100 in risk, and reduced this to 2/100 after remediation. Source

How does Cymulate help organizations baseline risk and monitor security drift?

Cymulate allows organizations to create a risk baseline and receive alerts whenever risk increases, enabling immediate action to address new exposures or configuration changes. Source

How does Cymulate support organizations as their security maturity grows?

Cymulate's suite of products is designed to scale with an organization's security maturity. As teams master one aspect of security, the platform supports further challenges and advanced validation needs. Source

How does Cymulate help with vendor management and contract terms?

Hertz Israel includes Cymulate risk score reduction requirements in vendor contracts to ensure new solutions are fully optimized in their security environment, demonstrating trust in Cymulate's validation capabilities. Source

What types of reports does Cymulate provide to support business and technical communication?

Cymulate provides both business and technical reports. Business reports help communicate risk and improvements to stakeholders, while technical reports enable targeted, data-driven discussions with IT teams. Source

How does Cymulate's customer support contribute to success?

Cymulate offers excellent customer support, including weekly meetings with the customer success team, ensuring organizations use the platform to its full potential. Source

What Cymulate solutions did Hertz Israel use?

Hertz Israel used Breach and Attack Simulation (BAS) and Automated Network Pen Testing (Hopper) to assess, optimize, and validate the effectiveness of their security controls. Source

How does Cymulate compare to manual penetration testing?

Cymulate enables more extensive and frequent testing than manual penetration tests. It allows organizations to run assessments in less than 30 minutes and provides real-time visibility, whereas manual pen tests are resource-intensive and only offer point-in-time results. Source

How does Cymulate help organizations with small security teams?

Cymulate automates security validation, making it possible for small teams to continuously assess and optimize controls without the need for extensive resources or frequent manual testing. Source

Why did Mayer's Cars and Trucks Ltd purchase Cymulate after Hertz Israel's success?

After witnessing the measurable reduction in cyber risk and operational improvements at Hertz Israel, Mayer's Cars and Trucks Ltd also adopted Cymulate to enhance their own security posture. Source

How does Cymulate help organizations take an "assume breach" approach?

Cymulate's Hopper capability allows organizations to simulate attacker scenarios and understand potential impacts if defenses are breached, supporting an "assume breach" security strategy. Source

What is the business impact of using Cymulate?

Organizations using Cymulate can expect improved security posture, operational efficiency, faster threat validation, cost savings, enhanced threat resilience, and better decision-making. For example, Hertz Israel achieved an 81% reduction in cyber risk and 98% reduction in network security risk. Source

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, a unified platform for BAS and CART, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions. Source

How does Cymulate help organizations with fragmented security tools?

Cymulate integrates exposure data and automates validation, providing a unified view of the security posture and addressing gaps caused by disconnected tools. Source

Features & Capabilities

What features does Cymulate offer for continuous security validation?

Cymulate provides continuous threat validation through automated attack simulations, exposure prioritization, attack path discovery, automated mitigation, and a comprehensive threat library. These features enable organizations to validate defenses in real time and prioritize remediation. Source

Does Cymulate integrate with other security technologies?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page.

What technical documentation is available for Cymulate?

Cymulate provides guides, whitepapers, solution briefs, and data sheets covering topics such as vulnerability management, detection engineering, exposure validation, automated mitigation, and more. Access these resources at the Resource Hub.

How easy is Cymulate to implement and start using?

Cymulate is designed for rapid, agentless deployment with no need for additional hardware or complex configurations. Customers can start running assessments within minutes, and the platform offers comprehensive support and educational resources to ensure a smooth onboarding experience. Source

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive interface and ease of use. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Source

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios required. For a personalized quote, schedule a demo with the Cymulate team.

Security & Compliance

What security and compliance certifications does Cymulate have?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. Source

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with regular vulnerability scanning and third-party penetration tests. Source

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), to ensure GDPR compliance. Source

Competition & Comparison

How does Cymulate compare to AttackIQ?

Cymulate surpasses AttackIQ in innovation, threat coverage, and ease of use. It offers an industry-leading threat scenario library and AI-powered capabilities to streamline workflows and accelerate security posture improvement. Read more

How does Cymulate compare to Mandiant Security Validation?

Mandiant Security Validation is an original BAS platform but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management and maintaining a leadership position. Read more

How does Cymulate compare to Pentera?

Pentera focuses on attack path validation but lacks the depth Cymulate provides for fully assessing and strengthening defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more

How does Cymulate compare to Picus Security?

Picus Security offers an on-premise BAS option but lacks the comprehensive exposure validation platform Cymulate provides, which covers the full kill-chain and includes cloud control validation. Read more

How does Cymulate compare to SafeBreach?

Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation. It offers the industry’s largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams building custom attack campaigns, but Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more

Use Cases & Target Audience

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Source

What pain points does Cymulate address for security teams?

Cymulate addresses fragmented tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies, and post-breach recovery challenges. Source

How does Cymulate tailor solutions for different security roles?

Cymulate provides quantifiable metrics for CISOs, automates processes for SecOps, offers automated offensive testing for red teams, and enables efficient vulnerability prioritization for vulnerability management teams. Source

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More
CUSTOMERS

Hertz Israel Reduced Cyber Risk by 81% within 4 Months with Cymulate

Book a Demo
Book a Demo