Frequently Asked Questions

Product Information & Technology

What is Cymulate and how does it test a company's defenses?

Cymulate is a cybersecurity platform that uses real malware and attack techniques to test a company's defenses across multiple vectors. The platform simulates real-world attacks—such as phishing, malware delivery, lateral movement, and data exfiltration—without causing actual harm to your network. Tests are performed using an automated software agent on a dedicated machine, ensuring that real malware never infects your production environment. This approach provides actionable, real-world statistics about your security posture. [Source]

How does Cymulate safely use real malware in its tests?

Cymulate runs tests with real malware, but the malware is never installed on your production network. All tests are executed using a dedicated software agent, and the malware only attempts to penetrate defenses to the agent's environment. If the malware reaches the agent's inbox or endpoint, the test is marked as successful, but no actual infection occurs. This ensures realistic testing without risk to your systems. [Source]

What attack vectors does Cymulate test?

Cymulate tests six main attack vectors: email gateway (phishing and malware delivery), web browser (malicious websites and scripts), lateral movement (hopper test), phishing (targeting real users), data loss prevention (DLP), and web application firewall (WAF) assessment. Each vector is designed to probe different aspects of your security posture. [Source]

How does Cymulate's 'hopper' test work?

The 'hopper' test simulates an attacker who has already breached your perimeter. It designates an entry point (such as a finance department workstation) and attempts to move laterally across your network, testing how easily it can access other machines and extract data. This helps identify vulnerabilities in internal segmentation and privilege management. [Source]

How long does a typical Cymulate test take?

A typical Cymulate email attack simulation test takes about three hours, during which thousands of messages with different types of malware and attachments are sent to the network to evaluate defenses. Other tests may vary in duration depending on the vector and scope. [Source]

How does Cymulate test web browsers for vulnerabilities?

Cymulate's agent browses a Cymulate-owned website loaded with malware, exploits, and scripts, mimicking real-world browsing behavior. This test evaluates which threats can bypass your internet filters and reach endpoints. [Source]

How does Cymulate conduct phishing tests?

Cymulate sends a variety of phishing emails to real users within your organization. Clients can choose from pre-built phishing scenarios or create custom ones. The platform tracks user interactions, including how long users view emails before clicking links, providing detailed insights into user awareness and risk. [Source]

What is Cymulate's approach to data loss prevention (DLP) testing?

Cymulate's DLP test checks for the presence of sensitive data in emails and monitors if certain types of data are being loaded onto USB drives. This helps organizations validate the effectiveness of their DLP controls. [Source]

How does Cymulate assess web application firewalls (WAF)?

Cymulate attacks a specified URL to look for ways around your web application firewall (WAF), identifying potential weaknesses and bypass techniques. This assessment helps ensure your WAF is properly configured and effective. [Source]

Why is continuous testing important for cybersecurity?

Continuous testing is crucial because security postures can change rapidly due to software updates, configuration changes, or new threats. A network that is secure today may become vulnerable tomorrow. Cymulate's approach ensures ongoing vigilance and adaptation to evolving threats. [Source]

Can Cymulate help identify changes in security posture over time?

Yes, Cymulate can reveal changes in your security posture by running repeated tests. For example, a company may pass a test one week but fail the next due to an unnoticed configuration change or software update. This helps organizations detect and address new vulnerabilities quickly. [Source]

How does Cymulate ensure tests do not disrupt business operations?

Cymulate's tests are designed to be non-disruptive. Real malware is never installed on production systems, and all attack simulations are contained within a dedicated agent environment. This ensures that business operations continue uninterrupted during testing. [Source]

What makes Cymulate's approach to security testing unique?

Cymulate uses real malware and attack techniques in a controlled, automated environment to provide realistic, actionable insights. Unlike platforms that rely on simulated or theoretical attacks, Cymulate's approach delivers data on how your defenses respond to actual threats, helping you prioritize improvements. [Source]

How does Cymulate help organizations adapt to evolving threats?

Cymulate continuously updates its attack scenarios and threat intelligence, ensuring that organizations are tested against the latest tactics, techniques, and procedures used by real attackers. This helps companies stay ahead of emerging threats. [Source]

Can Cymulate's phishing tests be customized?

Yes, Cymulate allows clients to choose from a variety of pre-built phishing scenarios or create their own custom phishing emails to test user awareness and response. [Source]

How does Cymulate provide actionable insights from its tests?

Cymulate delivers detailed reports on which attacks succeeded, where defenses failed, and how users responded. This data helps organizations prioritize remediation efforts and improve their overall security posture. [Source]

What resources are available to learn more about Cymulate's technology?

You can access whitepapers, case studies, and blog posts on Cymulate's website to learn more about the technology behind the platform and its real-world applications. [Resources]

Where can I find Cymulate's latest news and press releases?

You can find all of Cymulate's latest company announcements, press releases, and media coverage in our newsroom. This includes information on partnerships, product updates, industry awards, and expert research featured in leading publications.

Features & Capabilities

What features does Cymulate offer for security validation?

Cymulate offers continuous threat validation, attack path discovery, automated mitigation, detection engineering validation, and complete kill chain coverage. The platform provides an extensive threat library with daily updates and integrates with a wide range of security controls. [Source]

How does Cymulate automate offensive testing?

Cymulate automates offensive testing by mapping attack paths, discovering lateral movement exposures, validating network segmentation, and proving continuous resilience. The platform can execute simulated assessments at scale from a library of over 100,000 attack actions mapped to the MITRE ATT&CK framework. [Source]

Does Cymulate support integration with other security tools?

Yes, Cymulate integrates with a wide range of technology partners across network, cloud, endpoint, and SIEM domains. Examples include Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, and more. For a complete list, visit our Partnerships and Integrations page.

How does Cymulate validate exposures?

Cymulate performs automated attack simulations that test the real-world exploitability of identified exposures. It correlates data from vulnerability scanners with threat prevention and detection outcomes to provide proof of resilience against specific threats. [Source]

How does Cymulate help organizations validate their security controls?

Cymulate offers a comprehensive approach to identifying and fixing security gaps through breach and attack simulation and automated red teaming. By testing security controls, Cymulate's platform reveals unmitigated exposures and provides actionable guidance to strengthen defenses before an actual attack occurs. [Source]

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as finance, healthcare, retail, media, transportation, and manufacturing. The platform provides tailored solutions for each role, from strategic oversight to operational security validation. [Source]

What business impact can customers expect from using Cymulate?

Customers have reported an 81% reduction in cyber risk within four months, a 60% increase in team efficiency, a 52% reduction in critical exposures, and a 30% improvement in threat prevention. These outcomes are supported by case studies such as Hertz Israel. [Case Study]

What pain points does Cymulate solve for security teams?

Cymulate addresses overwhelming threat volumes, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers. The platform provides continuous threat validation, exposure prioritization, improved resilience, and actionable metrics for stakeholders. [Source]

How does Cymulate help different security personas?

Cymulate tailors its solutions for CISOs (metrics and investment justification), SecOps (operational efficiency and visibility), red teams (automated offensive testing), and vulnerability management teams (risk prioritization). Each persona benefits from features and insights relevant to their responsibilities. [Source]

How easy is it to implement Cymulate?

Cymulate is designed for quick, agentless deployment with minimal resources required. Customers can start running simulations almost immediately, and the platform offers comprehensive support, educational resources, and an AI chatbot for assistance. [Source]

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its user-friendly and intuitive platform. Testimonials highlight its simplicity, ease of deployment, and actionable insights, making it accessible for teams across industries. [Source]

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and selected scenarios. The subscription fee is non-refundable and must be paid regardless of actual usage. For a custom quote, schedule a demo with the Cymulate team.

Competition & Comparison

How does Cymulate compare to other attack simulation platforms?

Cymulate differs from other platforms by validating exposures with live threat intelligence, providing actionable remediation guidance, and focusing on real-world exploitability. Other platforms may focus more on compliance or configuration hygiene. [Source]

Who are Cymulate's main competitors?

Cymulate's main competitors include AttackIQ, Mandiant Security Validation, Pentera, Picus Security, SafeBreach, and Scythe. Each competitor has different strengths and focus areas. [Source]

Why choose Cymulate over other security validation platforms?

Cymulate offers a unified platform with continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and proven results such as significant reductions in cyber risk and operational overhead. The platform is continuously updated with new features and threat intelligence. [Source]

Security & Compliance

What security and compliance certifications does Cymulate have?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications. These attest to the platform's robust security, privacy, and cloud compliance practices. [Source]

How does Cymulate protect customer data?

Cymulate is hosted in secure AWS data centers, uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), and follows a strict Secure Development Lifecycle (SDLC). The company employs a dedicated privacy and security team, including a DPO and CISO, and complies with GDPR. [Source]

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO). The platform is GDPR compliant. [Source]

Support & Implementation

What support options are available for Cymulate customers?

Cymulate provides email support, real-time chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for assistance. [Source]

How quickly can organizations start using Cymulate after purchase?

Organizations can start running simulations almost immediately after deployment, thanks to Cymulate's agentless mode and minimal setup requirements. [Source]

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: Azure Arc Privilege Escalation & Identity Takeover
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Why Cymulate Uses Real Attacks to Test Your Company's Defenses

August 3, 2017

Cybersecurity is anything but fire and forget. A firewall, anti-malware platform, or other security suite can be a valuable asset one day, then turn into a huge liability the next. The key to preventing the latter? Constant vigilance. Eyal Wachsman thinks his company Cymulate has the answer to the ever-changing cyber threat landscape. Its platform attacks client networks from multiple vectors, looking for the smallest weak spots to exploit. Cymulate isn’t hitting you with fake attacks either—they throw real malware at your network, try to steal real data, and try to phish real employees. It might sound dangerous, but that, says Wachsman, is the only way to get real, usable statistics about your network security.

Real cyberattacks without real damage

Yes, Cymulate runs tests with real malware, but it won’t get onto your network for two reasons. First, they’re performing all tests using a software agent that is completely automated and hosted on a machine specifically for that purpose. Second, the malware isn’t being installed on that machine, just trying to penetrate your defenses. If it makes it through your security to the agent’s email inbox then the test is considered a success. Email attacks aren’t the only way Cymulate tests network security. They have a total of six attack vectors that all poke and prod your network in different ways. First, as mentioned, is email. In a test that takes about three hours, Cymulate hits a network with thousands of messages containing different types of malware stored in different kinds of attachments. Second is web browser testing. The agent installed on your network hits a website owned by Cymulate that’s chock full of malware, exploits, scripts, and other bad things found on the internet. It browses around for a while and sees what makes it past internet filters. Third is what Cymulate calls a “hopper.” It acts like an attacker that has successfully penetrated your network. This test is run by designating an entry point, say finance, and testing to see how easy it is for the hopper to make its way from computer to computer. It also tries different methods of getting around and extracting data to see what your network is most vulnerable to. Fourth is a phishing test, and this one actually targets real users. There are a bunch of phishing emails that can be chosen from, and clients can also create their own to test. They come to email addresses on your domain and provide lots of data—you can even see how long a user spends looking at an email before clicking the link (which isn’t harmful, by the way). Fifth is data loss prevention (DLP), if applicable. The DLP test can be set up to check for certain key phrases in emails and even to check if certain types of data is being loaded onto USB drives. Sixth is a web applications firewall (WAF) assessment. No WAF is attackproof, and Cymulate will attack a specified URL to look for ways around the WAF.

Don’t get comfortable with your cybersecurity solution

Wachsman said that it isn’t about the security product you use—it’s more about how you use it. And even that isn’t entirely under your control. He told me about a time that a client ran a hopper test on their network and got a great response because of a honeypot installed on its network. The hopper only made it to two workstations before it was stopped. Just one week later that same hopper test on the same company managed to make it to 40 different servers. Not workstations; servers. In the time between the first and second scans, their security provider had run an update that broke the honeypot by putting a backend server to sleep. So, nothing had changed, at least as far as the client knew, but had an actual attack taken place it would have been disastrous. That exact same thing could happen on your network—a good security posture today doesn’t equal a good security posture tomorrow. Whether you choose to look into Cymulate’s solutions or someone else’s, you need to do something. Attacks are always evolving, and if your security isn’t evolving as well, you’re just asking for trouble.
READ MORE