Frequently Asked Questions

Survey Insights & Industry Trends

What were the main findings of the 2022 Cymulate Global Readiness Survey?

The 2022 Cymulate Global Readiness Survey, which included over 1,000 IT and security professionals worldwide, found that 60% of organizations are seeking to consolidate their cybersecurity solutions. However, only 20% cited cost as the main reason; usability (23%) and the need to right-size security setups (22%) were more common drivers. The survey also highlighted economic anxiety, staffing challenges, and supply chain threats as major factors impacting cybersecurity spending and planning. (Source: Cymulate Survey Press Release, Nov 16, 2022)

How are economic concerns affecting cybersecurity spending and project timelines?

Economic anxiety has led to delays in cybersecurity purchasing, with most survey respondents noting project delays of three to six months. Despite these concerns, rising geopolitical tensions were not cited as having a significant impact on budget reductions or purchasing decisions. (Source: Cymulate Survey Press Release, Nov 16, 2022)

What impact has the Great Resignation had on cybersecurity teams?

The survey found that cybersecurity workers are twice as likely as the overall labor market to be part of the Great Resignation. The rate quadrupled in organizations with short-staffed teams, poor work conditions, or a lack of prioritization for basic cyber hygiene. (Source: Cymulate Survey Press Release, Nov 16, 2022)

How prevalent are supply chain attacks, and how are organizations responding?

According to the survey, 52% of respondents believe supply chain issues are responsible for up to a quarter of all attacks, while 26% believe the number could be as high as half. As a result, 45% of organizations have increased their cybersecurity proactiveness and preparation due to supply chain vulnerabilities. (Source: Cymulate Survey Press Release, Nov 16, 2022)

What best practices are organizations struggling to adopt?

The survey revealed that roughly one-third to almost one-half of organizations have yet to adopt essential cybersecurity hygiene practices such as multi-factor authentication (MFA), improved identity access management (IAM), least privilege adoption, endpoint detection and response (EDR), web protection, and phishing education. (Source: Cymulate Survey Press Release, Nov 16, 2022)

How common is the adoption of proactive cybersecurity testing?

80% of organizations surveyed have adopted some degree of proactive cybersecurity measures. However, only 29% reported using penetration testing or other baseline measures, and just 30% have incorporated advanced solutions like breach and attack simulation (BAS), attack surface management, and vulnerability management. (Source: Cymulate Survey Press Release, Nov 16, 2022)

What is driving the consolidation of cybersecurity solutions?

While 60% of organizations are seeking to reduce the number of cybersecurity solutions in use, only 20% cite affordability as the main reason. Usability (23%) and the need to right-size security setups (22%) are more common drivers for consolidation. (Source: Cymulate Survey Press Release, Nov 16, 2022)

What types of organizations participated in the Cymulate survey?

The survey included over 1,000 IT and security professionals from North America, Latin America, APAC, and EMEA, representing companies of all sizes (from under 500 to over 50,000 employees) and nearly every major industry, including finance, healthcare, manufacturing, and retail. 81% of respondents held technical roles, and 70% were decision-makers. (Source: Cymulate Survey Press Release, Nov 16, 2022)

What is the projected growth of the Breach and Attack Simulation (BAS) market?

Frost & Sullivan projects the global BAS market to grow at a compound annual growth rate (CAGR) of 38.5% between 2021 and 2026, reflecting the increasing importance of proactive cybersecurity validation. (Source: Cymulate Survey Press Release, Nov 16, 2022)

How does Cymulate help organizations address supply chain threats?

Cymulate enables organizations to proactively validate their defenses against supply chain attacks by providing automated, expert, and threat intelligence-led risk assessments. The platform helps identify vulnerabilities and optimize security posture across on-premises and cloud environments. (Source: Cymulate Survey Press Release, Nov 16, 2022)

Features & Capabilities

What are the core features of the Cymulate platform?

Cymulate offers a unified platform that includes Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. Key features include continuous threat validation, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, and an extensive threat library with over 100,000 attack actions updated daily. (Source: https://cymulate.com/platform/)

Does Cymulate support integrations with other security tools?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page.

How does Cymulate help organizations prioritize vulnerabilities?

Cymulate validates the exploitability of exposures and ranks them based on prevention and detection capabilities, business context, and threat intelligence. This helps organizations focus on the most critical vulnerabilities and optimize remediation efforts. (Source: EM Platform Message Guide.pdf)

What is Cymulate's approach to continuous threat validation?

Cymulate runs 24/7 automated attack simulations to validate security defenses in real-time, ensuring organizations stay ahead of emerging threats and maintain a strong security posture. (Source: https://cymulate.com/solutions/optimize-threat-resilience/)

How does Cymulate automate mitigation and response?

The platform integrates with security controls to push updates for immediate threat prevention and provides tools for building custom detection rules and action plans to optimize prevention and detection. (Source: https://cymulate.com/platform/)

What is the Cymulate threat library?

Cymulate provides an advanced library of over 100,000 attack actions aligned to the MITRE ATT&CK framework, with daily updates to ensure coverage of the latest threats. (Source: https://cymulate.com/platform/)

How easy is Cymulate to use and implement?

Cymulate is designed for ease of use, with an agentless mode that requires no additional hardware or complex configuration. Customers can start running simulations almost immediately after deployment, and the platform is praised for its intuitive interface and actionable insights. (Source: Customer testimonials, https://cymulate.com/schedule-a-demo/)

What support and resources does Cymulate provide to customers?

Cymulate offers comprehensive support, including email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for quick answers and best practices. (Source: manual)

What are the measurable benefits of using Cymulate?

Customers have reported up to a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months of using Cymulate. (Source: https://cymulate.com/customers/hertz-israel-reduced-cyber-risk-by-81-percent-within-four-months-with-cymulate/)

How does Cymulate compare to traditional penetration testing?

Cymulate offers automated, continuous validation that can test threats 40 times faster than manual penetration testing, providing real-time insights and reducing the need for costly, point-in-time assessments. (Source: https://cymulate.com/solutions/optimize-threat-resilience/)

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. (Source: EM Platform Message Guide.pdf)

What problems does Cymulate solve for security teams?

Cymulate addresses challenges such as fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. (Source: manual)

Are there case studies demonstrating Cymulate's effectiveness?

Yes, for example, Hertz Israel reduced cyber risk by 81% in four months, and a sustainable energy company scaled penetration testing cost-effectively with Cymulate. More case studies are available on the Cymulate Customers page.

How does Cymulate address the needs of different security personas?

Cymulate tailors its solutions for CISOs (providing metrics and insights), SecOps teams (automating processes), red teams (offensive testing with a large attack library), and vulnerability management teams (automated validation and prioritization). (Source: https://cymulate.com/roles-ciso-cio/)

What are some customer testimonials about Cymulate's ease of use?

Customers praise Cymulate for its intuitive dashboard, user-friendly portal, and actionable insights. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." (Source: https://cymulate.com/customers/cymulate-for-all-industries-customers-quotes/)

How does Cymulate help with post-breach recovery?

Cymulate enhances visibility and detection capabilities after a breach, enabling organizations to recover faster and strengthen their defenses against future incidents. (Source: manual)

How does Cymulate support cloud and hybrid environments?

Cymulate secures hybrid and cloud infrastructures through automated compliance and regulatory testing, helping organizations address new attack surfaces and validation challenges introduced by cloud adoption. (Source: manual)

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate their defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity strategies. (Source: https://cymulate.com/about-us/)

Security, Compliance & Trust

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. (Source: https://cymulate.com/security-at-cymulate/)

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and annual third-party penetration tests. (Source: https://cymulate.com/security-at-cymulate/)

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), ensuring GDPR compliance. (Source: https://cymulate.com/security-at-cymulate/)

What product security features does Cymulate offer?

Cymulate's platform includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), IP address restrictions, and TLS encryption for its Help Center. (Source: https://cymulate.com/security-at-cymulate/)

How does Cymulate support compliance with industry regulations?

Cymulate's certifications (SOC2, ISO 27001, CSA STAR Level 1) and robust security program help organizations meet regulatory requirements and demonstrate adherence to global standards. (Source: https://cymulate.com/security-at-cymulate/)

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, you can schedule a demo with the Cymulate team. (Source: manual)

Company Information & Recognition

Where can I find Cymulate's latest news, press releases, and media coverage?

You can find all of Cymulate's latest company announcements, press releases, and media coverage in our newsroom. This includes information on partnerships, product updates, industry awards, and expert research featured in leading publications. (Source: https://cymulate.com/news/)

Has Cymulate received any industry recognition or awards?

Yes, Cymulate was named a Market Leader for Automated Security Validation by Frost & Sullivan and recognized as a Customers' Choice in the 2025 Gartner Peer Insights. (Source: https://cymulate.com/press-releases/cymulate-named-market-leader-for-automated-security-validation-by-frost-sullivan/)

Where can I find Cymulate's customer reviews and case studies?

You can read customer reviews on the Reviews page and explore industry-specific case studies on the Customers page. (Source: https://cymulate.com/customers/)

What is Cymulate's company background and mission?

Cymulate is a leading cybersecurity company focused on enabling organizations to proactively validate their defenses, identify vulnerabilities, and optimize their security posture. The company serves a diverse range of customers across industries and is recognized for continuous innovation and measurable outcomes. (Source: https://cymulate.com/about-us/)

Where can I watch Cymulate at it-sa 2025?

You can watch Cymulate at it-sa 2025 in this video: Cymulate at it-sa 2025 video.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Cymulate Survey Finds Consolidation is Happening but Only 20% Cite Cost as the Reason

November 16, 2022

Economic anxiety, staffing challenges, and growing supply chain threats among other factors impacting cybersecurity spending and planning

NEW YORK & TEL AVIV, ISRAEL – 16 November 2022: Cymulate, the leader in cybersecurity risk validation and exposure management, today announced the results of a global survey of more than 1,000 IT and security professionals examining the influence of ongoing uncertainties in cybersecurity and cyber resilience.

The 2022 Cymulate Global Readiness Survey investigated the impact of increased geopolitical tensions, economic concerns, and the Great Resignation, as well as more technical aspects such as the rise of supply chain attacks and the efficacy of best practices, on cybersecurity and cyber-readiness within enterprises. Consolidation of cybersecurity solutions was a key theme within the findings, with 60% reporting their organization is seeking to reduce the number of solutions in use. Notably, only 20% of respondents reported affordability as the main reason, while 23% and 22% cited usability and the need to right-size their security setup as the primary driver of consolidation.

“Businesses of all sizes shared that it is no longer about point solutions. With the volume of security tools and data, the need has shifted towards an integrated security suite,” said Carolyn Crandall, chief security advocate at Cymulate.

Economic anxiety has delayed purchasing with most respondents noting project delays of three to six months. Interestingly, rising geopolitical tensions like the conflict in Ukraine and the standoff over Taiwan were not cited as having an impact on budget reductions or purchasing decisions.

Additional key highlights of the survey include:

•  Cybersecurity workers are twice as likely than the overall labor market to be part of the Great Resignation: Twice as many respondents say they are frustrated by their jobs and actively looking for new roles than the average. The rate quadrupled when cybersecurity teams are short- staffed and work conditions have worsened, or the enterprise declined to prioritize basic cyber hygiene principles.

•  The industry remains challenged with adopting essential cybersecurity hygiene best practices: Though a critical component of shoring up cyber resiliency, roughly one-third to almost one-half of respondents said their enterprises had yet to adopt multi-factor authentication (MFA), improved identity access management (IAM), least privileges adoption, EDR adoption, web protection, and phishing education.

•  Frequent supply chain attacks are driving cybersecurity preparation: 52% of respondents indicated that they believe supply chain issues to be responsible for up to a quarter of all attacks, while 26% believe it may be as high as half of all attacks. The threat of supply chain attacks is affecting organization’s strategies, with 45% of respondents reporting that the vulnerability of the supply chain has led to increased cybersecurity proactiveness and preparation.

• The adoption of proactive cybersecurity testing is key to reducing risk and staying in front of evolving threats: 80% of respondents said their organization had adopted some degree of proactive measures. However, only 29% reported their organization had incorporated penetration testing or other baseline measures. Additionally, only 30% of respondents said their organization had incorporated advanced proactive solutions that include breach attack simulation (BAS), attack surface management and vulnerability management, indicating significant room for growth.

With the increasing number of cyber threats and their devastating effects on business revenue, productivity and reputation, Frost & Sullivan projects the global BAS market to increase at a CAGR of 38.5% between 2021 and 2026. The global survey was conducted on LinkedIn and gathered responses from more than 1,000 IT and security professionals representing a wide range of industries, organization sizes, and specific roles. Of the respondents, 81% occupy a technical role, such as cybersecurity, IT, or DevOps, and 70% are considered decision-makers in the organization, including individuals at the manager, director, and executive levels. The survey includes respondents from North America, Latin America, APAC, and EMEA
representing companies ranging in size from less than 500 employees to more than 50,000. In addition, nearly every major industry is represented, including finance, healthcare, manufacturing, retail, and others, yielding a broadly representative sample.

About Cymulate

The Cymulate cybersecurity risk validation and exposure management solution provides security professionals with the ability to continuously challenge, validate and optimize their on-premises and cloud cyber-security posture with end-to-end visualization across the MITRE ATT&CK® framework. The platform provides automated, expert, and threat intelligence-led risk assessments that are simple to deploy, and easy for organizations of all cybersecurity maturity levels to use. It also provides an open framework for creating and automating red and purple teaming exercises by generating tailored penetration scenarios and advanced attack campaigns for their unique environments and security policies. For more information, visit www.cymulate.com.