Frequently Asked Questions

Product Information

What is Cymulate and what does it do?

Cymulate is an Exposure Management Platform that enables organizations to proactively validate their security controls, simulate real-world threats, and optimize their defenses. It combines Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics in a unified platform to help organizations identify, prioritize, and remediate exploitable exposures across their IT environments.

What is the primary purpose of Cymulate's platform?

The primary purpose of Cymulate's platform is to harden defenses and optimize security controls by continuously validating controls, threats, and response capabilities. This helps organizations focus on exploitable exposures and strengthen their overall security posture.

What types of organizations use Cymulate?

Cymulate is used by organizations across industries such as technology, military, energy, government, media, transportation, and financial services. It is designed for companies that prioritize cybersecurity and exposure management, with over 1,000 customers in 50 countries.

Who are the main users or personas for Cymulate?

Cymulate is tailored for CISOs and security leaders, Security Operations (SecOps) teams, Red Teams, and Vulnerability Management teams. Each persona benefits from features and insights specific to their role, such as strategic risk metrics for CISOs, automation for SecOps, advanced adversary simulation for Red Teams, and exposure prioritization for vulnerability managers.

How does Cymulate help organizations stay ahead of emerging threats?

Cymulate simulates real-world threats 24/7, validates defenses across IT environments, and updates its threat library daily. This ensures organizations can proactively identify and address vulnerabilities before attackers exploit them.

What is Cymulate's mission and vision?

Cymulate's mission is to empower organizations to manage their security posture effectively and proactively. The company aims to drive lasting change in cybersecurity by providing a unified Exposure Management Platform that helps organizations prove threats and improve resilience. Learn more.

Where can I find Cymulate's newsroom and media mentions?

You can access the latest company announcements, press releases, and media coverage in leading publications in our newsroom.

Where can I find technical documentation and resources for Cymulate?

Cymulate provides whitepapers, guides, data sheets, solution briefs, and reports covering technical and strategic aspects of exposure management. Access these resources in the Resource Hub.

How long has Cymulate been in business and how large is the company?

Cymulate was founded in 2016 and has grown to serve over 1,000 customers in 50 countries, with offices in 8 locations worldwide. The company is recognized for its innovation and customer-centric approach. Learn more.

Features & Capabilities

What are the key features of Cymulate?

Cymulate offers continuous threat validation, unified platform capabilities (BAS, CART, Exposure Analytics), AI-powered optimization, complete kill chain coverage, attack path discovery, automated mitigation, and cloud validation. These features enable organizations to test, validate, and improve their security posture efficiently.

Does Cymulate support integrations with other security tools?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, and more. For a complete list, visit the Partnerships and Integrations page.

How does Cymulate automate threat validation?

Cymulate automates threat validation by simulating real-world attacks 24/7, leveraging an extensive threat library with daily updates, and integrating with security controls to push threat updates for immediate prevention. This automation reduces manual tasks and accelerates validation processes.

What is attack path discovery in Cymulate?

Attack Path Discovery is a feature that automates offensive testing to identify and mitigate threats related to privilege escalation and lateral movement within an organization's environment. It helps improve threat resilience by revealing potential attack paths.

Does Cymulate support cloud security validation?

Yes, Cymulate provides dedicated validation features for hybrid and cloud environments, including integrations with cloud security tools like AWS GuardDuty, Check Point CloudGuard, and Wiz.

How does Cymulate use AI and machine learning?

Cymulate leverages AI and machine learning to deliver actionable insights for prioritizing remediation efforts, optimize detection engineering, and automate SIEM rule mapping. This helps organizations focus on high-risk vulnerabilities and improve operational efficiency.

How often is Cymulate updated with new features or threat intelligence?

Cymulate updates its SaaS platform every two weeks with new features, such as AI-powered SIEM rule mapping and advanced exposure prioritization. The threat library is updated daily to keep pace with emerging threats.

What technical documentation is available for Cymulate?

Cymulate offers whitepapers, guides, data sheets, solution briefs, and reports covering topics like exposure management, CTEM, email threat validation, detection engineering, vulnerability management, and more. Access these resources in the Resource Hub.

Use Cases & Benefits

What problems does Cymulate solve for security teams?

Cymulate addresses overwhelming threat volumes, lack of visibility, unclear risk prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers. It provides continuous threat validation, exposure prioritization, automation, and collaboration tools to help teams focus on what matters most.

How does Cymulate help CISOs and security leaders?

CISOs benefit from Cymulate's quantifiable metrics and insights, which help align security strategies with business objectives and justify investments. The platform provides clear, actionable data for communicating risk to stakeholders. Learn more.

How does Cymulate support Security Operations (SecOps) teams?

SecOps teams use Cymulate to automate processes, improve operational efficiency, and gain actionable insights for threat validation and detection. This enables faster response and better resource allocation. Learn more.

What benefits do Red Teams get from Cymulate?

Red Teams leverage Cymulate's automated offensive testing, a library of over 100,000 attack actions aligned to MITRE ATT&CK, and daily threat intelligence to scale and customize their testing efforts. Learn more.

How does Cymulate help Vulnerability Management teams?

Cymulate consolidates insights from vulnerability management, offensive testing, and security controls to prioritize exposures based on exploitability, business context, and threat intelligence. This enables focused remediation and improved risk management. Learn more.

What measurable business impact can Cymulate deliver?

Cymulate customers have reported an 81% reduction in cyber risk within four months, a 60% increase in team efficiency, a 52% reduction in critical exposures, and a 30% improvement in threat prevention. These outcomes are supported by case studies such as Hertz Israel. Read the case study.

How does Cymulate improve operational efficiency?

Cymulate automates manual security validation tasks, validates threats 40X faster than manual methods, and reduces manual SecOps tasks by 25%. This allows teams to focus on strategic initiatives and respond to threats more quickly.

How does Cymulate address cloud security challenges?

Cymulate provides cloud validation features and integrations with leading cloud security tools, helping organizations manage new attack surfaces and validation challenges introduced by cloud environments.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and ease of implementation. Testimonials highlight the platform's simplicity, immediate value, and accessible support. For example, Raphael Ferreira, Cybersecurity Manager at Banco PAN, stated, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Read more testimonials.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the selected package, number of assets, and scenarios for testing and validation. For a personalized quote, schedule a demo with the Cymulate team.

How can I get a quote for Cymulate?

You can get a detailed quote based on your organization's needs by scheduling a demo with the Cymulate team at this link.

Implementation & Support

How long does it take to implement Cymulate?

Cymulate is designed for quick and seamless implementation. It operates in agentless mode, requires no additional hardware or complex configurations, and can be deployed rapidly. Customers can start running simulations almost immediately after deployment.

What support options are available for Cymulate customers?

Cymulate offers comprehensive support, including email support at [email protected], real-time chat support, a knowledge base, webinars, and e-books on best practices. See webinars.

Is Cymulate easy to use for teams with limited resources?

Yes, Cymulate is designed to be intuitive and user-friendly, requiring minimal resources for implementation and ongoing management. Customers consistently report that the platform is easy to use and provides immediate value.

Security & Compliance

What security and compliance certifications does Cymulate have?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications. These attest to Cymulate's robust security practices, cloud security, and privacy management. Learn more.

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and a Chief Information Security Officer (CISO), ensuring GDPR compliance.

How does Cymulate ensure data security?

Cymulate is hosted in secure AWS data centers with multiple data locality choices, strong physical security, encryption for data in transit (TLS 1.2+) and at rest (AES-256), and high availability through redundancy and a tested disaster recovery plan.

What application security practices does Cymulate follow?

Cymulate is developed using a strict Secure Development Lifecycle (SDLC), including secure code training, continuous vulnerability scanning, software composition analysis, and annual third-party penetration tests.

How does Cymulate train its employees on security?

All Cymulate employees receive ongoing security awareness training, are subject to phishing campaign tests, and must adhere to comprehensive security policies.

Competition & Comparison

How does Cymulate compare to AttackIQ?

Cymulate delivers the industry's leading threat scenario library and AI-powered capabilities to streamline workflows and accelerate security posture improvement. AttackIQ provides automated security validation but lacks Cymulate's innovation, threat coverage, and ease of use. Read more.

How does Cymulate compare to Mandiant Security Validation?

Mandiant Security Validation is one of the original BAS platforms but has seen minimal innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management as a grid leader. Read more.

How does Cymulate compare to Pentera?

Pentera focuses on attack path validation but lacks the depth Cymulate provides for full kill chain and cloud control validation. Cymulate offers comprehensive exposure validation and a broader range of integrations. Read more.

How does Cymulate compare to Picus Security?

Picus is suitable for those seeking an on-premise BAS vendor, while Cymulate is the better choice for a complete exposure validation platform with full kill chain coverage and cloud control validation. Read more.

How does Cymulate compare to SafeBreach?

Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation. As the pioneer of AI-powered BAS, Cymulate offers the industry's largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more.

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams building custom attack campaigns but lacks Cymulate's ease of use, continuous validation, and actionable remediation. Cymulate provides a more complete exposure validation platform with automated mitigation and a library of over 100,000 attack actions. Read more.

Why should a customer choose Cymulate over other solutions?

Cymulate offers a unified platform, continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, proven results, continuous innovation, and an extensive threat library. These advantages help organizations reduce risk, improve efficiency, and stay ahead of threats. Learn more.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: Azure Arc Privilege Escalation & Identity Takeover
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Russian Hackers Using Iranian APT's Infrastructure in Widespread Attacks

October 21, 2019

New advisory from the UK’s NCSC and the NSA throws fresh light on activity first revealed by Symantec in June.

A new report from the United Kingdom’s National Cyber Security Center (NCSC) shows that the Russia-backed cyber espionage group Turla has carried out more attacks than previously thought using infrastructure and malware hijacked from Iranian threat group APT34.

The NCSC recently analyzed data pertaining to Turla’s use of three malware tools — Neuron, Nautilus, and an ASPX-based backdoor — in attacks targeted at UK organizations. The tools are designed for attackers to steal data and maintain persistence on Windows networks. The NCSC has previously noted Turla’s use of these tools in intelligence-gathering operations targeting organizations in the technology, military, energy, and government sectors. But it had not until now connected the tools to APT34 (aka OilRig, Crambus) – though Symantec did so in a report back in June. Read the full story here including Cymulate’s thoughts on how this could lead to further attack options:
READ MORE