Frequently Asked Questions
Sub-Processors & Data Handling
What is a sub-processor in the context of Cymulate?
A sub-processor is a third-party service provider engaged by Cymulate to process customer data as part of delivering Cymulate's platform and services. Sub-processors may provide infrastructure, database, AI, or management tools that support the operation and delivery of Cymulate's solutions.
Which sub-processors does Cymulate currently use?
Cymulate currently uses the following sub-processors: AWS (cloud computing services), Hubspot (inbound marketing, sales, and service software), Atlas MongoDB (multi-cloud database service), Coda.AI (management tool), and Microsoft Azure (OpenAI – AI services). For details on their purposes and locations, see the table above.
What are the purposes of each sub-processor used by Cymulate?
Each sub-processor serves a specific function: AWS provides cloud infrastructure and database services for production and backup; Hubspot supports inbound marketing, sales, and service; Atlas MongoDB offers multi-cloud database services; Coda.AI is used as a management tool; and Microsoft Azure provides OpenAI-based AI services.
Where are Cymulate's sub-processors located?
Cymulate's sub-processors are located in the US, EU, UK, and India. For example, AWS and Atlas MongoDB operate in the US, EU, and India; Hubspot and Coda.AI are based in the US; Microsoft Azure operates in the US and EU.
Does Cymulate use any affiliates as sub-processors?
Yes, depending on the customer's geographical location and the nature of the services provided, Cymulate may involve one or more affiliates as sub-processors. These include Cymulate Ltd (Israel), Cymulate, Inc. (US), Cymulate UK Ltd (UK), and Cymulate India Private Limited (India).
How does Cymulate select and manage its sub-processors?
Cymulate selects sub-processors based on their ability to meet strict security, privacy, and compliance requirements. Each sub-processor is vetted to ensure alignment with Cymulate's standards for data protection and operational reliability. For more details, see Security at Cymulate.
How can customers stay informed about changes to Cymulate's sub-processors?
Cymulate maintains an up-to-date list of sub-processors on its website. Customers are encouraged to review this page regularly for updates. For additional notifications or inquiries, customers can contact Cymulate directly via the contact information provided on the site.
What steps does Cymulate take to ensure data security with its sub-processors?
Cymulate ensures that all sub-processors adhere to strict data security standards, including encryption, secure hosting, and compliance with international regulations. Sub-processors are required to implement robust security controls to protect customer data.
How does Cymulate comply with data protection regulations when using sub-processors?
Cymulate complies with data protection regulations such as GDPR by ensuring that all sub-processors meet legal requirements for data handling, privacy, and security. This includes contractual agreements and regular audits to maintain compliance.
Can customers request more information about Cymulate's sub-processors?
Yes, customers can request additional information about Cymulate's sub-processors by contacting Cymulate through the official channels listed on the website. Detailed information and documentation can be provided upon request.
Security, Compliance & Certifications
What security and compliance certifications does Cymulate hold?
Cymulate holds several key certifications, including SOC2 Type II (covering security, availability, confidentiality, and privacy), ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security Controls), and CSA STAR Level 1 (Cloud Controls Matrix). Learn more.
How does Cymulate ensure the security of customer data?
Cymulate employs robust security measures, including encryption for data in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and third-party penetration tests.
Is Cymulate GDPR compliant?
Yes, Cymulate is GDPR compliant. The platform incorporates data protection by design and maintains a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO).
What product security features does Cymulate offer?
Cymulate's platform includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), IP address restrictions, and TLS encryption for its Help Center, ensuring secure access and data protection for all users.
How does Cymulate train its employees on security?
Cymulate employees undergo ongoing security awareness training, regular phishing tests, and adhere to comprehensive security policies to maintain a high standard of security across the organization.
Platform Features & Integrations
What are the key features of the Cymulate platform?
Cymulate offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily.
What integrations does Cymulate support?
Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a full list, visit the Partnerships and Integrations page.
How easy is it to implement Cymulate?
Cymulate is designed for quick and easy implementation, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment, with comprehensive support and educational resources available.
What technical documentation is available for Cymulate?
Cymulate provides a range of technical resources, including guides, whitepapers, solution briefs, and data sheets. Topics include vulnerability management, detection engineering, exposure validation, automated mitigation, and more. Access these resources at the Resource Hub.
How does Cymulate help with vulnerability management?
Cymulate automates vulnerability validation, prioritizes exposures based on exploitability, and provides actionable insights for remediation. The platform supports continuous threat exposure management (CTEM) and integrates with leading vulnerability management tools. Learn more.
Pricing & Plans
What is Cymulate's pricing model?
Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, schedule a demo with the Cymulate team.
Use Cases & Business Impact
Who can benefit from using Cymulate?
Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more.
What business impact can customers expect from Cymulate?
Customers can expect up to a 52% reduction in critical exposures, a 60% increase in team efficiency, 40X faster threat validation, and an 81% reduction in cyber risk within four months. These results are based on real customer case studies. See case studies.
What pain points does Cymulate address for its customers?
Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. Read customer stories.
Are there case studies demonstrating Cymulate's effectiveness?
Yes, Cymulate features numerous case studies, such as Hertz Israel reducing cyber risk by 81% in four months and Nemours Children's Health improving detection in hybrid and cloud environments. Explore all case studies.
How does Cymulate tailor solutions for different roles?
Cymulate provides tailored solutions for CISOs (metrics and risk prioritization), SecOps teams (automation and efficiency), red teams (automated offensive testing), and vulnerability management teams (continuous validation and prioritization). Learn more.
Competition & Differentiation
How does Cymulate compare to AttackIQ?
Cymulate surpasses AttackIQ in innovation, threat coverage, and ease of use, offering the industry-leading threat scenario library and AI-powered capabilities to streamline workflows and accelerate security posture improvement. Read more.
How does Cymulate compare to Mandiant Security Validation?
Mandiant Security Validation is an original BAS platform but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management as a grid leader. Read more.
How does Cymulate compare to Pentera?
Pentera focuses on attack path validation but lacks the depth Cymulate provides to fully assess and strengthen defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more.
How does Cymulate compare to Picus Security?
Picus Security offers an on-premise BAS option but lacks the comprehensive exposure validation platform Cymulate provides, which covers the full kill-chain and includes cloud control validation. Read more.
How does Cymulate compare to SafeBreach?
Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation, offering the industry’s largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more.
How does Cymulate compare to Scythe?
Scythe is suitable for advanced red teams building custom attack campaigns, but Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more.
Customer Experience & Support
What feedback have customers given about Cymulate's ease of use?
Customers consistently praise Cymulate for its intuitive, user-friendly interface and actionable insights. Testimonials highlight easy implementation, a user-friendly dashboard, and accessible support. Read testimonials.
What support options are available for Cymulate customers?
Cymulate offers comprehensive support, including email support ([email protected]), real-time chat support, a knowledge base, webinars, e-books, and an AI chatbot for quick answers and guidance. Contact support.