CyCognito References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1743)
    69+ References
  • 4.8 / 5.0 (1403)
    Verified28+ References
  • 4.8 / 5.0 (889)
    61+ References

CyCognito Case Studies

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References69 total
    About

    AttackIQ was a leading independent vendor of breach and attack simulation solutions, built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to plan security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework. The Company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with MITRE Engenuity Center for Threat-Informed Defense.

  • Reference Rating
    4.7 / 5.0
    Customer References28 total
    About

    Synack is a security company revolutionizing how enterprises view cybersecurity through a hacker’s eyes. Synack’s hacker powered security platform arms clients with hundreds of the world’s most skilled, highly vetted ethical hackers who provide a truly adversarial perspective of clients’ IT environments. Synack’s confidential client base is comprised of some of the largest F500/G500 enterprise organizations across banking and financial services, healthcare, consumer goods and retail, manufacturing, technology and the U.S. Federal Government.

  • Reference Rating
    4.7 / 5.0
    Customer References61 total
    About

    XM Cyber is the global leader in cyber attack path management The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked