Cymulate References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1169)
    39+ References
  • 4.8 / 5.0 (1419)
    Verified28+ References
  • 4.8 / 5.0 (900)
    61+ References

Cymulate Case Studies

  • Civil Engineering Organization Goes Beyond Security Control Validation with Cymulate

  • Wolters Kluwer Increases Visibility and Control of its Security Posture

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References39 total
    About

    Redscan is an award-winning provider of managed security services, specialising in Managed Detection and Response, Penetration Testing and Red Teaming. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches. By understanding how attackers operate and leveraging cutting-edge tools and threat intelligence, Redscan’s cyber security professionals can be trusted to provide the insight and support needed to successfully mitigate information security risk and achieve compliance standards.

  • Reference Rating
    4.7 / 5.0
    Customer References28 total
    About

    Synack is a security company revolutionizing how enterprises view cybersecurity through a hacker’s eyes. Synack’s hacker powered security platform arms clients with hundreds of the world’s most skilled, highly vetted ethical hackers who provide a truly adversarial perspective of clients’ IT environments. Synack’s confidential client base is comprised of some of the largest F500/G500 enterprise organizations across banking and financial services, healthcare, consumer goods and retail, manufacturing, technology and the U.S. Federal Government.

  • Reference Rating
    4.7 / 5.0
    Customer References61 total
    About

    XM Cyber is the global leader in cyber attack path management The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked