Cymulate References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3119)
    Premium76+ References
  • 4.8 / 5.0 (2043)
    46+ References
  • 4.8 / 5.0 (846)
    28+ References

Cymulate Testimonials

  • “Cymulate enables us to have data-driven conversations about cybersecurity. No more opinions. It’s just the facts.”

  • "The Cymulate Research Group is always quick to create new emerging threat assessments. With minimal effort, we understand our exposure and how to mitigate it.”

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References76 total
    About

    AlgoSec empowers enterprise organizations and service providers to manage security at the speed of business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security. Over 1,500 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec to streamline change management, optimize firewall and network access configurations, mitigate risk and ensure continuous compliance.

  • Reference Rating
    4.7 / 5.0
    Customer References46 total
    About

    SafeBreach is a cybersecurity company based in Sunnyvale, California and Tel Aviv, Israel. The company has developed a platform that simulates hacker breach methods, running continuous "war games" to identify breach scenarios across network systems. Their mission is to innovate the way the industry validates security risks from static to continuous, from theoretical to practical.

  • Reference Rating
    4.7 / 5.0
    Customer References28 total
    About

    XM Cyber is the global leader in cyber attack path management The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked