143 Cymulate: Security Validation and Exposure Management Platform Reviews
Basic to advance threat validation, integrations ecosystem , regular update , mitigation guidance Review collected by and hosted on G2.com.
I don't have anything to express dislike about Cymulate as of today. Review collected by and hosted on G2.com.
It can be quite Granular so we can go into depth with our prevention methods for different types of attacks. Our csm Ian Waters is also quite helpful and friendly, assisting with any issues we may have. Review collected by and hosted on G2.com.
Some attacks such as in Data Exfil are missing details and remediation/prevention techniques. So we are unable to identify where we can prevent the same attack. Review collected by and hosted on G2.com.
Ease of use and implementation, Continuous customer success support Review collected by and hosted on G2.com.
low severity payloads in WAF can be streamlined Review collected by and hosted on G2.com.
Ease of Use. The platform is intuitive and user-friendly, making it accessible for organizations of varying sizes and levels of cybersecurity expertise. Cymulate KB is also very detailed so any one can follow the guided steps. Review collected by and hosted on G2.com.
Integration with few technology is still not there. If Cymulate can accomodate those than it will be very good. Solution is very technical and demands high involvement and engagement. Teams without adequate staffing may find it hard to keep the platform optimized. Review collected by and hosted on G2.com.
Cymulate has intutuive and dynamic dashboard with auto update and auto remediation feature. Review collected by and hosted on G2.com.
Auto remeditaion is recommended to be extended to behaviour based scenario as well. Review collected by and hosted on G2.com.
It is easy to use and setup & integrate and the platform is very easy to understand for making the team understand about the potential threats. Review collected by and hosted on G2.com.
The use cases are currently limited because of lesser number of endpoints, which can be increased to advance this platform further. Review collected by and hosted on G2.com.
Validation program is made easy by Cymulate due to 24*7 assessment , auto update of IOCs , SIEM detection validation Review collected by and hosted on G2.com.
There is nothing that i can think of at this moment Review collected by and hosted on G2.com.
Ease of use, implemantation and frequent CS connects for assitance. Review collected by and hosted on G2.com.
Sometime we face issue while configuring SMTP settings. Review collected by and hosted on G2.com.
The best aspect of Cymulate is its comprehensive and automated approach to Breach and Attack Simulation (BAS), which allows continuous security validation across the entire kill chain Review collected by and hosted on G2.com.
Overwhelming to new comes especially the advanced scenarios Review collected by and hosted on G2.com.

The shape of the threat funnel and pre-defined tests Review collected by and hosted on G2.com.
The delay in carrying out many of the tests.
The way the result is presented in the ATT&CK matrix
The “noise” generated in the hopper execution
Instabilities and difficulties with integrations with SIEMs, EDRs and other solutions
The absence of executive data in the reports
The absence of a mitigation control plan Review collected by and hosted on G2.com.