Cymulate Named a Gartner “Cool Vendor” in Application and Data Security

RISHON LEZION, Israel--()--Cymulate, the leading provider of a SaaS-based breach & attack simulation (BAS) platform, was named a "Cool Vendor" in Gartner’s May 2018 “Cool Vendors in Application and Data Security” report.

Operating for less than two years with more than 100 customers worldwide, Cymulate’s unique breach & attack simulation (BAS) platform assesses customers’ security posture from an attacker’s perspective using actual attack methods. By exposing hidden vulnerabilities and offering actionable insights, Cymulate helps to identify and resolve security gaps before it is too late. Cymulate provides the industry’ only cloud-based BAS platform.


“As Gartner notes in their Cool Vendors report, ‘Digital business trends are challenging traditional security models that rely on control over endpoints, servers, the networks and applications delivering data to users',” said Cymulate CEO Eyal Wachsman. “We believe being named a ‘Cool Vendor’ validates Cymulate’s mission to improve the way companies test their security posture and verify their resiliency to cyberattacks at any time, from anywhere.”

According to Gartner’s Cool Vendors report, “By 2021, requirements for greater efficiency in threat response will drive 20% of buyers to heavily weight automation in buying criteria. By 2020, 25% of new digital business initiatives will adopt a continuous, adaptive risk and trust assessment (CARTA) strategic approach, which is an increase from fewer than 5% in 2017.”

“Again, Gartner says it well: ‘Security and risk management leaders should consider new technologies that enable the continuous business revolution, rather than retaining the gate-driven, blocking models of traditional security’,” said Wachsman. “The adoption of Cymulate’s BAS platform by a growing global customer base underscores this need, especially since every enterprise is operating in a highly challenging market where ongoing cyberattacks compromise corporate assets and disrupt business continuity.”

About Cymulate
Cymulate helps companies to stay one step ahead of cyber attackers with a unique breach and attack simulation (BAS) platform that empowers organizations with complex security solutions to safeguard their business-critical assets. By mimicking myriad strategies hackers deploy, the system allows businesses to assess their true preparedness to handle cyber security threats effectively. An on-demand SaaS-based platform lets users run simulations 24/7 from anywhere, shortening the usual testing cycle, and speeding up time to remediation. Cymulate was established in 2016 by former IDF intelligence officers and leading cyber researchers with extensive experience in offensive cyber solutions. The company serves a broad range of industries, including finance, health care, and telecommunication.
To ask for a trial or to request more information, visit

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

To read the complete Gartner Cool Vendors in application and data security, please visit:

Source:  Business Wire


Observer Solutions was founded by business leaders who saw that the fog of cyber security had become so dense that we built a research and consulting team to cut through to provide absolute clarity on the as is situation with clear plain English recommendations on steps to enhance.
Our mantra has become two-fold: Simplify and Automate.


  • +44 (0) 203 697 1364
  • +44 (0) 7767 766653
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

© 2018 Observer Solutions. All Rights Reserved. Created & Designed by Gekkota     | Privacy Policy | Sitemap |  

Account Management

  • Directory Service
  • Identity Governance and Administration
  • Privileged Account Management
  • User Authentication

Malware Defence

  • Endpoint Detection and Response
  • Endpoint Protection
  • Specialized Threat Analysis and Protection
  • Unified Threat Management

Secure Network

  • IPS
  • NAC
  • Network Behaviour Monitoring
  • Network Firewall
  • Network Security Policy Management
  • Secure Remote Access
  • Threat Intelligence

Secure Configuration

  • MDM
  • Security Configuration Management

Data Security

  • Active Breach Detection
  • Database Activity Monitoring
  • DLP
  • Email Security Gateway
  • File Integrity Monitoring
  • Web Security Gateway

Incident Management

  • Cybersecurity Management
  • Incident Response
  • Security Orchestration and Automation
  • SIEM
  • Ticketing System

Security Assessment

  • Database Vulnerability Assessment
  • Policy and Risk Management
  • Vulnerability Scanner
  • Web Application Vulnerability Scanner

Physical Security

  • Physical Access Control
  • Security Cameras

Secure Applications

  • WAP
  • Web Application Security Scanner

This site uses cookies for a better user experience. By continuing on it you accept our privacy policy terms.

Learn more