Cymulate Announces Technology Integration With Tenable

Cymulate logo

Cymulate’s BAS platform enables organizations to launch simulations of multi-vector cyberattacks against their networks, immediately exposing vulnerabilities and providing remediation steps.

This integration enables security teams to seamlessly view Tenable.io data from within Cymulate’s platform. This allows for improved insight into current exposures and risks, vulnerabilities and infiltration patterns within the corporate network to provide a more comprehensive view of the organization’s cybersecurity posture.

By taking vulnerability data and insight from Tenable.io and correlating them with Cymulate’s findings, organizations are able to better prioritize mitigation steps based on where they are most exposed.

“Our growing Cyber Exposure ecosystem provides an open and flexible platform that makes it easy to build integrated solutions that solve complete customer problems,” said Ray Komar, vice president of technology integrations, Tenable.

“The technology partnerships, such as the new integration with Cymulate, built into our sprawling ecosystem connect solutions and data to accelerate customers’ ability to understand, manage and reduce cyber risk.”

“We at Cymulate use the vulnerability scan results from Tenable.io to correlate with our Lateral Movement Assessment,” said Avihai Ben-Yossef, CTO, Cymulate.

“By combining the results, we provide a comprehensive assessment of the detected actual and potential attack patterns that attackers can use to move laterally inside the network. This allows organizations to validate misconfiguration in their networks and find out where vulnerabilities would expose them the most.”

Cymulate helps companies to stay one step ahead of cyber attackers with a unique breach and attack simulation platform that empowers organizations with complex security solutions to safeguard their business-critical assets. By mimicking the myriad of strategies hackers deploy, the system allows businesses to assess their true preparedness to handle cyber security threats effectively.

 

Source: cymulate.com
0 Comments