In this installment of our 9-part series, we feature our portfolio company, Cymulate, a unique SaaS-based breach and attack simulation platform to resolve security gaps and stay one step ahead of attackers.
1. Vertex Perspectives
Breach & Attack Simulation
Unique SaaS-based breach and attack
simulation platform to safeguard business-
critical digital assets by exposing hidden
vulnerabilities and offering actionable insights
to resolve security gaps and stay one step
ahead of attackers
2. Company Snapshot
TEAM INVESTORS HIGHLIGHTS
Founders • Founded in 2016
• HQ: Rishon LeZion, Israel
• Series A
• Multiple recognitions including
• Cyber Security Excellence Awards 2019
• Infosec award winner 2019
• Cyber Defense Magazine Infosec Awards
Winner 2019
• Gartner Cool Vendor 2018
• Fortress cybersecurity award 2018
Eyal Wachsman, CEO
17 years of experience in the
information security field and
previously VP of sales and business
development at Avnet Cyber &
Information Security.
Avihai Ben-Yossef, CTO
Avihai served in an Intelligence Unit
of the IDF in a leading technological
role. Previously, Avihai was the
Head of the Cyber Research Team
at Avnet Cyber & Information
Security, where he worked for
several projects on behalf of the
Israeli Ministry of Defense.
3. Industry Challenges
Knowing your security posture seems impossible.
• How effective are current security controls?
• Is my organization safe right now?
• Would it withstand a multi-vector attack?
Organisations must validate their cyber posture more frequently,
more comprehensively and with greater responsiveness.
However, it has become too complicated to check how exposed
you are to cyber threats as every day brings new threats to avoid,
technologies to learn and skills to acquire.
Pen-testing and other alternatives may result in outdated reports
that are no longer relevant.
4. Solution Overview
Cymulate’s platform provides continuous verification of your security posture and susceptibility.
When activated, it deploys thousands of multi vector attacks, simulating countless threats our company may encounter, whether common or novel. Cymulate provides a
cybersecurity risk score, immediately exposes security gaps and offers clear guidelines on how to remediate them.
Cymulate’s design follows the flow of an Advanced Persistent Threat (APT), with no impact on the organization’s environment and users
Attempt to exfiltrate
sensitive data using
different techniques
Attack with
infected emails
Attack with
malicious websites
and links
Download and execute
malicious scenarios
ENDPOINT
Attack the Web
application against
OWASP Top 10
Mapping potential
attack paths and
vulnerable endpoints
across the network
LATERAL
MOVEMENT
Pre-Exploitation Exploitation Post-Exploitation
E-MAIL WEB
GATEWAY
Attack using
customized
phishing campaigns
PHISHINGWEB
APPLICATION
DATA
EXFILTRATION
IMMEDIATE THREAT FEATURE
6. Case Studies
“As the information security manager of our organization, while using Cymulate I can get an
up-to-date idea of the company resistance to cyberattacks and embrace the platform’s
suggestions for repairing existing security gaps.”
- Tamir Ronen, Chief Information Security Officer, Assuta Hospital
“After running much ad-hoc penetration testing for more than 10 years, we decided to
implement Cymulate’s cloud automated solution that can run unlimited cyberattack
simulations to expose all kinds of cyber holes in our organization and provide us with detailed
reports for our board and technical team..”
- Guy Raba, Chief Information Security Officer, Union Bank of Israel
“Cymulate was found to be the most effective and easy to deploy solution which provides
Telit the ability to run a controlled and comprehensive automated cybersecurity assessment.
It allows us to validate our security posture and controls to be prepared. We chose Cymulate
for their innovative approach and comprehensive attack vectors coverage..”
- Itzik Menasche, VP Global IT & Information Security, Telit
“I would recommend Cymulate because of its ease of use, it can quickly provide you a
window into how vulnerable or how protected your organization is against external threats.”
- Jorge Ruão, Head of Security Operations, Euronext
Cymulate is trusted by hundreds of
companies worldwide across various
industries from small business to large
enterprises for use cases including –
• Cyber posture assessment
• Security controls validation
• Compliance enablement
• Product comparison testing
• Budget prioritization
• Resilience against latest threats
• 3rd party supply chain posture
• Security stance following M&As
7. Competitive Advantage
Know if you’re secure in 3 simple steps.
1. Download agent
2. Run simulations
3. Get actionable results
Powerful SaaS-based platform
• Deploys in minutes
• Simple to use
• Test continuously or on-demand
• Latest threat simulations at your fingertips
• Covers the full attack kill chain
• Scalable
• Single agent, unlimited attacks
• Global office locations
Key benefits include
• Improve security posture
• Validate security controls
• Meet compliance mandates
• Improve security purchase process
• Assess security continuously
• Reduce dependence on manual methods
8. Thanks for reading!
About Vertex Ventures
Vertex Ventures is a global network of operator-investors who manage portfolios
in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand
experience in transformational technologies, on-the-ground knowledge in the
world’s major innovation centers and global context, connections and customers.
Contributors
Disclaimer
This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and
industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable
and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings
is under no obligation to update the information or communicate that any updates have been made.
Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives.
Vertex Perspectives: Cybersecurity Series
• Cybersecurity | Risk. Impact. Innovations.
• Cybersecurity | Axonius: Asset Management Platform
• Cybersecurity | Cylus: Railway Cybersecurity
• Cybersecurity | Cymulate: Breach & Attack Simulation
• Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments
• Cybersecurity | Indegy: Industrial Cybersecurity
• Cybersecurity | Meta Networks: NaaS Software Defined Perimeter
• Cybersecurity | PerimeterX: Next Generation Bot Defense
• Cybersecurity | Very Good Security: SaaS Platform for Data Security