Cymulate Breach & Attack Simulation Integration

Document created by Christine Tran Employee on Aug 9, 2019Last modified by Susan Read-Miller on Aug 28, 2019
Version 5Show Document
  • View in full screen mode

Cymulate logo

 

Cymulate is a SaaS-based breach and attack simulation platform that tests, measures and optimizes the effectiveness of your security controls. Cymulate challenges your security controls by initiating thousands of attack simulations, showing you exactly where you’re exposed and how to fix it.

 

This integration provides the option to insert Cymulate report data into RSA Archer On-Demand applications with built-in dashboards and reports. In addition, it provides the ability to pull vulnerability data per machine in the organization into the Cymulate platform.


The purpose of the integration is to allow RSA Archer customers to view all attack data done by Cymulate with custom dashboards and reports including average scores and to identify immediately vulnerable machines used and detected in the simulation.

 

Integration Features

Cymulate Breach & Attack Simulation integration enables organizations to:

  • Provide visibility of Cymulate data in RSA Archer
  • Cross-reference between Cymulate attacks and data within RSA Archer
  • Display advanced reports and dashboards in RSA Archer based on Cymulate’s attack data
  • Manage an organization’s vulnerabilities based on each machine

 

Solution and Platform Information

 

For More Information

To learn more about the Cymulate Breach & Attack Simulation RSA Ready certified integration:

 

For Additional Support

 

To learn more about Cymulate - please contact info@cymulate.com or +(972)-36919651, +(1)-2126522632. For technical support questions, please contact Support@cymulate.com.

Attachments

    Outcomes