Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search software
Software
Expand/Collapse Software
AI Agents
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Leave a Review
Join or Log In
Search
Search Software and Services
Expand/Collapse
Home
...
Breach and Attack Simulation (BAS) Software
Cymulate
XM Cyber Exposure...
Cymulate-vs-XM Cyber Exposure...
Compare Cymulate and XM Cyber Exposure Management Platform
Social Share Options
All Categories
Exposure Management Platforms
Breach and Attack Simulation (BAS)
All Reviewers
Small-Business Reviewers
Mid-Market Reviewers
Large Enterprise Reviewers
Save your comparison
Keep these tools in one place and come back anytime.
Save to board
Featured Products
Sponsored
Check Point Exposure Management
4.6/5
(168)
Visit Website
Sponsored
Picus Security
4.8/5
(221)
Visit Website
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
Cymulate
(175)
4.9
out of
5
Cymulate
By
Cymulate
Get a quote
XM Cyber Exposure Management Platform
(1)
3.5
out of
5
XM Cyber Exposure Management Platform
By
XM Cyber
At a Glance
Star Rating
(175)
4.9
out of
5
(1)
3.5
out of
5
Market Segments
Enterprise (56.0% of reviews)
Information
Mid-Market (100.0% of reviews)
Information
Pros & Cons
Ease of Use
(73)
Security
(41)
Improvement Needed
(12)
Integration Issues
(10)
Not enough data
Entry-Level Pricing
No pricing available
No pricing available
Cymulate
Star Rating
(175)
4.9
out of
5
Market Segments
Enterprise (56.0% of reviews)
Information
Pros & Cons
Ease of Use
(73)
Security
(41)
Improvement Needed
(12)
Integration Issues
(10)
Entry-Level Pricing
No pricing available
Learn more about Cymulate
XM Cyber Exposure Management Platform
Star Rating
(1)
3.5
out of
5
Market Segments
Mid-Market (100.0% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about XM Cyber Exposure Management Platform
Pricing
Entry-Level Pricing
Cymulate
No pricing available
XM Cyber Exposure Management Platform
No pricing available
Free Trial
Cymulate
No trial information available
XM Cyber Exposure Management Platform
No trial information available
Ratings
Meets Requirements
9.7
169
Not enough data
Ease of Use
9.7
171
Not enough data
Ease of Setup
9.7
169
Not enough data
Ease of Admin
9.8
137
Not enough data
Quality of Support
9.8
168
Not enough data
Has the product been a good partner in doing business?
9.8
135
Not enough data
Product Direction (% positive)
9.6
169
Not enough data
Features by Category
Vulnerability Scanner
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Performance
Issue Tracking
Not enough data
Not enough data
Detection Rate
Not enough data
Not enough data
False Positives
Not enough data
Not enough data
Automated Scans
Not enough data
Not enough data
Network
Compliance Testing
Not enough data
Not enough data
Perimeter Scanning
Not enough data
Not enough data
Configuration Monitoring
Not enough data
Not enough data
Application
Manual Application Testing
Not enough data
Not enough data
Static Code Analysis
Not enough data
Not enough data
Black Box Testing
Not enough data
Not enough data
Agentic AI - Vulnerability Scanner
Autonomous Task Execution
Not enough data
Not enough data
Proactive Assistance
Not enough data
Not enough data
Breach and Attack Simulation (BAS)
Hide 10 Features
Show 10 Features
8.9
53
Not enough data
Simulation
Test Agent Deployment
9.2
(won by default)
49
Not enough data
Breach Simulation
9.1
(won by default)
46
Not enough data
Attack Simulation
9.1
(won by default)
43
Not enough data
Resolution Guidance
8.5
(won by default)
45
Not enough data
Customization
Multi-Vector Assessment
9.0
(won by default)
45
Not enough data
Scenario Customization
8.7
(won by default)
47
Not enough data
Range of Attack Types
9.1
(won by default)
46
Not enough data
Administration
Reporting
8.6
(won by default)
51
Not enough data
Risk Evaluation
8.7
(won by default)
46
Not enough data
Automated Testing
9.3
(won by default)
50
Not enough data
Cloud Security Posture Management (CSPM)
Hide 11 Features
Show 11 Features
Not enough data
Not enough data
Configuration
DLP Configuration
Feature Not Available
Not enough data
Configuration Monitoring
Not enough data
Not enough data
Unified Policy Management
Feature Not Available
Not enough data
Adaptive Access Control
Feature Not Available
Not enough data
API / Integrations
Not enough data
Not enough data
Visibility
Multicloud Visibility
Feature Not Available
Not enough data
Asset Discovery
Not enough data
Not enough data
Vulnerability Management
Threat Hunting
Not enough data
Not enough data
Vulnerability Scanning
Not enough data
Not enough data
Vulnerability Intelligence
Not enough data
Not enough data
Risk-Prioritization
Not enough data
Not enough data
Attack Surface Management
Hide 12 Features
Show 12 Features
Not enough data
Not enough data
Asset Management
Asset Discovery
Not enough data
Not enough data
Shadow IT Detection
Not enough data
Not enough data
Change Management
Not enough data
Not enough data
Monitoring
Gap Analysis
Not enough data
Not enough data
Vulnerability Intelligence
Not enough data
Not enough data
Compliance Monitoring
Not enough data
Not enough data
Continuous Monitoring
Not enough data
Not enough data
Risk Management
Risk-Prioritization
Not enough data
Not enough data
Reconnaissance
Not enough data
Not enough data
At-Risk Analysis
Not enough data
Not enough data
Threat Intelligence
Not enough data
Not enough data
Generative AI
AI Text Summarization
Not enough data
Not enough data
Application Security
Hide 1 Feature
Show 1 Feature
Not enough data
Not enough data
Generative AI
AI Text Summarization
Not enough data
Not enough data
SAP Security Software
Hide 9 Features
Show 9 Features
Not enough data
Not enough data
Functionality - SAP Security Software
Visualizations
Not enough data
Not enough data
Log Analysis
Not enough data
Not enough data
SIEM capabilities
Not enough data
Not enough data
Prebuilt content and integrations
Not enough data
Not enough data
User Identification
Not enough data
Not enough data
360 degree security
Not enough data
Not enough data
Agentic AI - SAP Security Software
Autonomous Task Execution
Not enough data
Not enough data
Cross-system Integration
Not enough data
Not enough data
Proactive Assistance
Not enough data
Not enough data
Exposure Management Platforms
Hide 6 Features
Show 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Predictive Analytics
Not enough data
Not enough data
Automated Threat Detection
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Comprehensive Risk Assessment
Not enough data
Not enough data
Advanced Analytics and Reporting
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Integration and Data Consolidation
Not enough data
Not enough data
Real-time Monitoring and Alerts
Not enough data
Not enough data
SAP Store
Hide 7 Features
Show 7 Features
Not enough data
Not enough data
Agentic AI - SAP Store
Autonomous Task Execution
Not enough data
Not enough data
Multi-step Planning
Not enough data
Not enough data
Cross-system Integration
Not enough data
Not enough data
Adaptive Learning
Not enough data
Not enough data
Natural Language Interaction
Not enough data
Not enough data
Proactive Assistance
Not enough data
Not enough data
Decision Making
Not enough data
Not enough data
Cloud Security
Hide 9 Features
Show 9 Features
Not enough data
Not enough data
Cloud Visibility
Data Discovery
Not enough data
Not enough data
Cloud Registry
Not enough data
Not enough data
Cloud Gap Analytics
Not enough data
Not enough data
Security
Data Security
Not enough data
Not enough data
Data loss Prevention
Not enough data
Not enough data
Security Auditing
Not enough data
Not enough data
Identity
SSO
Not enough data
Not enough data
Governance
Not enough data
Not enough data
User Analytics
Not enough data
Not enough data
Categories
Categories
Shared Categories
Cymulate
XM Cyber Exposure Management Platform
Cymulate and XM Cyber Exposure Management Platform are categorized as
Exposure Management Platforms
and
Breach and Attack Simulation (BAS)
Unique Categories
Cymulate is categorized as
Cloud Security Posture Management (CSPM)
XM Cyber Exposure Management Platform is categorized as
Attack Surface Management
,
SAP Store
,
Vulnerability Scanner
, and
SAP Security Software
Reviews
Reviewers' Company Size
Cymulate
Small-Business
(50 or fewer emp.)
2.3%
Mid-Market
(51-1000 emp.)
41.7%
Enterprise
(> 1000 emp.)
56.0%
XM Cyber Exposure Management Platform
Small-Business
(50 or fewer emp.)
0%
Mid-Market
(51-1000 emp.)
100.0%
Enterprise
(> 1000 emp.)
0%
Small-Business
(50 or fewer emp.)
2.3%
0%
Mid-Market
(51-1000 emp.)
41.7%
100.0%
Enterprise
(> 1000 emp.)
56.0%
0%
Reviewers' Industry
Cymulate
Financial Services
22.4%
Banking
17.8%
Information Technology and Services
17.8%
Computer & Network Security
7.5%
Information Services
4.6%
Other
29.9%
XM Cyber Exposure Management Platform
Automotive
100.0%
‐
‐
‐
‐
Other
0.0%
Alternatives
Cymulate Alternatives
Pentera
Add Pentera
Picus Security
Add Picus Security
Wiz
Add Wiz
Scrut Automation
Add Scrut Automation
See all alternatives
XM Cyber Exposure Management Platform Alternatives
Wiz
Add Wiz
Red Hat Ansible Automation...
Add Red Hat Ansible Automation Platform
Scrut Automation
Add Scrut Automation
Tenable Nessus
Add Tenable Nessus
See all alternatives
Discussions
Cymulate Discussions
Cymulate has no discussions with answers
See all discussions
XM Cyber Exposure Management Platform Discussions
XM Cyber Exposure Management Platform has no discussions with answers
See all discussions
Ask Cymulate a Question
Contact Cymulate
Ask XM Cyber Exposure... a Question
Contact XM Cyber Exposure...
Spotlight Categories
Multi-Country Payroll Software
Remote Monitoring & Management (RMM) Software
CPQ Software
Event Registration and Ticketing Software
At a Glance
Pricing
Ratings
Features
Reviews
Alternatives
Discussions
Add Product
Cymulate
Get a quote
XM Cyber Exposure Management Platform
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
LinkedIn
or continue with
Google
Google
Create an account
Already have an account?
Log in
Create an account
Already have an account?
Log in
By proceeding, you agree to our
Terms of Use
and
Privacy Policy
Add more products
Search for Software and Services
Suggested Products
Pentera
(144)
4.5
out of
5
Add
Picus Security
(221)
4.8
out of
5
Add
AttackIQ Platform
(1)
4.5
out of
5
Add
SafeBreach
(1)
4.5
out of
5
Add
Sophos PhishThreat
(23)
4.3
out of
5
Add