Vendor: XM Cyber
What it does: XM Cyber simulates, validates and remediates attacks through safe, continuous attack simulation to expose real-life security issues stemming from vulnerabilities, human errors and misconfigurations.
What we liked: The XM Cyber dashboard is one of our favorites and remains a standout feature of this platform. It offers flexible assessments with an unlimited number of scenarios and configurations. Security pros will find the Battleground View especially valuable.
XM Cyber simulates, validates and remediates attacks through safe, continuous attack simulation. These simulations then expose real-life security issues stemming from vulnerabilities, human errors and misconfigurations. Large networks are complex and susceptible to human error. Unfortunately, organizations typically have little or no awareness of how the complexity and perpetual expansion of their attack surface leaves them vulnerable. Without sufficient visibility, organizations have no way of knowing if they have configured their security controls properly, whether hackers can reach their critical assets and which security gaps they must prioritize and fix.
This platform focuses instead on preventing the root causes of attacks and it centers all its assessment scenarios on this approach. XM Cyber conducts simulations that utilize the attack surfaces of devices, networks, clouds and user behaviors in real-time to detect environmental changes and identify those that put assets at risk. There are various types of scenarios that target assets in different ways, making it easy to spot risks without requiring an in-depth understanding of the risks themselves. Analysts may schedule campaigns for a designated period, during which time the system will log all the events that occur on their environment. Analysts may also schedule campaigns with a reoccurring cadence for routine controls testing and maintenance.
The XM Cyber dashboard remains a standout feature of this platform. It offers flexible assessments with an unlimited number of scenarios and configurations, displays results with actionable, at-a-glance information, reveals changes in security ratings and highlights at-risk assets. Users will appreciate its sophisticated design, intuitive layout and simplified navigation.
The Battleground View within the interface gives security teams greater visibility into their environments by offering red and blue team capabilities that show how assessments play out in real-time, the current placement of network segmentation and the potential for lateral movements on various systems or devices. Red assets indicate compromised devices and uncover choke points on easily accessible machines, while blue nodes suggest discoverable areas. In the Battleground View, diamonds flag the locations of environmental crown jewels, while the log shows the techniques that hackers may use to reach them. XM Cyber gathers this information by mimicking the vulnerabilities that hackers actively exploit in the wild.
There are extensive exportable reporting options that prioritize remediations to close the attack paths that lead to assets. The Critical Asset Findings, for example, give detailed descriptions about the vulnerabilities the platform has found, link these vulnerabilities directly to the related MITRE ATT&CK techniques and provide actionable advice to remediate any risks. All reports have a sophisticated design with rich information, ensuring that XM Cyber always displays the right data in the way that its users prefer.
Overall, XM Cyber empowers customers with safe and continuous assessments within production environments to help identify all possible attack paths. This simulation method drives prioritization, focuses mainly on the riskiest vulnerabilities, helps analysts better understand the various impacts and issues within their environments and bolsters security.
Pricing starts at $95,000 and includes full support and maintenance.