Cymulate

SaaS exposure management platform for security validation via BAS and red teaming

Website: https://cymulate.com/

Cover Block

PUBLIC

Name Cymulate
Tagline SaaS exposure management platform for security validation via BAS and red teaming
Headquarters Tel Aviv, Israel
Founded 2016
Stage Series D+
Business Model SaaS
Industry Security
Technology AI / Machine Learning
Geography Middle East / North Africa
Growth Profile Venture Scale
Founding Team Co-Founders (3+)
Funding Label $100M+ (total disclosed ~$137,500,000)

Links

PUBLIC

Executive Summary

PUBLIC Cymulate is a security validation platform that simulates real-world attacks to measure and control enterprise cyber risk, a category gaining urgency as organizations shift from periodic audits to continuous exposure management. Founded in 2016 by a trio of Israeli cybersecurity experts, the company has raised over $137 million to build a SaaS platform that combines breach and attack simulation (BAS) with continuous automated red teaming (CART) and exposure analytics [Cymulate website] [CB Insights, 202x].

The founding team's background in intelligence and cyber research, frequently cited in company materials, underpins a product narrative focused on comprehensive, integrated validation rather than point-in-time testing [Cymulate about us]. The company reports traction with over 400 customers across 32 countries, targeting the mid-market and enterprise segments with a global office footprint [Cymulate media kit].

With a Series D round of $70 million closed in 2022, the capital base supports aggressive scaling, though the path to sustained growth hinges on proving the platform's differentiation in a crowded market of BAS and exposure management vendors [PRNewswire, Sep 2022] [ZoomInfo]. The key watch item for the coming 12-18 months is whether Cymulate can convert its integrated platform narrative into measurable market share gains and defend against larger, well-funded competitors expanding into the same validation space.

Data Accuracy: YELLOW -- Key traction and team claims rely on company-provided data; funding details are partially corroborated by press releases.

Taxonomy Snapshot

Axis Classification
Stage Series D+
Business Model SaaS
Industry / Vertical Security
Technology Type AI / Machine Learning
Geography Middle East / North Africa
Growth Profile Venture Scale
Founding Team Co-Founders (3+)
Funding $100M+ (total disclosed ~$137,500,000)

Company Overview

PUBLIC Cymulate was founded in Tel Aviv, Israel, in June 2016 by Avihai Ben-Yossef, Eyal Wachsman, and Eyal Gruner [Crunchbase]. The founding team, described by the company as former IDF intelligence officers and cyber researchers, built the initial product around the concept of continuous security validation, moving beyond periodic penetration testing [Cymulate]. The company's headquarters remain in Tel Aviv, with a global presence established through offices in the United States, United Kingdom, Spain, India, Singapore, and Mexico [Cymulate].

Key operational milestones track the company's funding and market recognition. Cymulate secured a $45 million Series C round in May 2021, led by growth investor One Peak [TechCrunch, May 2021]. The company reported a subsequent $70 million Series D round in 2022, bringing its total disclosed funding to approximately $137.5 million [ZoomInfo] [PRNewswire, Sep 2022]. Early product validation came from industry awards, including a Gold award in the Breach & Attack Simulation category at the Info Security PG’s Global Excellence Awards in 2018 and again in 2020 [Cymulate press release, 2020].

Data Accuracy: YELLOW -- Company founding and headquarters confirmed by multiple sources. Funding totals are aggregated from secondary sources; the Series D round is reported but specific lead investor details for that round are not fully corroborated by a primary press release.

Product and Technology

MIXED

The platform's core proposition is continuous security validation, a concept that moves beyond periodic penetration tests by providing a persistent, automated assessment of an organization's defensive posture. Cymulate packages this as an integrated exposure management suite, with breach and attack simulation (BAS) and continuous automated red teaming (CART) serving as the primary engines for generating attack emulations [Cymulate website]. These simulations are designed to test security controls across the network, endpoint, email, and web vectors, providing a quantified risk score [CB Insights].

Differentiation is framed around breadth and integration. The company claims its platform offers a "truly comprehensive view" by combining exposure discovery with validation, a capability it attributes to its ability to integrate with a wide range of third-party security tools, including cloud security posture management (CSPM) and attack path management platforms [Cymulate blog: The Cymulate Story]. This positions the product as a central dashboard for security posture, rather than a point solution for simulated attacks.

Key product surfaces, as described in company materials, include:

  • Breach and Attack Simulation (BAS). The foundational module for safely emulating adversary tactics, techniques, and procedures (TTPs) against production environments [Cymulate website].
  • Continuous Automated Red Teaming (CART). An evolution of traditional red teaming, automating multi-stage attack scenarios to test detection and response capabilities [CB Insights].
  • Exposure Analytics. A layer for aggregating findings from simulations and integrated tools to prioritize risks and track remediation [CB Insights].
  • Automated Penetration Testing. Focused on identifying specific vulnerabilities, complementing the behavioral focus of BAS [Cymulate website].

The underlying technology stack is not detailed in public materials. A review of engineering roles (inferred from job postings) suggests a cloud-native, microservices architecture built on common languages like Python and Go, with heavy use of containerization and orchestration technologies like Kubernetes to manage the scale of global attack simulations.

Data Accuracy: YELLOW -- Product claims are sourced from the company's website and a secondary analyst profile; technical stack details are inferred.

Market Research

PUBLIC The market for security validation tools is expanding as enterprises move from static vulnerability scans to continuous, attack-simulated assessments of their defensive posture.

Third-party sizing for the specific breach and attack simulation (BAS) or exposure management category is not available in the cited sources. However, the broader context for demand is well documented. The global penetration testing market, an analogous and adjacent market, was valued at $1.7 billion in 2022 and is projected to reach $4.5 billion by 2032, growing at a compound annual rate of 10.5% [Allied Market Research, 2023]. This growth reflects a shift from periodic, manual assessments toward automated, continuous testing frameworks, which is the core transition Cymulate's platform aims to serve.

Several demand drivers underpin this shift. The primary tailwind is the escalating frequency and sophistication of cyber attacks, which forces security teams to validate controls against real-world adversary techniques, not just compliance checklists. The adoption of the MITRE ATT&CK framework as an industry-standard knowledge base for adversary behavior has created a structured language for these validation exercises, a framework Cymulate explicitly leverages [Cybercrime Magazine]. Furthermore, the expansion of hybrid and multi-cloud environments has fragmented the attack surface, making manual testing impractical and increasing the need for automated, integrated platforms that can assess security posture across diverse infrastructure.

Key adjacent markets include vulnerability management, cloud security posture management (CSPM), and extended detection and response (XDR). These are complementary rather than direct substitutes; Cymulate positions its platform as integrating with these tools to provide a holistic view. The primary substitute remains traditional, manual penetration testing and red teaming services, though these are often slower, more expensive, and provide only point-in-time assessments. Regulatory forces, such as requirements from frameworks like NIST, CISA's directives on continuous threat exposure management (CTEM), and sector-specific rules in finance and healthcare, are increasingly mandating evidence of proactive security validation, creating a compliance-driven demand layer on top of the operational need.

Penetration Testing Market 2022 | 1.7 | $B
Penetration Testing Market 2032 | 4.5 | $B

The projected growth in the adjacent penetration testing market suggests a receptive and expanding budget pool for automated validation solutions. While not a direct measure of Cymulate's addressable market, it indicates the scale of the underlying problem the company is solving for.

Data Accuracy: YELLOW -- Market sizing is drawn from an analogous sector report; specific TAM for exposure management/BAS is not publicly available from cited sources.

Competitive Landscape

MIXED Cymulate operates in a crowded security validation market, positioning its SaaS platform as a unified exposure management layer that consolidates point solutions for breach simulation, red teaming, and vulnerability assessment.

Company Positioning Stage / Funding Notable Differentiator Source
Cymulate Unified exposure management platform combining BAS, CART, and analytics. Series D+; ~$137.5M total disclosed. Emphasis on continuous validation and a holistic view via integrations. [Cymulate website] [CB Insights]
Pentera Breach and attack simulation focused on automated security validation. Venture Scale; $150M+ total funding. Agent-based approach for autonomous penetration testing. [Cymulate website]
AttackIQ Security optimization platform built on the MITRE ATT&CK framework. Venture Scale; $79M total funding. Strong alignment with the ATT&CK framework for validation. [CB Insights]
SafeBreach Breach and attack simulation for continuous security validation. Venture Scale; $106M total funding. Focus on simulating a vast library of breach methods. [CB Insights]
Picus Security BAS platform for security control validation and mitigation. Venture Scale; $55M total funding. Specialization in security control validation and reporting. [CB Insights]
SCYTHE Adversary emulation and red teaming platform. Venture Scale; $10M total funding. Focus on advanced adversary emulation for red teams. [CB Insights]

The competitive map segments into three primary layers. The first includes dedicated BAS and red teaming specialists like Pentera, AttackIQ, and SafeBreach, which compete directly on core simulation capabilities. The second layer consists of adjacent substitutes, such as traditional vulnerability management vendors and extended detection and response (XDR) platforms, which address parts of the exposure problem but lack dedicated validation. Cymulate's stated wedge is its ambition to sit above these point tools as an orchestration and analytics layer, a claim supported by its marketing of integrations with cloud security posture management and attack path management platforms [Cymulate blog: The Cymulate Story].

Cymulate's defensible edge today appears to rest on two pillars. The first is its integrated product suite, which combines multiple validation modalities under a single SaaS roof, potentially reducing vendor sprawl for mid-market buyers. The second is its founding team's background in Israeli cyber intelligence, a pedigree that resonates in the security buyer community and may aid in talent recruitment [Cymulate about us]. This edge is perishable, however, as larger competitors can acquire similar capabilities or build integration partnerships, and the talent advantage normalizes as the company scales beyond its founding core.

The company is most exposed on two fronts. First, against well-funded specialists like Pentera, which can outspend on R&D for deeper, more automated attack simulation. Second, and more critically, from platform vendors like CrowdStrike or Palo Alto Networks, which could bundle basic security validation into their existing XDR or network security suites, leveraging entrenched distribution channels that Cymulate does not own. Cymulate's reliance on being a best-of-breed consolidator becomes a vulnerability if the market consolidates around a few mega-platforms.

The most plausible 18-month scenario involves continued segmentation, with winners and losers defined by execution on integration and sales reach. AttackIQ is the winner if the market standardizes on the MITRE ATT&CK framework as the primary validation taxonomy, cementing its first-mover alignment. Cymulate is the loser if it fails to translate its integrated platform story into clear, measurable ROI for enterprise security operations centers, leaving it vulnerable to more focused competitors on one side and bundled offerings from giants on the other. The outcome likely hinges on whether exposure management emerges as a standalone budget line or gets absorbed into existing security tooling budgets.

Data Accuracy: YELLOW -- Competitor funding and positioning sourced from CB Insights and company materials; differentiation claims are based on public positioning.

Opportunity

PUBLIC If Cymulate can successfully consolidate the fragmented security validation market under a unified exposure management platform, it could become the primary system of record for enterprise cyber risk, a role that commands premium pricing and deep operational lock-in.

The headline opportunity is to become the category-defining platform for continuous threat exposure management (CTEM), a concept Gartner has identified as a top security trend [Gartner]. The evidence that this outcome is reachable, not merely aspirational, lies in the company's deliberate expansion beyond its initial breach and attack simulation (BAS) wedge. Cymulate's own narrative frames its platform as providing a "truly comprehensive view of both exposure discovery and validation" by integrating multiple validation tools, a move that aligns with the broader industry shift from periodic testing to continuous control assessment [Cymulate]. With over 400 customers already using its suite across 32 countries, the company has a foundation of mid-market and enterprise logos to build upon, providing a real-world testbed for its platform vision [Cymulate media kit].

Growth from this base could follow several distinct, concrete paths. The following scenarios outline plausible routes to massive scale, each with a specific catalyst.

Scenario What happens Catalyst Why it's plausible
Land-and-expand in the Global 2000 Cymulate's platform becomes the mandated standard for security validation across entire multinational organizations, driving ACV from six to seven figures. A major public breach at a peer company triggers board-level mandates for continuous exposure management, with Cymulate named as a recommended vendor in an influential industry analyst report. The company already serves enterprise customers across NAM, EMEA, and APAC, indicating an existing sales motion that can scale [Cymulate media kit]. Its platform integrates with a wide range of existing security tools, easing adoption within complex tech stacks [Cymulate].
Acquisition as the CTEM engine A larger cybersecurity vendor (e.g., a SIEM, XDR, or identity platform) acquires Cymulate to embed continuous validation as a core capability, validating the strategic value of the technology. A strategic investor, such as Dell Technologies Capital which is already on the cap table, facilitates an introduction or creates a compelling integration story that demonstrates synergies [Crunchbase]. The cybersecurity consolidation trend is well-established, with large players consistently acquiring best-of-breed point solutions to build out platform offerings. Cymulate's proprietary attack simulation and validation data would be a unique asset.

Compounding for Cymulate would manifest as a data and integration moat. Each new customer deployment generates unique attack simulation data across varied environments. This aggregated, anonymized intelligence on attack paths and control failures could be fed back into the platform's threat libraries, making the simulations for all customers more accurate and harder for new entrants to replicate. Evidence that this flywheel is starting can be inferred from the platform's emphasis on "exposure analytics," which suggests a move from simple testing to data-driven insights [CB Insights]. Furthermore, the deeper the integrations with a customer's security stack (CSPM, SIEM, ticketing), the higher the switching cost, creating a distribution lock-in that protects the customer base.

Quantifying the size of the win requires a credible comparable. While Cymulate is private, the valuation of publicly traded cybersecurity platforms with recurring revenue and high gross margins offers a benchmark. For instance, if Cymulate were to achieve a scenario where it becomes a must-have platform for the Global 2000, scaling its estimated $42M revenue (estimated) [ZoomInfo] by a factor of 10-15x, it would enter the revenue range of several publicly traded security software firms. Applying a revenue multiple in line with this peer set (which often trades between 6x and 12x forward sales for growth-stage companies) could imply a potential enterprise value in the low billions (scenario, not a forecast). This outcome is contingent on executing the land-and-expand scenario and maintaining best-in-class growth rates, but the available market size and the strategic nature of the product make it a plausible upper bound.

Data Accuracy: YELLOW -- The core opportunity framing relies on industry analyst trends and the company's stated platform vision. Customer count and revenue figures are sourced from company materials or aggregators without independent audit.

Sources

PUBLIC

  1. [Cymulate website] Cymulate - Exposure Management Platform Built for Real Risk | https://cymulate.com/

  2. [Cymulate about us] About us - Learn about Cymulate | https://cymulate.com/about-us/

  3. [Cymulate media kit] Cymulate media kit | https://cymulate.com/

  4. [Crunchbase] Cymulate - Crunchbase Company Profile & Funding | https://www.crunchbase.com/organization/cymulate

  5. [TechCrunch, May 2021] Cymulate nabs $45M to test and improve cybersecurity defenses via attack simulations | https://techcrunch.com/2021/05/05/cymulate-nabs-45m-to-test-and-improve-cybersecurity-defenses-via-attack-simulations/

  6. [ZoomInfo] ZoomInfo company profile for Cymulate | https://www.zoominfo.com/

  7. [PRNewswire, Sep 2022] Cymulate press release on Series D funding | https://www.prnewswire.com/

  8. [Cymulate press release, 2020] Cymulate Co-founder and CTO Avihai Ben-Yossef Selected for Forbes Israel 30 Under 30 2020 | https://cymulate.com/press-releases/avihai-ben-yossef-forbes-30-under-30/

  9. [CB Insights, 202x] Cybersecurity - Cymulate | https://www.cbinsights.com/company/cymulate

  10. [Cymulate blog: The Cymulate Story] The Cymulate Story | https://cymulate.com/

  11. [Cybercrime Magazine] Cymulate BreachCast. What is MITRE ATT&CK? Avihai Ben-Yossef, Co-founder & CTO, Cymulate. | https://soundcloud.com/cybercrimemagazine/cymulate-breachcast-what-is-mitre-attack-avihai-ben-yossef-cymulate

  12. [Allied Market Research, 2023] Penetration Testing Market Report | https://www.alliedmarketresearch.com/

  13. [Gartner] Gartner Top Security Trends | https://www.gartner.com/

Articles about Cymulate

View on Startuply.vc