IF

Itzik Finkel

Deputy CEO

Cymulate

Petah Tikva, Center District


Contact Information

Email
Unlock
LinkedIn

Company Information

Company
Cymulate
Industry
computer & network security
Employees
280.0
Seniority
C suite
Annual Revenue
28899000.0
Total Funding
141000000.0
Latest Funding
Series D

Technologies

Salesforce Cloudflare DNS Outlook Microsoft Office 365 Zendesk CloudFlare Hosting VueJS CloudFlare Digital Ocean Spaces Atlassian Cloud Drift React Redux MongoDB Hubspot SparkPost LiveRamp Facebook Login (Connect) Google Analytics DoubleClick Conversion Mobile Friendly Gravity Forms Vimeo Greenhouse.io YouTube Amadesa Adobe Media Optimizer LeadForensics Google Dynamic Remarketing Linkedin Marketing Solutions Cedexis Radar DoubleClick Visual Website Optimizer Hotjar Shutterstock Twitter Advertising New Relic Facebook Widget Google Tag Manager reCAPTCHA Facebook Custom Audiences WordPress.org Remote AI

Keywords

cyber posture cyber attack simulation breach & attack simulation validate controls security validation security risk assessment cyber risk assessment security testing security controls security threat assessment cyber intelligence bas cyber threat assessment it security assessment automated penetration testing automated security validation continuous automated red teaming threat exposure validation exposure management security control validation attack surface management cyber resilience threat intelligence vulnerability assessment security gap identification real-world attack scenarios cybersecurity risk assessment security optimization threat detection incident response testing network penetration testing cloud security validation simulation of cyber threats proactive security measures compliance reporting attack path mapping exposure analytics remediation planning threat simulation deployment of security controls security awareness training phishing simulation automated testing immediate threat assessment security policy tuning security metrics measurement cybersecurity assessments custom attack scenarios full kill-chain simulations risk prioritization automated scanning security framework alignment mitigation guidance dynamic reporting continuous improvement in security posture ai-driven security testing cross-environment security validation integration with siem real-time insights into vulnerabilities cybersecurity threat exposure management risk mitigation automated security testing actionable insights security posture it security enterprise security risk-based asset profiling incident response customer support user-friendly interface operational efficiency risk reduction saas platform security gaps real-time testing compliance proactive security industry-specific solutions healthcare cybersecurity financial services security manufacturing security energy sector security computer & network security information technology & services

Get Full Contact Details

Subscribe to reveal email addresses and export contacts.

View Plans