Search company, investor...
Cymulate company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

Founded Year



Series D | Alive

Total Raised




Last Raised

$70M | 20 days ago

Mosaic Score

+80 points in the past 30 days

What is a Mosaic Score?
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

About Cymulate

Cymulate is a cybersecurity startup that conducts penetration tests. The company develops a platform enabling enterprises to simulate cyber attacks while testing the security system's resilience from the potential attacker's perspective. Among other things, it assesses an enterprise's readiness for ransom and phishing attacks and for detecting more complicated breaches through which hackers can take over an enterprise's computers and apps. The platform offers solutions such as security posture management, exposure management, phishing awareness, external attack surface management, and more. The company was founded in 2016 and is based in Tel Aviv, Israel.

Cymulate Headquarters Location

Maze St 3

Tel Aviv, 6578931,


+44 (134) 495-9736

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing Cymulate

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Cymulate in 1 CB Insights research brief, most recently on Dec 7, 2021.

Expert Collections containing Cymulate

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Cymulate is included in 1 Expert Collection, including Cybersecurity.



4,937 items

Latest Cymulate News

Global Automated Breach & Attack Simulation Market Research Report to 2027 - Featuring Cronus Cyber Technology, CyCognito, Cymulate and DXC Technology Among Others -

Sep 16, 2022

Competitive Strategic Window: The Competitive Strategic Window analyses the competitive landscape in terms of markets, applications, and geographies to help the vendor define an alignment or fit between their capabilities and opportunities for future growth prospects. It describes the optimal or favorable fit for the vendors to adopt successive merger and acquisition strategies, geography expansion, research & development, and new product introduction strategies to execute further business expansion and growth during a forecast period. FPNV Positioning Matrix: The FPNV Positioning Matrix evaluates and categorizes the vendors in the Automated Breach & Attack Simulation Market based on Business Strategy (Business Growth, Industry Coverage, Financial Viability, and Channel Support) and Product Satisfaction (Value for Money, Ease of Use, Product Features, and Customer Support) that aids businesses in better decision making and understanding the competitive landscape. Market Share Analysis: The Market Share Analysis offers the analysis of vendors considering their contribution to the overall market. It provides the idea of its revenue generation into the overall market compared to other vendors in the space. It provides insights into how vendors are performing in terms of revenue generation and customer base compared to others. Knowing market share offers an idea of the size and competitiveness of the vendors for the base year. It reveals the market characteristics in terms of accumulation, fragmentation, dominance, and amalgamation traits. The report provides insights on the following pointers: 1. Market Penetration: Provides comprehensive information on the market offered by the key players 2. Market Development: Provides in-depth information about lucrative emerging markets and analyze penetration across mature segments of the markets 3. Market Diversification: Provides detailed information about new product launches, untapped geographies, recent developments, and investments 4. Competitive Assessment & Intelligence: Provides an exhaustive assessment of market shares, strategies, products, certification, regulatory approvals, patent landscape, and manufacturing capabilities of the leading players 5. Product Development & Innovation: Provides intelligent insights on future technologies, R&D activities, and breakthrough product developments The report answers questions such as: 1. What is the market size and forecast of the Global Automated Breach & Attack Simulation Market? 2. What are the inhibiting factors and impact of COVID-19 shaping the Global Automated Breach & Attack Simulation Market during the forecast period? 3. Which are the products/segments/applications/areas to invest in over the forecast period in the Global Automated Breach & Attack Simulation Market? 4. What is the competitive strategic window for opportunities in the Global Automated Breach & Attack Simulation Market? 5. What are the technology trends and regulatory frameworks in the Global Automated Breach & Attack Simulation Market? 6. What is the market share of the leading vendors in the Global Automated Breach & Attack Simulation Market? 7. What modes and strategic moves are considered suitable for entering the Global Automated Breach & Attack Simulation Market? Market Dynamics

Cymulate Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Cymulate Rank

  • When was Cymulate founded?

    Cymulate was founded in 2016.

  • Where is Cymulate's headquarters?

    Cymulate's headquarters is located at Maze St 3, Tel Aviv.

  • What is Cymulate's latest funding round?

    Cymulate's latest funding round is Series D.

  • How much did Cymulate raise?

    Cymulate raised a total of $141M.

  • Who are the investors of Cymulate?

    Investors of Cymulate include Susquehanna Growth Equity, Vertex Ventures Israel, Dell Technologies Capital, Vertex Growth, One Peak Partners and 3 more.

  • Who are Cymulate's competitors?

    Competitors of Cymulate include Detectify, Veracode, PlexTrac, HackerOne, Pentera, CyCognito, XM Cyber, SafeBreach, SCYTHE, and 25 more.

You May Also Like

Pentera Logo

Pentera utilizes an automated penetration-testing platform that assesses and validates corporate cybersecurity risks. By applying the hacker's perspective and performing machine-based penetration testing, its software identifies, analyzes, and prioritizes remediation of cyber defense vulnerabilities and instrumentation.

Vulcan Cyber Logo
Vulcan Cyber

Vulcan Cyber is a Continuous Vulnerability Remediation solution that integrates, automates and orchestrates existing tools and processes, eliminating the most critical risks caused by vulnerabilities while at the same time avoiding any unexpected impact to business operations.

Detectify Logo

Detectify offers a website vulnerability scanner that is in part powered by the crowd. Detectify enables teams to quickly remediate vulnerabilities, scan daily, and enrich discovered assets with IPs, protocols, and ports. Detectify was founded in 2013 and is based in Stockholm, Sweden.

Veracode Logo

Veracode is an AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities.

Cobalt Labs Logo
Cobalt Labs

Cobalt, previously known as CrowdCurity, is a SaaS-based marketplace enabling modern businesses to crowdsource application security by connecting them with a talented, vetted community of security researchers.

Synack Logo

Synack provides security testing combining crowdsourced human talent with proprietary AI technology to increase effectiveness and efficiency. Synack smart security testing yields continuous and comprehensive testing protection, vulnerabilities, data about the strengths and weaknesses of an attack surface and how it changes over time, and provides documentation for compliance.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.