Try our new research platform with insights from 80,000+ expert users

Share your experience using XM Cyber

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 98,000+ reviews on PeerSpot:

IT Security manager at a tech services company with 10,001+ employees
Real User
Have improved risk quantification and remediation prioritization through targeted attack path analysis
Pros and Cons
  • "Since implementing XM Cyber, we have improved the way we are doing patching, focusing on the choke points in our patching cycle, and it improves the way we assess the risk."
  • "There are many interesting things about XM Cyber, but the part that can be improved is the mobile exposure and the IBM i specific equipment."

What is our primary use case?

We use XM Cyber to define scenarios we are most worried about, including all the external entry points to our critical assets.

One of the main use cases I set up with XM Cyber is for internet-exposed assets to our domain controllers, which allows us to quantify the risk and prioritize our remediation.

We also use XM Cyber to determine lateral movement in a hybrid cloud, between the cloud and our on-premises.

What is most valuable?

XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.

We take the EMS service, and on a monthly basis, we have an executive report and also a technical report to present the risk at both the executive and technical level.

There is a very interesting feature about cross-graph concerning lateral movement and also about choke points, which allows us to focus on what matters the most.

Since implementing XM Cyber, we have improved the way we are doing patching, focusing on the choke points in our patching cycle, and it improves the way we assess the risk.

This focus on choke points and risk assessment has resulted in faster patching cadence, especially on the choke points, leading to a reduction of the risk, which is what we're looking for from this solution.

What needs improvement?

There are many interesting things about XM Cyber, but the part that can be improved is the mobile exposure and the IBM i specific equipment.

For how long have I used the solution?

I have been using XM Cyber for two years.

What do I think about the stability of the solution?

XM Cyber is stable.

What do I think about the scalability of the solution?

Its scalability is great; it's easy to deploy and fully scalable.

How are customer service and support?

The customer support was great, with particular attention to answering our questions.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not use any other tool before XM Cyber.

How was the initial setup?

My experience with pricing, setup cost, and licensing for XM Cyber was fine. We found great value in the tool, so we are ready to pay the license.

What was our ROI?

We have seen a return on investment through the quantification of the risk and tracking those risks to our management by following the security score of all the scenarios we have built, as well as tracking the remediation of choke points.

Which other solutions did I evaluate?

Before choosing XM Cyber, we launched an RFP and assessed Simulate and Pentera.

What other advice do I have?

I would rate XM Cyber a nine out of ten.

If others are looking for an easy solution that allows them to visualize attack paths on what really matters, I would recommend XM Cyber.

I want to say that I'm more than happy to work with XM Cyber, and it's a great value for a company.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
Chee Young Tan - PeerSpot reviewer
Director at ST Electronics
Real User
Top 10Leaderboard
Has a valuable feature for attack simulation; it highlights the vulnerability and offers recommendations for improvement
Pros and Cons
  • "The platform's most valuable feature is attack simulation."
  • "XM Cyber could identify all areas of vulnerability. They could expand the identification span for different areas."

What is our primary use case?

We use the product to identify the vulnerabilities in the network.

What is most valuable?

The platform's most valuable feature is attack simulation. It provides an efficient testing ground for security functionalities.

What needs improvement?

XM Cyber could identify all areas of vulnerability. They could expand the identification span for different areas.

For how long have I used the solution?

We have been using XM Cyber for a year. At present, we are using the latest version.

What do I think about the stability of the solution?

I rate the platform's stability an eight out of ten.

What do I think about the scalability of the solution?

We work with ten XM Cyber customers. It is suitable for medium to large enterprises. I rate the scalability an eight out of ten.

How was the initial setup?

There are many ways to deploy XM Cyber. We encounter complexity while deploying the agent during the setup. I rate the process a seven out of ten.

What's my experience with pricing, setup cost, and licensing?

We have to pay standard licensing fees. There are no additional costs. It is an expensive product. I rate the pricing a seven out of ten.

What other advice do I have?

XM Cyber helps identify risk by creating a shadow environment mirroring the production system. While it doesn't directly mitigate risks, it simulates attacks across this replica, uncovering vulnerabilities and weak points within the system. Once a WISC is established, it highlights the vulnerability and offers recommendations for improvement. It provides reporting templates, making the process faster.

I rate it an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. consultant