What is our primary use case?
The main use case for XM Cyber is primarily to help us understand risks around our data center estate, and we're starting our second use case by using it in the cloud. It helps us to manage risk and identify where to apply efforts for remediation.
Once we deployed XM Cyber, it allowed us to gain insights where normal vulnerability scanners are very limited. Vulnerability scanners primarily focus on patches, issues, and severity levels, and some handle this with lightweight intelligence. XM Cyber goes one step further because it's not always about patches, but about credentials and memory or Active Directory configurations. It's more tuned to how an attacker will start once they compromise your entry points or machines. It's the first step on how they do reconnaissance, and they pivot, which we call from one asset to another asset toward your crown jewels. It's about constantly mimicking the attackers, giving you better insights on how to manage your risks and focus remediation efforts on several assets, which we call chokepoints, to reduce other risks elsewhere so they can't reach the pot of gold.
XM Cyber allows us to focus our remediation efforts. Typically, remediation IT teams focus sometimes depending on the size and age of their estate, maybe up to 20% of their time. Depending on the IT teams, it could range from five individuals to 30 or 40 individuals; if you equate that into time, that's a large amount. XM Cyber really allows us to focus their efforts on what's important to the business, which is managing that risk. From industry data and our own, we know that only 8% are exploited regarding patching, so XM Cyber straight away allows us to focus. It also allows us to focus on other issues besides patching, such as credentials and memory. We have reduced this down from approximately 20% to 8%, resulting in considerable savings in time and money while managing the risk much better.
In that particular regard, previously other CISOs would probably have to deploy red teams or pen testers constantly to have visibility because IT estates are not static; they are constantly changing and configurations are changing. XM Cyber runs these risk scenarios at different parts of your estate constantly, mimicking the real world. It allows us to focus on what's important—remediation of particular chokepoints can eliminate or reduce the risk to a negligible point, disrupting hackers on their path from server to server navigating toward the pot of gold. It's all about risk management and focusing on efforts that matter to the company.
What is most valuable?
There was a very compelling moment when we first installed XM Cyber; it was six weeks in, and naturally, we kept some of our existing tooling as an overlap. XM Cyber saw something that could have hurt us as a business, which made it clear we saw immediate value from that moment. We remediated it quickly, which was crucial for us, and it saved a lot of effort. If the particular servers had been compromised, it could have hurt us, so XM Cyber helps us identify issues constantly.
One important recent development over the last year of XM Cyber is Attack Surface Management, which monitors our attack surface management. Previously, we monitored it, but with XM Cyber's recent capabilities, it looks from the outside in—how people often do reconnaissance on your estate, perhaps wrong ports open, wrong configurations, or vulnerabilities exposed. You can then translate that reflection onto the internal part, so it gives you full line of sight from outside right down to the internals, which is very important.
Approximately, we have 20 people in IT managing our data center estate. Their time was typically 15 to 20%, which we've reduced down to 8% of their time. If you multiply that by typically 35 hours, I am saving probably about seven hours per week per individual. When multiplied, there's immediate cost saving. More importantly, we conduct quantitative risk assessments using the FAIR framework, which includes our resistance to attack as part of how we measure it. XM Cyber provides excellent metrics to help us gauge that, and part of it involves reducing our loss exposure amount. With XM Cyber managing our risks better, our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
What needs improvement?
We tightly integrate with APIs, consuming feeds and open source data. We have integrated with XM Cyber, and we are elevating ourselves with AI and MCP tools as we view this as a forerunner to reducing the workload for our agents and IT staff. We're pushing all our security partners to provide AI and MCP tools. Our vision is for them to offer a chat interface where a junior IT or an experienced infrastructure engineer can ask for what needs to be patched next without using an interface.
Their current interface is very usable and professional, ranking in the top tier of applications. Their reporting is good, offering custom reports, and their API integration is a new capability that serves us well. We have high expectations for the next generation, such as a chat interface to ask questions. However, everything has been very good. We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments. I would like access to that and querying languages, enabling more informed business decisions.
XM Cyber sees much of our estate, which is beneficial for making informed decisions, and we can harness those insights and data for business analytics. For instance, it could help us gain insights into change management—if a particular server impacts another and that server is supported by yet another server, we could glean significant insights for change management meetings.
For how long have I used the solution?
We have been using XM Cyber for just over two years.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
We have not experienced any issues with scalability or reached its limits. We do test their beta product releases, and what is heartwarming is how quickly they respond to issues and subtle nuances in their design. This responsiveness indicates a strong partnership; a security partner that listens to their customers.
How are customer service and support?
The customer support is fantastic; it's probably some of the best we've received across all our security vendors. My team agrees, and it includes a diverse range of people. Over the last 10 to 15 years, XM Cyber is probably in the top two for customer support.
Which solution did I use previously and why did I switch?
We did not use a different solution. We utilized and still conduct security penetration testing. We have indirectly saved on the number of pen tests required, still conducting the same amount but in different business areas. XM Cyber acts as a lightweight security pen tester running across your environment daily, which brings substantial value.
How was the initial setup?
The setup was quite simple. We were very concerned about deploying XM Cyber agents across our estate since we have a mixed Linux and Windows environment, which might require us to reboot servers, thereby slowing the rollout capability and time to value. We were pleasantly surprised that during our proof of concept and in reality, we did not have to reboot any servers whatsoever. This was a strong advocate for XM Cyber's deployment.
The training was excellent across the team, including multiple training sessions, and the online information and remediation advice provided are excellent. Regarding commercials, I communicated with the UK sales team, and they were very good, professional, and not overly pushy, resulting in a long-term view and understanding, along with the support we needed.
What was our ROI?
Six weeks into using XM Cyber, we saw a compelling return on investment—primarily in risk reduction. There was a specific issue that our other security tooling did not pick up, but XM Cyber did. This marked a compelling moment for us, in addition to the fact that we reduced the amount of time spent on IT remediation. Previously, that was up to about 15% of their time, which we've reduced to 8%. Mathematically, you can calculate the savings, leading to over 60,000 US dollars saved per year. However, our most significant saving is in reducing our loss exposure amount. If a negative scenario were to occur, the likelihood of that happening is less, enabling us to conduct much better quantitative risk management.
Which other solutions did I evaluate?
We did evaluate the market and considered several options but eventually decided to move forward with XM Cyber through a proof of concept. We have a set method for introducing security technology into the business, which involves use case assessments and integration points. During our four-week proof of concept, we tightly integrated with their API, trained our teams, and deployed the solution, which satisfied our requirements. Typically, we discover the majority of issues within those first four weeks. After signing, by week six, we saw the value.
What other advice do I have?
My advice for others considering XM Cyber is to plan well. It is worth purchasing from a security perspective. Initially, I believed I would use XM Cyber for only 12 months, but I changed my views a few weeks into that and reset my expectations. Now it is a core part of my strategy for identification. I would say to potential CISOs and security teams to plan thoroughly. They will likely be surprised by what they learn. Successfully engaging different teams during the remediation process and focusing on what matters is essential.
Those accustomed to historical working practices will need to adapt, but positively, they'll experience less burden. The remediation advice from XM Cyber is excellent; it's in a language that IT people can easily use without needing security specialists to interpret it. That's a significant benefit. Moreover, how you manage metrics and share operational metrics with senior leadership may require a different approach. It's positive that you have the capability to measure it, but I'd advise CISOs to think ahead regarding this area.
I am excited about the future growth and opportunity. Cyber Threat Management is a growing field, and CISOs are beginning to adopt it. We primarily use XM Cyber for our data center, but I know it will soon start complementing my cloud estate and visibility because CNAP-type tools have limitations in identification.
On a scale of 1-10, I rate XM Cyber a 9 out of 10.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.