No more typing reviews! Try our Samantha, our new voice AI agent.

Verodin vs XM Cyber comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Verodin
Average Rating
7.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
Breach and Attack Simulation (BAS) (9th)
XM Cyber
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
6
Ranking in other categories
Continuous Controls Monitoring (3rd), Vulnerability Management (34th), Cloud Security Posture Management (CSPM) (26th), Continuous Threat Exposure Management (CTEM) (4th)
 

Mindshare comparison

Verodin and XM Cyber aren’t in the same category and serve different purposes. Verodin is designed for Breach and Attack Simulation (BAS) and holds a mindshare of 2.0%, up 1.7% compared to last year.
XM Cyber, on the other hand, focuses on Continuous Threat Exposure Management (CTEM), holds 11.6% mindshare, down 14.4% since last year.
Breach and Attack Simulation (BAS) Mindshare Distribution
ProductMindshare (%)
Verodin2.0%
Pentera23.2%
Cymulate15.6%
Other59.2%
Breach and Attack Simulation (BAS)
Continuous Threat Exposure Management (CTEM) Mindshare Distribution
ProductMindshare (%)
XM Cyber11.6%
Pentera14.0%
Cymulate13.3%
Other61.099999999999994%
Continuous Threat Exposure Management (CTEM)
 

Featured Reviews

reviewer945171 - PeerSpot reviewer
Cyber Security Consultant at a tech consulting company with self employed
Stable with good updates but needs a better integration engine
The integration engine needs to improve. We try to integrate it with other tools, especially with Splunk or with the MyDLP engine, and even with Microsoft Exchange. As much as they tried to make it seem like it was easy, it wasn't easy. There was a lot of stuff that we had to do that we ended up having to do via an API or something special for a new case. That's a big issue for me. Integration is daunting. It leaves a lot of room for failure and frustration. There are just little nuances that make everything difficult. You're supposed to be able to flip this toggle thing here, and you're supposed to be able to get the feedthrough from Splunk. Then, from there everything should be perfectly fine. However, when you find out it is not perfectly fine and you find out that it's because this thing isn't necessarily correct, you have to do an update on it or they have to update their file to make it work correctly. It's very small, minute things that aren't quite right. It's not something that you can really pinpoint. There's a lot of nuanced issues. It the nuanced technical issues that you would notice once you cross its path. It's not one of those "Hey, this is something I would know off the top of my head." They are very small nuance issues that make you say "Oh, well I guess we've got to go and change this thing now." You get this with certain tools - mostly with Mandiant tools more than anything else in general. It's one of those Mandiant quirks that still carries on and persists to this day - even with this tool.
Stephen Owen - PeerSpot reviewer
Group CISO at a insurance company with 51-200 employees
Has significantly improved risk visibility and optimized remediation efforts across dynamic environments
We tightly integrate with APIs, consuming feeds and open source data. We have integrated with XM Cyber, and we are elevating ourselves with AI and MCP tools as we view this as a forerunner to reducing the workload for our agents and IT staff. We're pushing all our security partners to provide AI and MCP tools. Our vision is for them to offer a chat interface where a junior IT or an experienced infrastructure engineer can ask for what needs to be patched next without using an interface. Their current interface is very usable and professional, ranking in the top tier of applications. Their reporting is good, offering custom reports, and their API integration is a new capability that serves us well. We have high expectations for the next generation, such as a chat interface to ask questions. However, everything has been very good. We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments. I would like access to that and querying languages, enabling more informed business decisions. XM Cyber sees much of our estate, which is beneficial for making informed decisions, and we can harness those insights and data for business analytics. For instance, it could help us gain insights into change management—if a particular server impacts another and that server is supported by yet another server, we could glean significant insights for change management meetings.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is constantly updating. Their data and security validation are cutting-edge."
"We thought it was a unique tool when we first came across it, we thought it was a value-add - and to this day it still is a value-add in our company."
"XM Cyber permits us to identify if a zero-day vulnerability can affect our infrastructure; it helps me understand the company's total risk that we have in our infrastructure and workstation vulnerability, and it permits us to identify the real impact when we have a vulnerability."
"Since implementing XM Cyber, we have improved the way we are doing patching, focusing on the choke points in our patching cycle, and it improves the way we assess the risk."
"Six weeks into using XM Cyber, we saw a compelling return on investment—primarily in risk reduction, with a specific issue our other security tooling did not pick up but XM Cyber did, reducing IT remediation time and saving over 60,000 US dollars per year while significantly lowering our loss exposure amount."
"What I personally like very much, from my experience, is that it is very reliable."
"XM Cyber permits us to identify if a zero-day vulnerability can affect our infrastructure; it helps me understand the company's total risk that we have in our infrastructure and workstation vulnerability, and it permits us to identify the real impact when we have a vulnerability."
"XM Cyber made it clear that browser vulnerabilities were the top priority because the platform was able to examine how vulnerabilities within our estate could be exploited and what the path would be from some bad actor in order to exploit those vulnerabilities."
"It saves you money while making you more secure."
"The platform's most valuable feature is attack simulation."
 

Cons

"The integration engine needs to improve."
"The integration engine needs to improve."
"They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks."
"XM Cyber could identify all areas of vulnerability. They could expand the identification span for different areas."
"We have high expectations for the next generation, such as a chat interface to ask questions."
"We have not saved any time or effort, but we can prove that the effort involved around vulnerability management has been better spent to greater effect, and we've been able to demonstrate that vulnerabilities that do represent a high risk have been remediated more rapidly and more effectively."
"They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks."
"There are many interesting things about XM Cyber, but the part that can be improved is the mobile exposure and the IBM i specific equipment."
"We'd like to see a cheaper price."
"We'd like to see a cheaper price."
 

Pricing and Cost Advice

Information not available
"We have to pay standard licensing fees."
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
885,667 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
26%
Comms Service Provider
13%
Government
9%
Computer Software Company
7%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
Retailer
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for XM Cyber?
My experience with pricing, setup cost, and licensing was that we have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the compli...
What needs improvement with XM Cyber?
The roadmap is a disadvantage because this kind of technology should incorporate AI. At the moment, we don't have any modules with AI. They could improve support because when we need to create a su...
What is your primary use case for XM Cyber?
My major use case for XM Cyber is managing the services in our company, Prosegur Iberia, for Spain and Portugal. We develop and work together with XM Cyber technicians to develop use cases and anal...
 

Comparisons

 

Overview

 

Sample Customers

AAFCU, Amuse, Axway, Bank Gutmann, Bank of Thailand, BCC Corporation, Blackboat, CapWealth Advisors, CBC, CERN, Lagardère, Land Bank of the Philippines, laya healthcare, Lindsay Automotive Group
Hamburg Port Authority, Plymouth Rock Corporation
Find out what your peers are saying about Horizon3.ai, Cymulate, Pentera and others in Breach and Attack Simulation (BAS). Updated: March 2026.
885,667 professionals have used our research since 2012.