XM Cyber and Pentera both compete in the cybersecurity domain, specializing in attack simulation and vulnerability assessment. While XM Cyber is notable for its pricing and customer support advantages, Pentera stands out with superior functionality due to its comprehensive features.
Features: XM Cyber integrates continuous attack simulation, automated remediation insights, and specific critical security path analysis. Pentera prioritizes automation, offers extensive security control validation, and provides a comprehensive platform experience. These differences highlight XM Cyber's focused attack simulation against Pentera's broad validation strategy.
Room for Improvement: XM Cyber could enhance its feature set to match competitor depth, improve its automation capabilities, and expand integration options with other cybersecurity tools. Pentera may benefit from simplifying its deployment process, optimizing resource use, and enhancing some specific simulation functions to streamline functionality.
Ease of Deployment and Customer Service: XM Cyber is known for its simplified deployment and strong customer service, making it easier to integrate into existing systems. Pentera, being more feature-rich, presents a complex deployment but is supported by attentive customer service that aids thorough integration.
Pricing and ROI: XM Cyber generally presents a lower upfront cost with good ROI through effective security insights. In contrast, Pentera may involve a larger initial expense, yet its broad feature array delivers significant ROI from its advanced security evaluations. Organizations prioritizing budget may lean towards XM Cyber, while those seeking depth in features might invest in Pentera.
Some customers consider the ROI favorable, but facing difficulties now due to changes in the licensing model, which has made it more expensive compared to last year.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
This responsiveness indicates a strong partnership; a security partner that listens to their customers.
Its scalability is great; it's easy to deploy and fully scalable.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
When the IP is imported into a system, we cannot withdraw or revoke the license.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
We intend to develop closer integration between XM Cyber and the other tools that help us tackle the issue of threats and vulnerabilities across our IT estate.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
We can automate the Pentera processes by automatically creating scenarios to validate the system.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
Product | Market Share (%) |
---|---|
Pentera | 28.5% |
Cymulate | 20.0% |
Picus Security | 17.2% |
Other | 34.3% |
Product | Market Share (%) |
---|---|
XM Cyber | 16.2% |
Cymulate | 16.3% |
Wiz Code | 14.6% |
Other | 52.9% |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 1 |
Large Enterprise | 4 |
Pentera is the category leader for Automated Security Validation, allowing every organization to evaluate its security readiness, to know its real security risk at any given moment. Test all cybersecurity layers across the attack surface – inside and out – by safely emulating attacks & prioritize patching with a risk-based remediation roadmap.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our attack path management platform continuously uncovers hidden attack paths to your critical assets across cloud and on-prem environments, so you can cut them off at key junctures and eradicate risk with a fraction of the effort. This overcomes the big disconnect that security teams experience when they’re presented with endless alerts, yet can’t see which exposures impact risk the most, how they come together to be exploited by an attacker, or how to efficiently eliminate them. This approach is a complete game-changer, which is why some of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.