Header banner
Revain logoHome Page
cymptom logo

Cymptom Review

2

·

Very good

Revainrating 4.5 out of 5  
Rating 
4.3
Security, Risk Assessment

View on AmazonView on ЯM

Description of Cymptom

Cymptom's Network Security Posture Management platform is the only solution that provides continuous full visibility of the entire hybrid network threat landscape in real-time. Cymptom maps all misconfigurations, segmentation flaws, weaknesses and vulnerabilities, as well as open ransomware vectors in the hybrid network continuously in real-time. Unlike standard security tools, Cymptom identifies all open attack paths in the organizational network and alerts about critical risks as soon as they are enabled. Using data analytics, Cymptom leverages the entire MITRE ATT&CK framework, and prioritizes the risks (whether a it's a vulnerability, misconfiguration, permission, and more) based on the particular business and adversary context. Cymptom is deployed on a single machine and requires only a read-only user to the Active Directory. We do not install any agents.

Reviews

Global ratings 2
  • 5
    1
  • 4
    1
  • 3
    0
  • 2
    0
  • 1
    0

Type of review

Revainrating 4 out of 5

Excellent tool just keeps everything under watch

In our organization, it helps to keep us updated with all security threats that are affecting our business. It gives us the facility to manage and control all the devices connected to the network. The best part about this software is that it is very easy to use. I have no issues while using it as it is user friendly. It has helped me to keep track of all my devices which are connected to the network. I am able to do some light troubleshooting from within the application itself. It also helps to

Pros
  • It is very easy to use and to manage a network
Cons
  • It does not work well with other apps so I have to keep asking for each app I use

Revainrating 5 out of 5

Excellent Cyber Security Tool - Great Features Overall

Easy to configure, user friendly interface! I like its features so much because it helps us monitor our network effectively and also give insights into cyber security issues. It has been really helpful for me as i am working with my team at an IT firm. Nothing to dislike about this tool since everything is just fantastic. For me, nothing at all. You can use cYPTOM if you are looking for something which will help you track down your IT infrastructure problems. As far as your business…

Pros
  • Full control over various protocols.
  • Allows one access monitoring across multiple devices
  • Easeful Configuration
  • Everything's going great :) Love using these tools!! Keep up doing well guys!!! Great job..Keep 'em coming ;)
Cons
  • Nothing