Cymulate has just made an announcement about its inclusion in the Wiz Integration Network (WIN) to improve the cloud security of mutual customers. The partnership combines Cymulate’s continuous threat exposure management with Wiz’s cloud risk intelligence. Through the partnership,customers can easily integrate Wiz into their existing security operations. This enables pre and post-exploitation simulation to verify security controls across cloud infrastructure levels. Wiz and Cymulate offer a complete and relevant risk view by sharing prioritized security findings in context. This includes validated threat detection and attack activity information.
Automated Cloud Attack Simulation Enhances Defense Validation
Moreover, the cloud attack scenarios offered by Cymulate enable. The automation of the simulation of malicious activities for the assessment of defense. The simulation is carried out safely and automatically, with the capacity for continuous validation for the assessment of security performance. WIN enables the possibility of having a cloud security model that supports cooperation between the security team. The cloud team to reduce risks. The automation offered by Cymulate enables the possibility of assessing cloud platforms. Such as Microsoft Azure,Amazon Web Services and Google Cloud. This new partnership further enhances. The WIN ecosystem offers more value to customers who use both Wiz and Cymulate to secure their cloud infrastructure.
“Our collaboration with Wiz ensures that mutual customers can continuously validate their cloud security investments. Demonstrate measurable risk reduction,” said Eyal Wachsman, CEO and Co-founder of Cymulate.“This partnership reflects our shared commitment to helping organizations operationalize exposure management and achieve stronger, more efficient cloud security outcomes.”
“We’re happy to welcome Cymulate to the WIN ecosystem,” said Oron Noah, VP of Product Extensibility and Partnerships at Wiz. “Together, we help customers continuously validate their cloud defenses and remain confident their controls will stand up to real-world threats.”
For related updates on digital trust and cybersecurity, explore our SOC News.
Source: Businesswire