Cyber Attack Simulation Startup Brings Virtual Hacking to Microsoft Defender ATP

July 16, 2020


Israeli startup Cyber XM integrated its breach and attack simulation (BAS) platform with Microsoft Defender ATP. The integration will give Microsoft Defender ATP users information on potential attack paths that could compromise systems.

XM Cyber has integrated its breach and attack simulation (BAS), cyber risk analytics and cloud securityOpens a new window posture management platform with Microsoft Defender Advanced Threat Protection (MDATPOpens a new window ). Security analysts will be able to leverage XM Cyber capabilities to identify and mitigate potential threatsOpens a new window arising from system vulnerabilities, human error and misconfigurations.

XM Cyber is like a virtual hacker that shows all the possible attack paths and safely simulates attacks 24/7, thereby allowing Microsoft Defender ATP users to focus on critical issues and lowering risk. Once threats and risks are identified, the platform provides insights on remediation. By clearly identifying critical assets, the platform assists customers in fully understanding the overall risk and exactly what steps are required for remediation.

Learn More: Hacked Again: Here’s How Breach and Attack Simulations Can Tackle AWS Security IncidentsOpens a new window

Tomer Teller, Principal Security Program Manager, Microsoft 365 Security saidOpens a new window , “The rich, contextual information XM Cyber adds to the process of remediation prioritization indicates to customers whether or not they need to investigate deeper or give higher attention and priority when it comes to reducing risk.”

The significance of XM Cyber’s integration with Microsoft Defender Advanced Threat Protection (ATP) cannot be overstated,” said Menachem Shafran, VP of Product, XM Cyber in conversation with Toolbox. “The integration allows us to give Microsoft Defender ATP users critical context into any suspicious activity detected by the solution. They thus have a complete understanding of the risk they face, and the path needed to maintain perfect security posture.”

Organizations can gauge incident responseOpens a new window strategies based on perceived threats and attack vectors. “The combined capability improves visibility and lowers risk as more CISOs focus on applying security resources against their most critical assets,” Teller added.

Earlier this month, the breach and attack simulation specialist bagged $17 million in a Series B funding round with Macquarie Capital, Nasdaq Ventures, Our Innovation Fund, and Swarth Group. The funding will go toward deepening the research and development department and expand sales and marketing presence worldwide.

Let us know if you liked this news on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!

Sumeet Wadhwani
Sumeet Wadhwani

Asst. Editor, Spiceworks Ziff Davis

An earnest copywriter at heart, Sumeet is what you'd call a jack of all trades, rather techs. A self-proclaimed 'half-engineer', he dropped out of Computer Engineering to answer his creative calling pertaining to all things digital. He now writes what techies engineer. As a technology editor and writer for News and Feature articles on Spiceworks (formerly Toolbox), Sumeet covers a broad range of topics from cybersecurity, cloud, AI, emerging tech innovation, hardware, semiconductors, et al. Sumeet compounds his geopolitical interests with cartophilia and antiquarianism, not to mention the economics of current world affairs. He bleeds Blue for Chelsea and Team India! To share quotes or your inputs for stories, please get in touch on sumeet_wadhwani@swzd.com
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.