It answers the question are we vulnerable to these attacks
Ease of integration
Ease of simulating attacks on network email and more
It gives recommendations on how to detect and how to prevent rules and signatures if available Review collected by and hosted on G2.com.
It doesn't attack the asset itself, instead it attacks a machine in the same subnet, which is good and slightly bad at the same time
More integrations and vendors detection and prevention rules Review collected by and hosted on G2.com.
3 out of 4 Total Reviews for Picus Security
Attack database is very advanced , and you can simulate waf or firewalls or endpoints with picus attack simulator. Also it provide visibility in your security score Review collected by and hosted on G2.com.
Integration with Trellix SIEM is not working clearly. Review collected by and hosted on G2.com.
Very nice gui
Granularity
Continuous assessment
Prevention signatures
detection rules Review collected by and hosted on G2.com.
Assessment done on a different machine might differ in response when it comes to internal characteristics of a server or configuration Review collected by and hosted on G2.com.
In the security sector, we used to be able to provide a solution by putting a firewall. Now the risk factors have increased a lot, so we have become multi-layered and more than 10 devices are used. It is quite difficult to follow them. Picus routinely scans the devices for me. He makes some very logical conclusions. With these detections, I can do my maintenance on the devices. Review collected by and hosted on G2.com.
It may be because it is a new technology, the prices seem a little high to me. Review collected by and hosted on G2.com.
There are not enough reviews of Picus Security for G2 to provide buying insight. Below are some alternatives with more reviews:




