Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

Picus Security Reviews & Product Details

Verified User in Information Technology and Services
CI
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Picus Security?

It answers the question are we vulnerable to these attacks

Ease of integration

Ease of simulating attacks on network email and more

It gives recommendations on how to detect and how to prevent rules and signatures if available Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

It doesn't attack the asset itself, instead it attacks a machine in the same subnet, which is good and slightly bad at the same time

More integrations and vendors detection and prevention rules Review collected by and hosted on G2.com.

What problems is Picus Security solving and how is that benefiting you?

Leverage siem and firewalls in the best possible way

Higher accuracy for detection

Help prevent providing related signatures

Saved the time trying to simulate manually Review collected by and hosted on G2.com.

Picus Security Overview

What is Picus Security?

Picus Security Control Validation and Mitigation is a threat-centric, flexible platform that allows to measure security effectiveness and quickly assess controls, automatically and consistently identify gaps, and instantly apply selected mitigation advice for the purpose of security validation, hardening and mitigation. The platform is powered by an extensive Threat Library curated by Picus Labs, and a broad set of mitigation advice coming from the Picus Technology Alliance Network.

Picus Security Details
Product Website
Languages Supported
English
Show LessShow More
Product Description

Measure - Picus tells you security effectiveness right now including all emerging threats.; Categorize - Picus helps you prioritize your security resources to where you need it the most.; Monitor - continually asses your resilience to threats.; Alarm - Picus sends alarms for the situations where your security risk increases.


Seller Details
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@PicusSecurity
2,665 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®

Asli E.
AE
Overview Provided by:

Recent Picus Security Reviews

MM
Melis M.Mid-Market (51-1000 emp.)
5.0 out of 5
"short experience"
Attack database is very advanced , and you can simulate waf or firewalls or endpoints with picus attack simulator. Also it provide visibility in yo...
Verified User
C
Verified UserSmall-Business (50 or fewer emp.)
5.0 out of 5
"Picus is the answer"
It answers the question are we vulnerable to these attacks Ease of integration Ease of simulating attacks on network email and more It gives recomm...
AE
Ahmed E.Small-Business (50 or fewer emp.)
4.5 out of 5
"Picus is a nicely established BAS"
Very nice gui Granularity Continuous assessment Prevention signatures detection rules
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Picus Security Media

Answer a few questions to help the Picus Security community
Have you used Picus Security before?
Yes

3 out of 4 Total Reviews for Picus Security

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
MM
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: Organic
What do you like best about Picus Security?

Attack database is very advanced , and you can simulate waf or firewalls or endpoints with picus attack simulator. Also it provide visibility in your security score Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

Integration with Trellix SIEM is not working clearly. Review collected by and hosted on G2.com.

What problems is Picus Security solving and how is that benefiting you?

Picus can provide security score on customers ecosystem. Its also provide efficency of invests on IT systems. Review collected by and hosted on G2.com.

AE
Cyber Security Engineer
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Picus Security?

Very nice gui

Granularity

Continuous assessment

Prevention signatures

detection rules Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

Assessment done on a different machine might differ in response when it comes to internal characteristics of a server or configuration Review collected by and hosted on G2.com.

What problems is Picus Security solving and how is that benefiting you?

Continuous Assessment

Rationalisation of security expenditure

Breach assessment of new attacks Review collected by and hosted on G2.com.

M
Cyber Security Specialist
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Picus Security?

In the security sector, we used to be able to provide a solution by putting a firewall. Now the risk factors have increased a lot, so we have become multi-layered and more than 10 devices are used. It is quite difficult to follow them. Picus routinely scans the devices for me. He makes some very logical conclusions. With these detections, I can do my maintenance on the devices. Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

It may be because it is a new technology, the prices seem a little high to me. Review collected by and hosted on G2.com.

What problems is Picus Security solving and how is that benefiting you?

It detects attacks that may occur if I cannot follow my devices, which are too many. Review collected by and hosted on G2.com.

There are not enough reviews of Picus Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cymulate: Security Validation and Exposure Management Platform Logo
Cymulate: Security Validation and Exposure Management Platform
4.9
(124)
Cymulate comprehensively identifies the security gaps in your infrastructure and provides actionable insights for proper remediation. Run safely from the internet, our battery of simulated attacks causes no interruption to your operation or business productivity.
2
Pentera Logo
Pentera
4.5
(137)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
3
vPenTest Logo
vPenTest
4.7
(172)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
4
AttackIQ Platform Logo
AttackIQ Platform
4.5
(1)
5
Defendify All-In-One Cybersecurity® Solution Logo
Defendify All-In-One Cybersecurity® Solution
4.7
(57)
Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.
6
RidgeBot Logo
RidgeBot
4.5
(76)
RidgeBot, a robotic penetration testing system, fully automates the testing process by coupling ethical hacking techniques to decision-making algorithms. RidgeBots locate risks and vulnerabilities discovered in network, servers, and applications, prove the potential impact or damage with exploit evidence. It provides risk-based vulnerability management and alleviates the shortage of security testing personnel by automation.
7
SafeBreach Logo
SafeBreach
4.5
(1)
SafeBreach is a platform that automates adversary breach methods across the entire kill chain, without impacting users or infrastructure.
8
XM Cyber Exposure Management Platform Logo
XM Cyber Exposure Management Platform
3.5
(1)
XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7.
9
Sophos PhishThreat Logo
Sophos PhishThreat
4.3
(21)
Sophos PhishThreat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture. Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.
10
Infection Monkey Logo
Infection Monkey
4.8
(3)
By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.
Show More