Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Picus Security Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

1 month

Picus Security Integrations

(60)
Verified by Picus Security

Picus Security Media

Picus Security Demo - Deep Dive into Simulation Results
Explore detailed outcomes of each simulation, including both Prevention and Detection insights. Understand threat behaviors, analyze attack actions, access remediation suggestions, and generate simulation report.
Picus Security Demo - Track and Benchmark Your Security Posture
Visualize your overall security scores across Prevention and Detection dimensions. Compare performance against industry benchmarks and drill down by threat types and attack modules.Use the Generate Report feature to create custom reports that reflect your preferred scope, timeframe, and data poin...
Picus Security Demo - Set Your Security Goals and See What Truly Matters
Choose predefined security goals or create your own using flexible filters. Instantly uncover the most critical threats aligned with your objectives, prioritized by severity and relevance. Focus your efforts where they’ll make the biggest impact.
Picus Security Demo - Mitigate, Simulate, and Improve with Confidence
Dive into prioritized threats and explore mitigation strategies at the atomic action level. Understand the relevance of each action to your goal, auto-deploy fixes, and instantly validate effectiveness using quick simulation—seeing score improvements in real time.
Picus Security Demo - Simulate Real-World Threats with an Always-Updated Library
Leverage a rich, attacker-centric threat library, updated within 24 hours of emerging threats. Customize or select attack scenarios to simulate threats relevant to your environment and testing needs.
Picus Security Demo - Validate Security with Full-Coverage Templates
Continuously assess your defenses using prebuilt templates for full-coverage posture validation. Choose from generic, industry-specific, or region-focused scenarios to automate assessments on-demand or on a schedule.
This short demo shows how to validate your defenses against credential theft, process injection, and more—based on 1M+ malware samples from the Red Report 2025.
Play Picus Security Video
This short demo shows how to validate your defenses against credential theft, process injection, and more—based on 1M+ malware samples from the Red Report 2025.
Product Avatar Image

Have you used Picus Security before?

Answer a few questions to help the Picus Security community

Picus Security Reviews (228)

Reviews

Picus Security Reviews (228)

4.8
228 reviews

Review Summary

Generated using AI from real user reviews
Users consistently praise continuous security validation and realistic attack simulations that help identify vulnerabilities before they can be exploited. The platform's intuitive interface and actionable insights make it easy for teams to improve their security posture. However, some users note that the initial setup can be complex and time-consuming.

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Burhan Kemal B.
BB
Kıdemli Siber Güvenlik Uzmanı
Enterprise (> 1000 emp.)
"A Must-Have Breach and Attack Simulation Platform for Continuous Security Validation"
What do you like best about Picus Security?

Picus Security provides an extremely practical and intelligent way to continuously assess and improve an organization’s security posture. Its extensive attack library, updated daily with real-world threat vectors, allows us to simulate adversary techniques in alignment with MITRE ATT&CK. The prevention and detection analytics are especially valuable—we can clearly see which controls are underperforming and take immediate, actionable steps. The UI is intuitive, the deployment is smooth, and integration with existing SIEM/SOAR/EDR tools is seamless. It's not just a BAS tool; it's a security operations enhancer. Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

While the platform is generally very strong, the reporting module could benefit from more customization options—especially for tailoring reports to different stakeholders (e.g., executives vs. technical teams). Additionally, for highly segmented environments, agentless deployment options could be explored further to reduce friction in complex networks. Review collected by and hosted on G2.com.

Eren K.
EK
System Specialist
Mid-Market (51-1000 emp.)
"Picuse vey nice product"
What do you like best about Picus Security?

What I like best about Picus Security is its proactive approach to cybersecurity through continuous security validation. Unlike traditional security tools that often take a reactive stance, Picus allows organizations to simulate real-world attacks and identify gaps in their defenses before they can be exploited. I’m particularly impressed by the comprehensiveness of its threat library and how quickly it incorporates the latest attack techniques. Additionally, the seamless integration with existing security infrastructure and the actionable mitigation insights make it an invaluable tool for both red and blue teams. It helps create a true culture of cyber resilience. Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

While Picus Security is a highly effective platform, one area that could be improved is the learning curve for new users. Due to the platform's wide range of features and technical depth, it can take some time for security teams to fully understand and utilize all of its capabilities. Additionally, while the threat library is impressive, occasional updates may lag slightly behind newly emerging attack techniques. That said, these are relatively minor concerns, and the value the platform provides far outweighs these challenges. Review collected by and hosted on G2.com.

SE
Cyber Security Consultant
Small-Business (50 or fewer emp.)
"Picus Delivers Effective, Easy-to-Use Security Validation with Actionable Insights"
What do you like best about Picus Security?

What I like most about Picus is its realistic and continuously updated attack simulations, which help us stay ahead of emerging threats. The platform’s intuitive interface and clear, actionable reports make it easy for both technical teams and management to understand and improve our security posture.

Ask ChatGPT Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

What I dislike most is the limited flexibility in customizing report formats to meet specific organizational preferences. While the existing reports are clear and useful, having more tailoring options would make them even more impactful. Review collected by and hosted on G2.com.

Verified User in Oil & Energy
AO
Enterprise (> 1000 emp.)
"Outstanding UI/UX, Fast Performance, and AI-Driven Productivity Gains"
What do you like best about Picus Security?

Great overall experience. Smooth and impressive."Overall, this product delivers an outstanding experience. The UI/UX is highly intuitive, and the system performance is consistently fast and reliable. Getting started was effortless thanks to the excellent support and onboarding, and the seamless integrations connected perfectly with our existing tools. Furthermore, the advanced AI / Intelligence features significantly boosted our productivity, making the pricing highly competitive and delivering a very strong ROI." Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

Sometimes, the connection between the agent and the manager is lost. Review collected by and hosted on G2.com.

PY
Security Analyst.
Enterprise (> 1000 emp.)
"Picus Delivers Real-World Threat Simulation at Its Best."
What do you like best about Picus Security?

Picus Security excels at providing continuous, automated breach and attack simulation (BAS), which helps us validate our security controls against real-world threats. Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

While Picus Security is a powerful BAS platform, there are areas that could be improved. The initial setup and integration with some security tools can be a bit complex and time-consuming, especially in large environments. Some advanced reporting features could be more customizable, and I’d like to see broader support for cloud-native and containerized environments Review collected by and hosted on G2.com.

Verified User in Retail
CR
Small-Business (50 or fewer emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Great Tool, Needs Wording Updates"
What do you like best about Picus Security?

Daily update with relevant information

Easy learning curve

Highly capable of integrating with multiple relevant tools Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

Installation process can vary from environment to environment

Wording in certain documents are confusing Review collected by and hosted on G2.com.

ARUSHI P.
AP
Business Analyst Cybersecurity Practice and Alliances
Small-Business (50 or fewer emp.)
"Vendor Specific Mitigations for Simulated Threats"
What do you like best about Picus Security?

I like the ease of deployment, the integrations and/ or implementation are easy, and the vendor-specific mitigations that it provides are great. I have frequently used the tool and done POCs for various customers, and in case I get stuck, the Customer support is impeccable. Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

I have only worked on the SCV and APV modules, and they are truly great. Other modules I have not worked on so I may not be able to identify the dislikes Review collected by and hosted on G2.com.

MC
Head of Security Platforms
Enterprise (> 1000 emp.)
"A Very Useful Security Platform"
What do you like best about Picus Security?

I do really like the platform for its extensive threat library coverage, ease of use, and the super useful mitigation and recommendations it provides to my company to improve the cyber defense.

The platform integrates perfectly with my other security platforms (Edr, Siem, Firewall) helping to improve their efficency Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

What I don't like is the fact that the platform's data doesn't reside in Italy and for a regulatory framework we had to install the Picus Manager Console on-prem with the effect to not have to possibility to use advanced functions (ex AI assistent and more) Review collected by and hosted on G2.com.

Rizal A.
RA
Head Of Technology Development Department
Mid-Market (51-1000 emp.)
"Real-World Vulnerability Testing Done Right"
What do you like best about Picus Security?

I like the overall concept of testing vulnerabilities in a real environment. Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

The integrations coverage not quite wide. Review collected by and hosted on G2.com.

Tanut T.
TT
Security audit
Enterprise (> 1000 emp.)
"Validated Our Security Control Policy with Ease"
What do you like best about Picus Security?

Validate my security control policy and configure Review collected by and hosted on G2.com.

What do you dislike about Picus Security?

No this is best BAS tools in market, not dislike thing. Review collected by and hosted on G2.com.

Questions about Picus Security? Ask real users or explore answers from the community

Get practical answers, real workflows, and honest pros and cons from the G2 community or share your insights.

GU
Guest User

What is Picus Security used for?

Pricing Insights

Averages based on real user reviews.

Time to Implement

1 month

Return on Investment

7 months

Average Discount

18%

Picus Security Comparisons
Product Avatar Image
Cymulate
Compare Now
Product Avatar Image
Pentera
Compare Now
Product Avatar Image
AttackIQ Platform
Compare Now
Picus Security Features
Test Agent Deployment
Breach Simulation
Attack Simulation
Multi-Vector Assessment
Scenario Customization
Range of Attack Types
Reporting
Risk Evaluation
Automated Testing
Product Avatar Image
Picus Security