The Picus Security Validation Platform
Picus SecurityReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
222 reviews
from
and
External reviews are not included in the AWS star rating for the product.
Yes, I recommend it.
What do you like best about the product?
I like it because it is very easy to use
What do you dislike about the product?
There is nothing I don't like. I like it very much. not for now
What problems is the product solving and how is that benefiting you?
It has helped us a lot in strengthening our security infrastructure and we have benefited from it.
The interface is very intuitive and the features are extremely useful.
What do you like best about the product?
Ease of use and customization, the ability to generate reports at various levels, and the well-designed user interface.
Customer support is very qualified and follow from scratch installation to customization.
Customer support is very qualified and follow from scratch installation to customization.
What do you dislike about the product?
Block licensing could be not so effective.
What problems is the product solving and how is that benefiting you?
Empowering of security posture.
Advise of after scanning tasks is a very useful benefit.
Advise of after scanning tasks is a very useful benefit.
generic
What do you like best about the product?
"What I like best about Picus Security is its proactive approach to security validation. Rather than just identifying vulnerabilities, Picus empowers organizations to continuously test, measure, and improve their defenses with real-world attack simulations.
What do you dislike about the product?
While I have a lot of respect for Picus Security’s innovation in continuous security validation and breach simulation, one area I believe could improve is broader market awareness. Despite having a strong platform, it seems like the brand isn’t as widely recognized outside of specialized cybersecurity circles. Increasing outreach or simplifying messaging for non-technical stakeholders might help broaden its impact.
What problems is the product solving and how is that benefiting you?
Picus solves this with its Breach and Attack Simulation (BAS) platform, allowing security teams to continuously validate and optimize their defenses using real, up-to-date threat scenarios.
Clearly shows the gaps in our security setup
What do you like best about the product?
"Picus makes it super easy to spot where our defenses are weak. It doesn’t just simulate attacks—it actually tests them in our environment. The UI is clean, reports are easy to read, and the MITRE alignment is a huge bonus.
What do you dislike about the product?
At the beginning, you need to tweak some settings or you’ll get too many alerts. Also, it doesn’t always cover the more niche attack types. It’d be nice to have more control when customizing simulations.
What problems is the product solving and how is that benefiting you?
Picus helps us understand whether our security controls actually work or not. Everything might look fine on paper, but with Picus simulations, we clearly see where we're exposed. That helps our team prioritize better and validate that our security investments are actually effective.
Picus
What do you like best about the product?
Picus Security provides comprehensive attack simulation capabilities, allowing us to continuously assess and improve our security posture with real-world threat scenarios. The platform’s ease of use and detailed reporting make it especially valuable for identifying gaps and validating defenses.
What do you dislike about the product?
Some simulations take a long time to complete or get stuck, especially in certain modules. Also, detection results can be inconsistent if time settings or log configurations aren't properly aligned.
What problems is the product solving and how is that benefiting you?
Picus Security helps us identify and address security gaps by simulating real-world cyberattacks across network, endpoint, and email layers. This proactive approach improves our threat detection, validates our security controls, and strengthens our overall defense posture.
A Proactive Approach to Threat Readiness
What do you like best about the product?
Picus Security has introduced several new features to enhance efficiency, visibility, within Breach and Attack Simulation (BAS) operations:
1. Share Agent Logs
Previously, troubleshooting required remote access to endpoints where the Picus agent was installed in order to manually collect logs. With the Share Agent Logs feature, logs can now be directly downloaded from the Picus dashboard. This eliminates the need for remote sessions, saving time and simplifying support processes.
2. Manage Execution User
This feature enables organizations to create and manage multiple users with different privilege levels and use them during simulations. While performing endpoint attack simulations, you can select the specific user context under which the simulation will run.
This allows attacks to be executed from the perspective of different user types—such as standard or privileged users—making scenarios more realistic.
3. Network Attack-Only Mode
Previously, when endpoint security solutions such as EDR were active, the results of simulations often appeared combined, making it difficult to clearly identify which security control—network or endpoint—had taken action. To evaluate network security controls in isolation, it was necessary to disable or remove the EDR.
With the introduction of Network Attack-Only Mode, this limitation has been addressed. Users can now exclude endpoint security directly from the Picus portal, allowing them to simulate attacks focused solely on network controls. This provides clear, independent visibility into the effectiveness of network defenses without the need to remove or disable EDR, ensuring both accurate evaluation and continuous endpoint protection.
4. Enhanced Visibility
In environments with multiple network security controls and endpoint protection solutions, Picus now provides clear visibility into which control has blocked an attack. When integrated with SIEM platforms, this capability helps security teams evaluate the effectiveness of each layer in their defense architecture.
5. Expanded SIEM/EDR/XDR Integrations
Picus has broadened its integration capabilities with a wider range of OEM solutions.
1. Share Agent Logs
Previously, troubleshooting required remote access to endpoints where the Picus agent was installed in order to manually collect logs. With the Share Agent Logs feature, logs can now be directly downloaded from the Picus dashboard. This eliminates the need for remote sessions, saving time and simplifying support processes.
2. Manage Execution User
This feature enables organizations to create and manage multiple users with different privilege levels and use them during simulations. While performing endpoint attack simulations, you can select the specific user context under which the simulation will run.
This allows attacks to be executed from the perspective of different user types—such as standard or privileged users—making scenarios more realistic.
3. Network Attack-Only Mode
Previously, when endpoint security solutions such as EDR were active, the results of simulations often appeared combined, making it difficult to clearly identify which security control—network or endpoint—had taken action. To evaluate network security controls in isolation, it was necessary to disable or remove the EDR.
With the introduction of Network Attack-Only Mode, this limitation has been addressed. Users can now exclude endpoint security directly from the Picus portal, allowing them to simulate attacks focused solely on network controls. This provides clear, independent visibility into the effectiveness of network defenses without the need to remove or disable EDR, ensuring both accurate evaluation and continuous endpoint protection.
4. Enhanced Visibility
In environments with multiple network security controls and endpoint protection solutions, Picus now provides clear visibility into which control has blocked an attack. When integrated with SIEM platforms, this capability helps security teams evaluate the effectiveness of each layer in their defense architecture.
5. Expanded SIEM/EDR/XDR Integrations
Picus has broadened its integration capabilities with a wider range of OEM solutions.
What do you dislike about the product?
Picus Security could further improve detection accuracy, particularly in concurrent simulation scenarios. When the same attack simulation is executed simultaneously on multiple systems at a same time and if system is unable to find logs for the intended machine, it may fetch logs from another system instead, leading to incorrect attribution of results.
What problems is the product solving and how is that benefiting you?
Every organization implements a diverse set of security controls across various layers of their infrastructure. For instance:
-> Network layer: NGFWs, proxies
-> Data protection: DLP solutions
-> Endpoint: EDR tools
-> Web applications: WAFs
While these investments are essential, a critical question arises: How can we validate the effectiveness and readiness of these controls against emerging threats—especially those targeting our specific sector? Are the security policies configured correctly? Are they actually working as intended?
$ This is where Picus comes into play.
Picus offers a comprehensive threat library based on real-world TTPs (Tactics, Techniques, and Procedures) used by known threat actors. This enables us to:
-> Continuously assess whether our security controls—especially at the endpoint—are capable of detecting and preventing these behaviors.
-> Gain insights into visibility gaps across layers.
-> Validate control configurations against threat-specific scenarios.
By automating these assessments, Picus allows our security team to focus their efforts on higher-value tasks such as researching emerging threats and building custom detection rules. The platform also supports the creation and testing of specific TTPs, enabling ongoing evaluation of our detection and prevention capabilities in a proactive, controlled manner.
-> Network layer: NGFWs, proxies
-> Data protection: DLP solutions
-> Endpoint: EDR tools
-> Web applications: WAFs
While these investments are essential, a critical question arises: How can we validate the effectiveness and readiness of these controls against emerging threats—especially those targeting our specific sector? Are the security policies configured correctly? Are they actually working as intended?
$ This is where Picus comes into play.
Picus offers a comprehensive threat library based on real-world TTPs (Tactics, Techniques, and Procedures) used by known threat actors. This enables us to:
-> Continuously assess whether our security controls—especially at the endpoint—are capable of detecting and preventing these behaviors.
-> Gain insights into visibility gaps across layers.
-> Validate control configurations against threat-specific scenarios.
By automating these assessments, Picus allows our security team to focus their efforts on higher-value tasks such as researching emerging threats and building custom detection rules. The platform also supports the creation and testing of specific TTPs, enabling ongoing evaluation of our detection and prevention capabilities in a proactive, controlled manner.
Identifying weakeness
What do you like best about the product?
1. Vendor specific mitigation content helped me to zoom in to issues and fix fast
2. Low False Positive and highly updated content was a major plus point
3. Platform was easy to use
2. Low False Positive and highly updated content was a major plus point
3. Platform was easy to use
What do you dislike about the product?
not appliable, as the tool was really great
What problems is the product solving and how is that benefiting you?
Help to review current tools, finding gaps and closing it either by improving the baseline or a change of product
Help greatly with prioritization
What do you like best about the product?
Exposure prioritization with SCV + asset data
What do you dislike about the product?
We don't have dislikes about the solution right now.
What problems is the product solving and how is that benefiting you?
it's unique approach to EXM is helping us focus on the more important vulnerabilities rather than thousands that are always there.
Easily Identified our security gaps and mitigate them.
What do you like best about the product?
Ease of use. rapid identification of security gaps.
number of useful features
number of useful features
What do you dislike about the product?
there is nothing I dislike about picus..
What problems is the product solving and how is that benefiting you?
I can mitigate our security gaps with picus easily.
rapid detection
What do you like best about the product?
fast detection, ease of use, and support
What do you dislike about the product?
I can't see any disadvantages at the moment.
What problems is the product solving and how is that benefiting you?
It tests network security by performing automated attacks, finds vulnerabilities, and enables us to take swift action.
showing 111 - 120