Try our new research platform with insights from 80,000+ expert users
Picus Security Logo

Picus Security Reviews

4.4 out of 5

What is Picus Security?

Featured Picus Security reviews

Picus Security mindshare

As of March 2026, the mindshare of Picus Security in the Breach and Attack Simulation (BAS) category stands at 12.8%, down from 18.6% compared to the previous year, according to calculations based on PeerSpot user engagement data.
Breach and Attack Simulation (BAS) Mindshare Distribution
ProductMindshare (%)
Picus Security12.8%
Pentera23.2%
Cymulate15.6%
Other48.4%
Breach and Attack Simulation (BAS)

PeerResearch reports based on Picus Security reviews

TypeTitleDate
CategoryBreach and Attack Simulation (BAS)Mar 24, 2026Download
ProductReviews, tips, and advice from real usersMar 24, 2026Download
ComparisonPicus Security vs The NodeZero Platform by Horizon3.aiMar 24, 2026Download
ComparisonPicus Security vs CymulateMar 24, 2026Download
ComparisonPicus Security vs PenteraMar 24, 2026Download
Suggested products
TitleRatingMindshareRecommending
Akamai Guardicore Segmentation4.21.3%89%21 interviewsAdd to research
Pentera4.023.2%100%9 interviewsAdd to research
 
 
Key learnings from peers
Last updated Mar 24, 2026

Valuable Features

Room for Improvement

Pricing

Popular Use Cases

Service and Support

Deployment

Scalability

Stability

Review data by company size

By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
By reviewers
By visitors reading reviews
Company SizeCount
Small Business90
Midsize Enterprise55
Large Enterprise214
By visitors reading reviews

Top industries

By visitors reading reviews
Financial Services Firm
15%
Manufacturing Company
8%
Government
7%
Computer Software Company
7%
Retailer
6%
Energy/Utilities Company
5%
Hospitality Company
5%
Outsourcing Company
5%
Media Company
4%
Educational Organization
4%
Insurance Company
3%
Logistics Company
3%
Real Estate/Law Firm
2%
Comms Service Provider
2%
Construction Company
2%
Performing Arts
2%
Wholesaler/Distributor
2%
University
2%
Non Profit
2%
Recreational Facilities/Services Company
2%
Healthcare Company
1%
Marketing Services Firm
1%
Pharma/Biotech Company
1%
Transportation Company
1%
Legal Firm
1%
Recruiting/Hr Firm
1%
Consumer Goods Company
1%
Aerospace/Defense Firm
1%
Maritime Company
1%
Leisure / Travel Company
1%
 
Picus Security Reviews Summary
Author infoRatingReview Summary
Consulting Systems Engineer at Boomslang Tech4.0<p>I use Picus Security to validate security controls and improve detection against MITRE ATT&amp;CK, seeing significant boosts in coverage and prevention. Its automated simulation, while needing better integration, transforms our security posture from assumption to evidence-driven.</p>
Cybersecurity Operations Engineer at a tech services company with 201-500 employees4.5No summary available
Information Security System Manager at CS-Consulting4.5I use Picus Security for continuous security validation and appreciate its integration capabilities with other security tools. However, I find the number of integrations it supports to be limited, which could benefit from improvement.
Cybersecurity Customer Service Manager and Technical Account Manager at Cybersel4.0I use Picus Security to verify security controls, and I find its detection capabilities valuable, especially with SIEM alarms. However, improvements are needed in reporting, data analysis, attack path validation, scalability, and automation for enhanced functionality.
Cyber Security Consultant at GBS IT Services5.0I use Picus Security to simulate attacks in my live environment, validating my security controls and receiving valuable reports. While customer support response times need improvement, it shows a good ROI of 30-40%. Previously, I used Sophos.
Solutions Architect Cybersecurity at a tech vendor with 11-50 employees2.5No summary available
Security Engineer at a tech services company with 201-500 employees4.5I use Picus Security for BAS to simulate cloud-based network attacks and improve our security layers. The threat intelligence feature identifies and prevents vulnerabilities, while establishing a data center in India could boost trust and revenue.