Try our new research platform with insights from 80,000+ expert users

AttackIQ vs Pentera comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 8, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

AttackIQ
Ranking in Breach and Attack Simulation (BAS)
8th
Average Rating
7.0
Reviews Sentiment
5.7
Number of Reviews
1
Ranking in other categories
Vulnerability Management (70th), Attack Surface Management (ASM) (37th), Continuous Threat Exposure Management (CTEM) (6th)
Pentera
Ranking in Breach and Attack Simulation (BAS)
2nd
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
9
Ranking in other categories
Penetration Testing Services (2nd)
 

Mindshare comparison

As of July 2025, in the Breach and Attack Simulation (BAS) category, the mindshare of AttackIQ is 8.5%, down from 8.6% compared to the previous year. The mindshare of Pentera is 29.3%, up from 28.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Breach and Attack Simulation (BAS)
 

Featured Reviews

BN
Overall, a good user experience and works well but is hard to set up
I can't think of any features that are lacking just now. It does everything I need it to do. I don't have too much experience with the solution. I need more time to really study the solution to see if there are any shortcomings. The initial setup was quite difficult and took a long time.
Jon Medvenics - PeerSpot reviewer
Useful in vulnerability management and can automate pen tests
One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources. Also, if you have credentials and want to check if they're still valid or can still be used, and you confirm they can't be used (maybe they're from a leak or a twenty-year-old database), there's no way for you to flag that these credentials aren't a problem anymore. The solution has a sort of flat report. It's annoying to go through lots of legwork only to see the same names or credentials still there, and you can't do anything about it in their portal. We've given them feedback, but I think it's probably on their long list of feature requests to address. For me, that would be a greater user configuration of the tests performed on a granular level. As I mentioned with Cymulate, they show you every line of code they will run and what tool is being used, step by step. Pentera is more closed in that regard. If Pentera released a feature that allows you to alter the attack path or change the command, that would be incredibly useful. Pentera might use one or a few different methods to do something, but if none of those work, it will just say everything is fine and secure. If Pentera could adapt or change based on what it finds in the environment, that would be very valuable. As a customer, we understand our environments better than an automated tool, so providing context to help the tool get better results would be valuable.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Overall, I've had a good experience with the product. It's worked well for me."
"The tool showed us that our ransomware protection wasn’t working on some machines."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The solution is SaaS-based. From a cloud perspective, it has Pentera Surface and Pentera Core. The Core is the on-prem deployed solution, while the Surface is the cloud-hosted solution that scans your public infrastructure. From the Surface perspective, the most valuable feature so far has been the attack surface mapping."
"The platform's most valuable features are credential management and vulnerability management."
"Maybe there are some remediation steps on the website, we can mask sensitive information on the website better."
"The product is easy to use."
"Pentera has many authentic features."
"Pentera has many authentic features."
 

Cons

"The initial setup was quite difficult and took a long time."
"The licensing and IP management need improvement."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The licensing and IP management need improvement. When the IP is imported into a system, we cannot withdraw or revoke the license."
"There is room for improvement in virtualization compatibility."
"One area for product improvement could be the inclusion of a dashboard to cover multiple branches and subsidiaries, allowing for centralized monitoring."
"One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources."
"The automated penetration testing features must be improved."
"Pentera's general dashboards could be improved and made more specific in terms of vulnerabilities that I'm discovering."
 

Pricing and Cost Advice

Information not available
"The tool is relatively cheap."
"It's not that expensive, but it could be more cost-effective."
"We have to pay a yearly licensing cost for Pentera."
"The product's cost is reasonable. I rate the pricing a three out of ten."
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
860,632 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
19%
Computer Software Company
10%
Energy/Utilities Company
6%
Insurance Company
6%
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
10%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Pentera?
What I like the most about Pentera is its solution-oriented approach.
What needs improvement with Pentera?
The licensing and IP management need improvement. When the IP is imported into a system, we cannot withdraw or revoke the license.
What is your primary use case for Pentera?
I am using the OpenIntra solution for pentesting and managing candidates in my environment. I also use this solution for house customers.
 

Comparisons

 

Also Known As

DeepSurface
No data available
 

Overview

 

Sample Customers

Information Not Available
Blackstone Group Caterpillar Apria Healthcare Taylor Vinters Sandler Capital Management Drawbridge BNP Paribas British Red Cross
Find out what your peers are saying about Cymulate, Pentera, Picus Security and others in Breach and Attack Simulation (BAS). Updated: June 2025.
860,632 professionals have used our research since 2012.