Try our new research platform with insights from 80,000+ expert users

Pentera vs Picus Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 6, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Pentera
Ranking in Breach and Attack Simulation (BAS)
2nd
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
9
Ranking in other categories
Penetration Testing Services (2nd)
Picus Security
Ranking in Breach and Attack Simulation (BAS)
3rd
Average Rating
9.0
Reviews Sentiment
7.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Breach and Attack Simulation (BAS) category, the mindshare of Pentera is 29.3%, up from 28.3% compared to the previous year. The mindshare of Picus Security is 17.8%, up from 18.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Breach and Attack Simulation (BAS)
 

Featured Reviews

Jon Medvenics - PeerSpot reviewer
Useful in vulnerability management and can automate pen tests
One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources. Also, if you have credentials and want to check if they're still valid or can still be used, and you confirm they can't be used (maybe they're from a leak or a twenty-year-old database), there's no way for you to flag that these credentials aren't a problem anymore. The solution has a sort of flat report. It's annoying to go through lots of legwork only to see the same names or credentials still there, and you can't do anything about it in their portal. We've given them feedback, but I think it's probably on their long list of feature requests to address. For me, that would be a greater user configuration of the tests performed on a granular level. As I mentioned with Cymulate, they show you every line of code they will run and what tool is being used, step by step. Pentera is more closed in that regard. If Pentera released a feature that allows you to alter the attack path or change the command, that would be incredibly useful. Pentera might use one or a few different methods to do something, but if none of those work, it will just say everything is fine and secure. If Pentera could adapt or change based on what it finds in the environment, that would be very valuable. As a customer, we understand our environments better than an automated tool, so providing context to help the tool get better results would be valuable.
AkashDeshpandey - PeerSpot reviewer
Simulate attacks to test and validate security controls effectively
I can simulate an attack into a live environment and test whether my controls are working properly. It checks if the controls can stop and mitigate the attacks One valuable feature of Picus Security is security control validation. It provides good reports and offers signature-based solutions. I…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is SaaS-based. From a cloud perspective, it has Pentera Surface and Pentera Core. The Core is the on-prem deployed solution, while the Surface is the cloud-hosted solution that scans your public infrastructure. From the Surface perspective, the most valuable feature so far has been the attack surface mapping."
"What I like the most about Pentera is its solution-oriented approach."
"The product is easy to use."
"The most valuable feature of Pentera is that you can do continuous vulnerability assessment, which is automated."
"Pentera has many authentic features."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The tool showed us that our ransomware protection wasn’t working on some machines."
"The platform's most valuable features are credential management and vulnerability management."
"It's very useful software because the customer mostly configures their IPS and manages their firewalls, WAF, and the DBS according to the latest update, latest news, or according to the situation."
"One of the most valuable features would be the detection capability, specifically the ability to detect alarms and logs collected from SIEM tools."
"The most valuable feature of the solution is its integration capabilities with the other security tools."
"You have the liberty of physically executing a specific set of rules in your environment."
"It provides good reports and offers signature-based solutions."
"The most valuable feature of Picus Security is its threat intelligence, providing suggestions to block and prevent attacks by identifying malicious files and providing threat IDs."
 

Cons

"The licensing and IP management need improvement."
"One area for product improvement could be the inclusion of a dashboard to cover multiple branches and subsidiaries, allowing for centralized monitoring."
"One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources."
"Pentera's general dashboards could be improved and made more specific in terms of vulnerabilities that I'm discovering."
"There is room for improvement in virtualization compatibility."
"The licensing and IP management need improvement. When the IP is imported into a system, we cannot withdraw or revoke the license."
"The automated penetration testing features must be improved."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"The amount of integrations that the product can handle is an area of concern, making it one of the aspects where improvements are required."
"There is room for improvement in the response rate provided by customer support."
"To improve, Picus Security could consider establishing a data center in India to address trust issues and increase interest from Indian customers."
"According to the attack vectors, you cannot specify which product is failing or which product is working well because there's no agent."
"Let's say if a customer's environment has 10 security devices and they need to know that there is an attack that has bypassed their devices, they cannot go and inspect every device and every rule in their security devices."
"The reporting and data analysis could be improved. Specifically, the analysis of the results."
 

Pricing and Cost Advice

"The product's cost is reasonable. I rate the pricing a three out of ten."
"The tool is relatively cheap."
"It's not that expensive, but it could be more cost-effective."
"We have to pay a yearly licensing cost for Pentera."
"They have certain price ranges for their products, depending upon the use cases, and the number of applications the customer wants to try."
"There is a yearly license according to the number of vectors. The pricing is moderate."
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
10%
Educational Organization
6%
Financial Services Firm
22%
Computer Software Company
11%
Manufacturing Company
9%
Energy/Utilities Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Pentera?
What I like the most about Pentera is its solution-oriented approach.
What needs improvement with Pentera?
The licensing and IP management need improvement. When the IP is imported into a system, we cannot withdraw or revoke the license.
What is your primary use case for Pentera?
I am using the OpenIntra solution for pentesting and managing candidates in my environment. I also use this solution for house customers.
What do you like most about Picus Security?
The most valuable feature of Picus Security is its threat intelligence, providing suggestions to block and prevent attacks by identifying malicious files and providing threat IDs.
What is your experience regarding pricing and costs for Picus Security?
The pricing of Picus Security is average, and it offers a good value for money.
What needs improvement with Picus Security?
There is room for improvement in the response rate provided by customer support. Picus Security could improve the response time.
 

Comparisons

 

Overview

 

Sample Customers

Blackstone Group Caterpillar Apria Healthcare Taylor Vinters Sandler Capital Management Drawbridge BNP Paribas British Red Cross
Akbank, Exclusive Networks, Garanti, ING Bank, QNB Finansbank, Turkcell, Vodafone, Yapı Kredi
Find out what your peers are saying about Pentera vs. Picus Security and other solutions. Updated: June 2025.
860,592 professionals have used our research since 2012.