I have used Pentera as an automation tool both for customers and within my organization.
Cybersecurity Engineer at a tech services company with 5,001-10,000 employees
Offers a solution-oriented approach and straightforward deployment
Pros and Cons
- "What I like the most about Pentera is its solution-oriented approach."
- "There is room for improvement in virtualization compatibility."
What is our primary use case?
What is most valuable?
What I like the most about Pentera is its solution-oriented approach.
What needs improvement?
There is room for improvement in virtualization compatibility. Testing with virtual servers didn't yield the same results as on-premises services, and the vendor's support was limited in addressing this issue.
For how long have I used the solution?
I have been using Pentera for six months.
Buyer's Guide
Breach and Attack Simulation (BAS)
July 2025

Find out what your peers are saying about Pentera, Cymulate, Horizon3.ai and others in Breach and Attack Simulation (BAS). Updated: July 2025.
861,524 professionals have used our research since 2012.
What do I think about the stability of the solution?
Pentera's stability is decent, although there are occasional issues. I would rate the stability as a seven out of ten.
How are customer service and support?
The technical support is very good. I would rate them as an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
Deployment of Pentera is straightforward, requiring basic networking knowledge, making it accessible for anyone to deploy.
What's my experience with pricing, setup cost, and licensing?
Pentera is expensive.
What other advice do I have?
We use Pentera for routine security assessments by demonstrating vulnerabilities to customers. For example, we show them how fixing one vulnerability, like SMB, can address related vulnerabilities. Customers appreciate the visual map view of their security landscape provided by Pentera.
Pentera helped uncover a critical vulnerability for a company during the pandemic. They had in-house servers with an SMB v2 vulnerability and were using legacy software or operating systems. We demonstrated the risk by conducting ransomware testing on these unsupported servers, highlighting the urgent need for mitigation.
Automated penetration testing with Pentera has boosted our team's efficiency. Manual testing required extensive reporting and specific exploitation of vulnerabilities, which was time-consuming. Pentera streamlines the process, reducing the time and costs associated with generating reports and pinpointing vulnerabilities quickly.
Pentera's vulnerability detection capabilities have about 90% accuracy, based on personal experience. While it accurately identifies most vulnerabilities, there are instances where reported vulnerabilities are not exploitable upon further testing.
New users should consider demonstrating Pentera's capabilities to their company. Automation helps uncover hidden vulnerabilities, improving security and highlighting areas for enhancement.
Overall, I would rate Pentera as an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.

CISO at Podravka
Great vulnerability scanner, exploit achievements, and remediation actions
Pros and Cons
- "The vulnerability scanner, exploit achievements, and remediation actions are all great."
- "The vulnerability scanner, exploit achievements, and remediation actions are all great."
What is our primary use case?
We use the product for an automatic PEN test on the focus area (200 - 300 IP) per one PEN test.
How has it helped my organization?
We have focused PEN tests on network segments and try to solve all vulnerabilities after. We watch the PEN test progress with the NDR solution.
What is most valuable?
The vulnerability scanner, exploit achievements, and remediation actions are all great.
What needs improvement?
They need to offer support for a new graphic card.
For how long have I used the solution?
I've used the solution for two months.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Breach and Attack Simulation (BAS) Report and find out what your peers are saying about Pentera, Cymulate, Horizon3.ai, and more!
Updated: July 2025
Popular Comparisons
Akamai Guardicore Segmentation
Cymulate
HackerOne
The NodeZero Platform
Picus Security
SafeBreach
AttackIQ
CyCognito
Cobalt
vPentest
Verodin
Rapid7 Penetration Testing Services
Fortra's Cobalt Strike
Fortinet Penetration Testing Service
BreachLock Penetration Testing Services
Buyer's Guide
Download our free Breach and Attack Simulation (BAS) Report and find out what your peers are saying about Pentera, Cymulate, Horizon3.ai, and more!
Quick Links
Learn More: Questions:
- How does Pentera compare with Qualys VMDR?
- When evaluating Breach and Attack Simulation (BAS), what aspect do you think is the most important to look for?
- What are the best practices to prevent a Brute Force attack via remote access?
- What are the best tools to simulate attacks?
- Which BAS tool is better and why: Cymulate vs SafeBreach?
- Twilio discloses a data breach. What could be done better to prevent it in the future?
- Why is Breach and Attack Simulation (BAS) important for companies?