On a scale of one to ten, I would rate the solution ten out of ten. However, the only area that would need improvement is the response time from customer support.
Security Engineer at a tech services company with 201-500 employees
Real User
Apr 11, 2024
Picus Security's continuous validation feature offers predefined attack templates and over ten thousand simulations. Users can see how well their security solutions prevent attacks on endpoints and receive suggestions for improvement. This helps enhance overall security measures. Integrating Picus Security with existing security tools and workflows isn't straightforward as it requires manual installation of the agent, rather than seamless integration with other products. For new users, my advice is to leverage Picus Security for simulation and prevention purposes, as it is considered one of the best options in both European and Asian countries. Overall, I would rate Picus Security as a nine out of ten.
Information Security System Manager at CS-Consulting
Real User
Jan 30, 2024
Picus Security has been implemented in our organization to enhance threat detection by allowing us to test some of the other security tools in our company. I recommend the product to others who plan to use it. The tool has not had an impact on our company's overall security posture since the time of implementation since we just used it for some testing purposes, during which it did show some interesting results. I rate the overall tool a nine out of ten.
Cybersecurity Customer Service Manager and Technical Account Manager at Cybersel
Reseller
Jul 26, 2023
I recommend starting with a few risk factors and gradually expanding the platform's usage. Begin with evaluating risks from different perspectives, like from the firewall to data loss prevention. Starting small allows for better management of data and a smoother experience. Considering what I know about other platforms in the market, I'd give Picus Security an eight.
Solutions Architect Cybersecurity at a tech vendor with 11-50 employees
Reseller
Dec 13, 2020
As far as the implementation is concerned, you definitely need to evaluate our own infrastructure first. I see a lot of customers installing the agents at an inappropriate place. For example, let's say we want to initiate an attack from the Picus cloud to somewhere inside your own network. You need to access and ensure that the traffic is going through every security device you're evaluating. Customers frequently install agents at a place which doesn't cover all the security devices. There is a need to ensure that traffic is going through all the security devices.
Picus Security provides automated attack simulation and MITRE framework mapping to enhance security validations and detection. It improves integration with existing security tools and updates protocols without affecting production servers.Picus Security is tailored for continuous validation of security controls across hybrid environments. By simulating MITRE ATT&CK techniques, it identifies detection gaps and advises on remediation. The platform supports managing firewall security and...
On a scale of one to ten, I would rate the solution ten out of ten. However, the only area that would need improvement is the response time from customer support.
Picus Security's continuous validation feature offers predefined attack templates and over ten thousand simulations. Users can see how well their security solutions prevent attacks on endpoints and receive suggestions for improvement. This helps enhance overall security measures. Integrating Picus Security with existing security tools and workflows isn't straightforward as it requires manual installation of the agent, rather than seamless integration with other products. For new users, my advice is to leverage Picus Security for simulation and prevention purposes, as it is considered one of the best options in both European and Asian countries. Overall, I would rate Picus Security as a nine out of ten.
Picus Security has been implemented in our organization to enhance threat detection by allowing us to test some of the other security tools in our company. I recommend the product to others who plan to use it. The tool has not had an impact on our company's overall security posture since the time of implementation since we just used it for some testing purposes, during which it did show some interesting results. I rate the overall tool a nine out of ten.
I recommend starting with a few risk factors and gradually expanding the platform's usage. Begin with evaluating risks from different perspectives, like from the firewall to data loss prevention. Starting small allows for better management of data and a smoother experience. Considering what I know about other platforms in the market, I'd give Picus Security an eight.
I would rate this solution 9 out of 10. It's very important to be sure about your infrastructure to decide the correct implementation.
As far as the implementation is concerned, you definitely need to evaluate our own infrastructure first. I see a lot of customers installing the agents at an inappropriate place. For example, let's say we want to initiate an attack from the Picus cloud to somewhere inside your own network. You need to access and ensure that the traffic is going through every security device you're evaluating. Customers frequently install agents at a place which doesn't cover all the security devices. There is a need to ensure that traffic is going through all the security devices.