Try our new research platform with insights from 80,000+ expert users

What are the best tools to simulate attacks?

BN
Network Performance Management at Huawei Cameroun
  • 1
  • 6
PeerSpot user

1 Answer

Last answered May 20, 2021
EB
Director of Community at PeerSpot (formerly IT Central Station)
Real User
May 20, 2021
Find out what your peers are saying about Cymulate, Horizon3.ai, Pentera and others in Breach and Attack Simulation (BAS). Updated: January 2026.
881,082 professionals have used our research since 2012.
Search for a product comparison in Breach and Attack Simulation (BAS)
Breach and Attack Simulation (BAS)
Breach and Attack Simulation (BAS) tools are advanced security solutions that help organizations assess their cybersecurity posture by simulating potential attacks and breaches. They provide insights into vulnerabilities and measure the effectiveness of existing security measures. BAS solutions are designed to continuously test an organization's security systems by imitating the actions of attackers. By using real-world attack scenarios, BAS helps identify vulnerabilities in a controlled...
Download Breach and Attack Simulation (BAS) ReportRead more

Breach and Attack Simulation (BAS) experts

Sabbir Ahmed - PeerSpot reviewer
Director at Infosonik Systems Ltd
Ondrej Kováč - PeerSpot reviewer
Solution Engineer at Exclusive Networks Czechia
Mike Bulyk - PeerSpot reviewer
Senior Director IT Security at a wellness & fitness company with 1,001-5,000 employees
Uday Varma - PeerSpot reviewer
Solution Architecht at Inspira Enterprise
Timothy Rice - PeerSpot reviewer
Chief Information Security Officer at a construction company with 1,001-5,000 employees
Richard Marlow - PeerSpot reviewer
Vulnerability Testing Manager at Frasers Group
AkashDeshpandey - PeerSpot reviewer
Cyber Security Consultant at GBS IT Services
KD
Manager, Information Technology at a performing arts with 11-50 employees