Pentera is the category leader for Automated Security Validation, allowing every organization to evaluate its security readiness, to know its real security risk at any given moment. Test all cybersecurity layers across the attack surface – inside and out – by safely emulating attacks & prioritize patching with a risk-based remediation roadmap.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io
Product | Market Share (%) |
---|---|
Pentera | 29.1% |
Cymulate | 21.4% |
Picus Security | 17.5% |
Other | 32.0% |
Pentera is primarily used for automated penetration testing, compliance checks, and vulnerability management. Users employ it for test simulations on servers to identify vulnerabilities, supplement vulnerability programs, and automate regular pen testing. It's valuable for password strength assessments and ransomware testing. Features include comprehensive attack surface coverage, real-world attack emulation, and risk-based prioritization. It's used by financial organizations, telecommunications companies, and government entities, aligning with Mitre ATT&CK for standardized adversary tactic understanding.
Company Size | Count |
---|---|
Small Business | 4 |
Midsize Enterprise | 1 |
Large Enterprise | 4 |
Company Size | Count |
---|---|
Small Business | 359 |
Midsize Enterprise | 276 |
Large Enterprise | 862 |
Author info | Rating | Review Summary |
---|---|---|
Director at Infosonik Systems Ltd | 4.5 | I've used Pentera for three years and find its attack surface coverage, real-world emulations, and automated testing valuable, though pricing and licensing changes have made it less accessible for some clients despite excellent support and comprehensive reporting. |
Vulnerability Testing Manager at Frasers Group | 4.0 | We used Pentera for password strength assessments, ransomware testing, and automated penetration testing. The password strength and testing features were valuable, identifying issues with our ransomware protection. However, the automated penetration testing features need improvement. Overall, the product provides significant value. |
Executive Director at Systemtech Services Limited | 4.0 | I use Pentera to validate our security environment, focusing on credential and vulnerability management. One improvement would be a dashboard for centralized monitoring across multiple branches. I haven't considered other solutions, and no specific deployment or cloud provider is used. |
Pre-sale manager at Nam Truong Son | 3.5 | I use Pentera for pentesting and managing candidates. Its automation features are valuable for creating validation scenarios. However, the licensing and IP management could improve. Despite a small environment, it offers potential benefits for larger setups. |
Cyber Security at Taxes Authority | 4.5 | I use Pentera for test simulation on our servers to identify vulnerabilities. The product is easy to use and enhances cybersecurity, keeping our organization secure. Although the price could be improved, it provides a good return on investment. |
Technical Support Engineer at a comms service provider with 51-200 employees | 4.0 | I am searching for VMware or ransomware scanning solutions. Pentera could improve its scalability for smaller deals under 500 IPs while offering useful remediation steps and better masking of sensitive information on websites. |
Cyber Security Officer at AFC Holdings | 4.0 | I primarily use Pentera to address compliance issues, valuing its automated continuous vulnerability assessment. However, its dashboards need refinement, virtual patching, and licensing flexibility for smaller organizations. Previously, I worked with Qualys, ManageEngine, and Security Onion. |
Cybersecurity Engineer at a tech services company with 5,001-10,000 employees | 4.0 | I use Pentera as an automation tool for both customers and my organization, appreciating its solution-oriented approach. However, it's less effective with virtual servers than on-premises services, and vendor support could improve in addressing virtualization compatibility issues. |