The Picus Security Validation Platform
Picus SecurityReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
218 reviews
from
and
External reviews are not included in the AWS star rating for the product.
Friendly interface, successful product, great support
What do you like best about the product?
I like the way of using gui- which is so easy to use/has understandable menu's. With Fast/non-problematic integrations. Threats are always up to date almost daily basis and dynamic threat scheduling feature discards the need of the frequent care. After implementing the system correctly, you only need follow up the reports and take actions afterwise.
The other thing that i like about picus security is customer support. I don't remember anytime that i waited more than 1-2 hours for a response from picus, and support engineers are really skilled about the product. If any bug or some problem appears which r&d should take care; this procedure also are so fast comparing the other vendor's support teams.
We can ask for a new feature via the portal and somebody from Picus always returns our input.
The other thing that i like about picus security is customer support. I don't remember anytime that i waited more than 1-2 hours for a response from picus, and support engineers are really skilled about the product. If any bug or some problem appears which r&d should take care; this procedure also are so fast comparing the other vendor's support teams.
We can ask for a new feature via the portal and somebody from Picus always returns our input.
What do you dislike about the product?
On prems systems may have new features a bit late than cloud systems.
Integrations are working well after you configured correctly but while trying to first time implementing; fail logs are not so clear to troubleshoot the issue.
Integrations are working well after you configured correctly but while trying to first time implementing; fail logs are not so clear to troubleshoot the issue.
What problems is the product solving and how is that benefiting you?
I am consultant, not the product admin so answer is not clear for me.
Easy to use and vendor specific mitigation very helpfull
What do you like best about the product?
Easy to use and vendor specific mitigation very helpfull
What do you dislike about the product?
Vendors which give mitigation number can increase
What problems is the product solving and how is that benefiting you?
We can identified our security gaps.
Able to integrate with majority of market cybersecurity solutions
What do you like best about the product?
Picus Security SCV has able to supports the integration with majority of market cybersecurity solutions to perform security assessment.
What do you dislike about the product?
The solution training, it lack of post sales training in its Picus Academy portal.
What problems is the product solving and how is that benefiting you?
It helps me to validate my security control and address the security gap in this dynamic environment.
A Unique Experience for Cyber Security
What do you like best about the product?
It quickly becomes apparent that the product is significantly superior compared to similar competitors. It is far above its peers.
Its functionality, admin-friendly design, stability, and the many features that competitors lack make it truly unique
Its functionality, admin-friendly design, stability, and the many features that competitors lack make it truly unique
What do you dislike about the product?
The product needs to hold more organizational and vendor-partner meetings and expand its advertising efforts.
What problems is the product solving and how is that benefiting you?
It implements Red-Team applications in the field of Cyber Security in an up-to-date and stable manner on my behalf.
A useful and well-designed software. User-friendly and practical.
What do you like best about the product?
User-friendly and practical.It behaves like an attacker, allowing malicious files to be uploaded during the process, and then removes those files after the test — these are well-designed features.Integrations are done very quickly and easily, and their technical consultancy is excellent.
What do you dislike about the product?
The tests conducted have not fully embraced the principles of white-box and black-box testing. I would have preferred them to be effective in both approaches.
What problems is the product solving and how is that benefiting you?
We can identify configuration errors made in the environment. In addition, it helps me analyze the movements of a hacker group and use the products I have to ensure maximum security.
The Gold Standard in Security Validation
What do you like best about the product?
What I like best about Picus Security is that it has completely transformed the way we measure and strengthen our cyber defenses. The platform delivers exceptionally realistic and constantly updated attack simulations, ensuring we are always prepared for the latest threats.
Its intuitive, beautifully designed interface makes running simulations, reviewing insights, and implementing improvements effortless — even for complex environments. The reporting is world-class, providing clear, actionable intelligence that not only improves our security posture but also impresses management and simplifies compliance audits.
Most importantly, Picus empowers us to move from a reactive stance to a truly proactive, intelligence-driven security strategy, giving us unmatched confidence in our ability to defend against evolving cyber threats. Simply put, it’s one of the most impactful security solutions we have ever implemented.
Its intuitive, beautifully designed interface makes running simulations, reviewing insights, and implementing improvements effortless — even for complex environments. The reporting is world-class, providing clear, actionable intelligence that not only improves our security posture but also impresses management and simplifies compliance audits.
Most importantly, Picus empowers us to move from a reactive stance to a truly proactive, intelligence-driven security strategy, giving us unmatched confidence in our ability to defend against evolving cyber threats. Simply put, it’s one of the most impactful security solutions we have ever implemented.
What do you dislike about the product?
Honestly, there’s very little to dislike about Picus Security.
If I had to mention something, it would be that the platform offers so many capabilities and features that it can feel overwhelming at first. However, this is more a sign of its depth and power than a real drawback — and the excellent onboarding resources and responsive support team make the learning curve short and manageable.
If I had to mention something, it would be that the platform offers so many capabilities and features that it can feel overwhelming at first. However, this is more a sign of its depth and power than a real drawback — and the excellent onboarding resources and responsive support team make the learning curve short and manageable.
What problems is the product solving and how is that benefiting you?
Picus Security is addressing one of the most critical challenges in cybersecurity today — ensuring that security controls are actually effective against real-world threats. By continuously simulating cyberattacks in production environments, Picus helps identify gaps in prevention and detection capabilities before attackers can exploit them.
This proactive approach not only strengthens our security posture but also provides measurable insights that help us prioritize and optimize our defense strategies. The platform’s ease of use, comprehensive threat library, and detailed mitigation guidance make it a valuable tool for both red and blue teams.
Thanks to Picus, we can validate our security controls with confidence and respond to evolving threats much faster. It adds real, measurable value to our cybersecurity operations.
This proactive approach not only strengthens our security posture but also provides measurable insights that help us prioritize and optimize our defense strategies. The platform’s ease of use, comprehensive threat library, and detailed mitigation guidance make it a valuable tool for both red and blue teams.
Thanks to Picus, we can validate our security controls with confidence and respond to evolving threats much faster. It adds real, measurable value to our cybersecurity operations.
Picus Security is recommending for organizations that adopt a proactive approach to cybersecurity.
What do you like best about the product?
What I like best about Picus Security is its ability to continuously validate the effectiveness of security controls through automated, real-world attack simulations. The platform provides actionable insights by emulating the latest threat tactics, techniques, and procedures (TTPs) aligned with the MITRE ATT&CK framework. This allows security teams to identify coverage gaps, prioritize remediation efforts, and improve detection and response capabilities with measurable outcomes.
What do you dislike about the product?
While Picus Security offers exceptional value in continuous security validation, one area that could be improved is the customization flexibility for highly specific or niche attack scenarios.
What problems is the product solving and how is that benefiting you?
Identify and close detection and prevention gaps before attackers can exploit them
Improve the performance of our SIEM, EDR, and other security tools with clear, actionable insights
Justify security investments and prioritize remediation efforts with measurable metrics
Strengthen collaboration between red and blue teams (purple teaming) through shared visibility
Overall, Picus increases our confidence in our security posture and helps us move from reactive to proactive defense, which is a huge benefit in today’s fast-evolving threat landscape.
Improve the performance of our SIEM, EDR, and other security tools with clear, actionable insights
Justify security investments and prioritize remediation efforts with measurable metrics
Strengthen collaboration between red and blue teams (purple teaming) through shared visibility
Overall, Picus increases our confidence in our security posture and helps us move from reactive to proactive defense, which is a huge benefit in today’s fast-evolving threat landscape.
Hands-On Experience with Picus Security: A Practical Tool for Continuous Threat Validation
What do you like best about the product?
My favourite thing about Picus Security is how well it replicates actual cyberattacks in a safe setting, which enables me to spot weaknesses in detection and reaction. Its modules for Email Infiltration and Attack Path Validation (APV) are especially helpful for comprehending how threats might spread laterally throughout the network. Continuously validating and enhancing our defences was made simpler by the user-friendly dashboard, thorough reporting, and integration with SIEM platforms.
What do you dislike about the product?
Despite Picus Security's strength, I occasionally encountered delays in detection, particularly when integrating with SIEM platforms such as RSA NetWitness. Simulations can occasionally run for an excessive amount of time and take too long to start, which delays the evaluation process. According my experience.
What problems is the product solving and how is that benefiting you?
By mimicking actual cyberattacks, Picus Security assists in locating and verifying weaknesses in my company's security measures. It resolves the problem of gauging the efficacy of detection across security tools such as firewalls, EDRs, and SIEMs. It gives me insight into which threats are identified or overlooked by running simulations continuously, which helps me adjust rules, optimise configurations, and raise overall SOC readiness. This proactive approach helps reduce the risk of breaches and ensures better alignment with threat detection and response goals.
A user friendly, easy to deploy solution
What do you like best about the product?
Deploy picus security is straightforward. The setup/configure process is guided with clear instructions, and only minimal configuration is required to start running assessments, making the onboarding process fast and efficient.
The user interface is intuitive and visually well organized, enabling both technical and non-technical teams to easily navigate the platform.
The user interface is intuitive and visually well organized, enabling both technical and non-technical teams to easily navigate the platform.
What do you dislike about the product?
While Picus Security delivers significant value, its effectiveness is closely tied to its prebuilt attack library. Organizations looking for highly customized or niche testing scenarios may find customization options somewhat limited compared to manual penetration testing or red teaming.
What problems is the product solving and how is that benefiting you?
Picus Security helps organization continuously test and validate the security controls, quickly identify gaps, and take action to strengthen the organization defenses, which improves organization overall security posture.
Helps me validate security controls with realistic attack simulations
What do you like best about the product?
What I like most about Picus is how easy it makes running attack simulations aligned with the MITRE ATT&CK framework. I can clearly see which security controls are effective and where the gaps are — not just in detection, but also in prevention. It saves me a lot of time by providing ready-to-use remediation content for SIEMs, EDRs, and other tools. The integrations worked smoothly in my environment, and it’s useful for both red and blue team activities.
The customer support team also deserves credit — they’re highly responsive, proactive, and genuinely helpful whenever I reach out. That kind of support makes the implementation and daily usage way easier.
Initial setup is very straightforward and doesn’t require complex configuration. You just need to pay some attention during the first phase to properly align things with your infrastructure, but once it's up and running, it’s low-maintenance and continues to deliver value without extra effort.
The customer support team also deserves credit — they’re highly responsive, proactive, and genuinely helpful whenever I reach out. That kind of support makes the implementation and daily usage way easier.
Initial setup is very straightforward and doesn’t require complex configuration. You just need to pay some attention during the first phase to properly align things with your infrastructure, but once it's up and running, it’s low-maintenance and continues to deliver value without extra effort.
What do you dislike about the product?
The attack scenarios are top-notch, but I find the reporting capabilities a bit limited. I’d like more flexibility to tailor reports based on the audience — for example, a high-level summary for management vs. detailed views for technical teams. Also, the export options could offer better filtering and formatting to meet different reporting needs.
What problems is the product solving and how is that benefiting you?
Picus enables continuous security control validation by executing adversary emulation scenarios mapped directly to the MITRE ATT&CK framework. It helps me identify blind spots in both detection and prevention layers, whether it’s misconfigured SIEM correlation rules, ineffective EDR policies, or firewall gaps. By automating these attack simulations, I can quickly assess the real impact of configuration changes or signature updates across multiple tools.
One of the key benefits is the constantly updated detection rule library, which allows me to address gaps without spending time writing rules from scratch. This has streamlined purple teaming efforts and helped us shift from reactive incident response to proactive defense tuning.
One of the key benefits is the constantly updated detection rule library, which allows me to address gaps without spending time writing rules from scratch. This has streamlined purple teaming efforts and helped us shift from reactive incident response to proactive defense tuning.
showing 141 - 150