No more typing reviews! Try our Samantha, our new voice AI agent.

Best Breach and Attack Simulation (BAS) Solutions

What is Breach and Attack Simulation (BAS)?

Breach and Attack Simulation (BAS) solutions mindshare

As of April 2026, in the Breach and Attack Simulation (BAS) category, the mindshare of Cymulate is 14.9%, down from 22.4% compared to the previous year. The mindshare of Pentera is 21.8%, down from 30.4% compared to the previous year. The mindshare of The NodeZero Platform by Horizon3.ai is 14.4%, up from 8.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Breach and Attack Simulation (BAS) Mindshare Distribution
ProductMindshare (%)
Pentera21.8%
Cymulate14.9%
The NodeZero Platform by Horizon3.ai14.4%
Other48.9%
Breach and Attack Simulation (BAS)

Top Breach and Attack Simulation (BAS) products

Rankings through
Find out what your peers are saying about Horizon3.ai, Cymulate, Pentera and others in Breach and Attack Simulation (BAS). Updated: April 2026.
891,869 professionals have used our research since 2012.
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
891,869 professionals have used our research since 2012.

Breach and Attack Simulation (BAS) experts

Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Sabbir Ahmed - PeerSpot reviewer
Director at Infosonik Systems Ltd
Mike Bulyk - PeerSpot reviewer
Senior Director IT Security at a wellness & fitness company with 1,001-5,000 employees
reviewer2783439 - PeerSpot reviewer
DevOps at a marketing services firm with 51-200 employees

Breach and Attack Simulation (BAS) FAQ

How does BAS differ from penetration testing?

Can BAS be disruptive to my business operations?

How can I get started with BAS?

What are the ongoing costs of maintaining a BAS solution?

What are the different types of Breach and Attack Simulation (BAS) tools?

How do Breach and Attack Simulation (BAS) work?

What are the benefits of Breach and Attack Simulation (BAS)?

What are the key features of Breach and Attack Simulation (BAS)?