On a scale of one to ten, I would rate the solution ten out of ten. However, the only area that would need improvement is the response time from customer support.
Security Engineer at a tech services company with 201-500 employees
Real User
Top 20
2024-04-11T11:10:00Z
Apr 11, 2024
Picus Security's continuous validation feature offers predefined attack templates and over ten thousand simulations. Users can see how well their security solutions prevent attacks on endpoints and receive suggestions for improvement. This helps enhance overall security measures. Integrating Picus Security with existing security tools and workflows isn't straightforward as it requires manual installation of the agent, rather than seamless integration with other products. For new users, my advice is to leverage Picus Security for simulation and prevention purposes, as it is considered one of the best options in both European and Asian countries. Overall, I would rate Picus Security as a nine out of ten.
Information Security System Manager at CS-Consulting
Real User
Top 20
2024-01-30T12:34:01Z
Jan 30, 2024
Picus Security has been implemented in our organization to enhance threat detection by allowing us to test some of the other security tools in our company. I recommend the product to others who plan to use it. The tool has not had an impact on our company's overall security posture since the time of implementation since we just used it for some testing purposes, during which it did show some interesting results. I rate the overall tool a nine out of ten.
I recommend starting with a few risk factors and gradually expanding the platform's usage. Begin with evaluating risks from different perspectives, like from the firewall to data loss prevention. Starting small allows for better management of data and a smoother experience. Considering what I know about other platforms in the market, I'd give Picus Security an eight.
As far as the implementation is concerned, you definitely need to evaluate our own infrastructure first. I see a lot of customers installing the agents at an inappropriate place. For example, let's say we want to initiate an attack from the Picus cloud to somewhere inside your own network. You need to access and ensure that the traffic is going through every security device you're evaluating. Customers frequently install agents at a place which doesn't cover all the security devices. There is a need to ensure that traffic is going through all the security devices.
Independent from any vendor or technology, the unparalleled Picus Platform is designed to continuously measure the effectiveness of security defenses by using emerging threat samples in production environments. Created by a team that’s been working together more than 10 years already and has proven their expertise in enterprise cybersecurity, Picus is trusted by many large multinational corporations and government agencies.
On a scale of one to ten, I would rate the solution ten out of ten. However, the only area that would need improvement is the response time from customer support.
Picus Security's continuous validation feature offers predefined attack templates and over ten thousand simulations. Users can see how well their security solutions prevent attacks on endpoints and receive suggestions for improvement. This helps enhance overall security measures. Integrating Picus Security with existing security tools and workflows isn't straightforward as it requires manual installation of the agent, rather than seamless integration with other products. For new users, my advice is to leverage Picus Security for simulation and prevention purposes, as it is considered one of the best options in both European and Asian countries. Overall, I would rate Picus Security as a nine out of ten.
Picus Security has been implemented in our organization to enhance threat detection by allowing us to test some of the other security tools in our company. I recommend the product to others who plan to use it. The tool has not had an impact on our company's overall security posture since the time of implementation since we just used it for some testing purposes, during which it did show some interesting results. I rate the overall tool a nine out of ten.
I recommend starting with a few risk factors and gradually expanding the platform's usage. Begin with evaluating risks from different perspectives, like from the firewall to data loss prevention. Starting small allows for better management of data and a smoother experience. Considering what I know about other platforms in the market, I'd give Picus Security an eight.
I would rate this solution 9 out of 10. It's very important to be sure about your infrastructure to decide the correct implementation.
As far as the implementation is concerned, you definitely need to evaluate our own infrastructure first. I see a lot of customers installing the agents at an inappropriate place. For example, let's say we want to initiate an attack from the Picus cloud to somewhere inside your own network. You need to access and ensure that the traffic is going through every security device you're evaluating. Customers frequently install agents at a place which doesn't cover all the security devices. There is a need to ensure that traffic is going through all the security devices.