I can simulate an attack into a live environment and test whether my controls are working properly. It checks if the controls can stop and mitigate the attacks.
Security Engineer at a tech services company with 201-500 employees
Real User
Top 20
2024-04-11T11:10:00Z
Apr 11, 2024
Picus Security is used for BAS, helping companies test their network security layers by simulating attacks from the cloud. It installs an agent behind the firewall to assess security configurations and policies, enabling both blue teaming and red teaming scenarios. Additionally, it provides prevention measures like URL bypass blocking to enhance firewall security.
Picus Security is a breach and attack simulation software. It has a dictionary attack. According to your peers and attack vectors, it's trying to attack with the files. It also has some lateral movement attacks. They need to install or configure the peers or attack vectors so we can support it. The solution updates almost daily because the dictionary updates. The latest version is 4273. We have some customers using the on cloud platform. We also have some military customers who are using the on-prem solution. The system managers or administrators are managing this product, so I don't have a specific number of clients that are using the solution.
We enagage with customers in the Middle East to check the visibility of the use cases that we create, using the Picus solution. We want to check the strength of their infrastructure, their application servers. This is the type of integration exercise we do for our customers. We check if there are any loopholes or weak links that can be hardened using a visibility tool, of course like Picus Security. Customers in the Middle East are concerned about cloud solutions, the data or software component has to reside within their premise or at least inside the boundaries of this country. The majority of them prefer the on-premise solution, and sometimes we use cloud-based solutions as well. When using the cloud they have a SaaS service available and it's hosted on Amazon cloud.
Independent from any vendor or technology, the unparalleled Picus Platform is designed to continuously measure the effectiveness of security defenses by using emerging threat samples in production environments. Created by a team that’s been working together more than 10 years already and has proven their expertise in enterprise cybersecurity, Picus is trusted by many large multinational corporations and government agencies.
I can simulate an attack into a live environment and test whether my controls are working properly. It checks if the controls can stop and mitigate the attacks.
Picus Security is used for BAS, helping companies test their network security layers by simulating attacks from the cloud. It installs an agent behind the firewall to assess security configurations and policies, enabling both blue teaming and red teaming scenarios. Additionally, it provides prevention measures like URL bypass blocking to enhance firewall security.
I have used Picus Security to see what it can do. I use Picus Security for continuous security validation and control effectiveness.
In general terms, our clients use Picus Security to verify the security controls in their environments.
Picus Security is a breach and attack simulation software. It has a dictionary attack. According to your peers and attack vectors, it's trying to attack with the files. It also has some lateral movement attacks. They need to install or configure the peers or attack vectors so we can support it. The solution updates almost daily because the dictionary updates. The latest version is 4273. We have some customers using the on cloud platform. We also have some military customers who are using the on-prem solution. The system managers or administrators are managing this product, so I don't have a specific number of clients that are using the solution.
We enagage with customers in the Middle East to check the visibility of the use cases that we create, using the Picus solution. We want to check the strength of their infrastructure, their application servers. This is the type of integration exercise we do for our customers. We check if there are any loopholes or weak links that can be hardened using a visibility tool, of course like Picus Security. Customers in the Middle East are concerned about cloud solutions, the data or software component has to reside within their premise or at least inside the boundaries of this country. The majority of them prefer the on-premise solution, and sometimes we use cloud-based solutions as well. When using the cloud they have a SaaS service available and it's hosted on Amazon cloud.