Picus Security Named a Customers’ Choice by Gartner Peer Insights™ 2024 VoC

At Picus, our success is defined by the trust and results we deliver for our customers every day.

The 2024 Gartner “Voice of Customer Breach and Attack Simulation” report, released on January 30, is based on customer reviews submitted over an 18-month period ending in November 2023. It synthesizes feedback from verified users on Gartner Peer Insights™, providing a peer-driven evaluation of the breach and simulation market. The report is a valuable resource for IT security decision-makers, offering insights into vendor performance and user satisfaction.

Recognized in the Gartner Peer Insights™ “Voice of the Customer” report, Picus Security achieved the highest willingness to recommend among all Breach and Attack Simulation (BAS) vendors. 

The report utilizes a methodology to plot vendors based on User Interest and Adoption and Overall Experience, placing the vendors in BAS market into four quadrants: Customers’ Choice, Strong Performers, Established, and Aspiring. Picus Security is positioned as the “Customers’ Choice”, which we believe reflects exceptional performance in both dimensions.

With an overall rating of 4.8 out of 5, Picus Security achieved the highest willingness to recommend score among all vendors included in the report. As of 2023, Picus Security had received 100 reviews. This rating represents the aggregated satisfaction of customers across multiple aspects, including platform functionality, deployment, and support.

Our product capabilities received a 4.9 rating—the highest in the document. We believe that our customers rated the platform highly for its ability to simulate real-world threats, identify vulnerabilities, and deliver actionable recommendations to address critical risks effectively. 

With a 4.8 rating for support experience, we believe that our exceptional service quality is reflected at every stage of the customer journey.

We are grateful to our customers for sharing their experiences and insights. Their feedback validates the value of our platform and inspires us to continue delivering excellence.

See Picus Security Validation Platform

Simulate tactics and techniques across the cyber kill chain and address gaps swiftly and effectively with a cutting-edge BAS solution.

 

gartner (3)

What Our Customers Say


“Picus: Meeting Unconventional Demand with Customizable Attacks and Baselines

Working with Picus has been exceptional both from a technology perspective and a people perspective. We approached the product with unconventional asks of the tool and it did not fail to meet our needs. Picus enables
our team to customize attacks and run them in our environment on a routine basis while also quickly assessing our
controls to improve our posture with a series of quick wins. The user interface is intuitive and clean, which makes
working with the product that much better."

– VP Information Security, Banking, Read the full review.

“Strong Product to Get a Continuous Security Assessment
Picus is one of the best BAS solutions on the market today. The threat database it is constantly updated, in order to simulate the lastest attack campaign and threat, to better understand if the company has an adequate protection against them. It is possible to customise the campaign or schedule the assessment periodically, to test protection measure implemented on network, endpoint and email . A great value for having a better knowledge of the enterprise cybersecurity posture."

– ICT Security Engineer, Transportation,
Read the full review.

“Cyber Attack Threat Simulation: Constantly Updating, Always Scanning
The product is a cyber attack threat simulation and a very successful and effective product in many areas. The product, which has many features such as constantly updating the threat library, performing timely and continuous scans, effective solution suggestions in the mitigation sections, setting up simulations according to the infrastructure, is quite successful in terms of preliminary preparation/ practice before a real scenario occurs and detecting and eliminating open points."

– Information Security Executive, Insurance,
Read the full review.

 

Evaluating Breach and Attack Simulation

Picus-10-criteria-BAS-mockupBreach and Attack Simulation (BAS) measures and improves cyber resilience by continuously and automatically testing the efficacy of your defenses. As the most effective solution for security control assessment, BAS has become an essential tool in organizations' cyber security toolset.With numerous BAS solutions offering different features, the key question is: Which BAS solution best fits your needs?

Learn the ten most important factors to consider when selecting a Breach and Attack Simulation tool. 

 

Picus BAS Features to Maximize ROI

Threat simulation across the entire attack kill chain.

Up-to-date threat library includes known and emerging threats observed in malware and threat actor campaigns.

Continuous and automated simulations can run without customization while also providing maximum flexibility to create custom scenarios as needed.

Direct and actionable mitigation suggestions, including both vendor-specific and vendor-neutral insights.

Real-time, customized reporting to communicate gaps in security posture to decision-makers effectively, providing data-driven evidence to justify security investments.

  Mapping to the MITRE ATT&CK framework and other relevant industry standards.

 

Reviews have been edited to account for errors and readability.

Gartner, Gartner Peer Insights Voice of the Customer for Breach and Attack Simulation Tools, Peer Contributors, 30 January 2024.

GARTNER is a registered trademark and service mark of Gartner and Peer Insights is a registered trademark , of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Download Your Report

banner-image