Picus Security Overview

What is Picus Security?

Independent from any vendor or technology, the unparalleled Picus Platform is designed to continuously measure the effectiveness of security defenses by using emerging threat samples in production environments. Created by a team that’s been working together more than 10 years already and has proven their expertise in enterprise cybersecurity, Picus is trusted by many large multinational corporations and government agencies.

Picus Security Customers
Akbank, Exclusive Networks, Garanti, ING Bank, QNB Finansbank, Turkcell, Vodafone, Yapı Kredi
Picus Security Video

Pricing Advice

What users are saying about Picus Security pricing:
  • "They have certain price ranges for their products, depending upon the use cases, and the number of applications the customer wants to try."

Picus Security Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Taha Hussain
Solutions Architect Cybersecurity
Reseller
Leaderboard
Dec 18, 2020
Offers the ability to physically execute a specific set of rules in your environment but doesn't provide patches automatically

What is our primary use case?

We enagage with customers in the Middle East to check the visibility of the use cases that we create, using the Picus solution. We want to check the strength of their infrastructure, their application servers. This is the type of integration exercise we do for our customers. We check if there are any loopholes or weak links that can be hardened using a visibility tool, of course like Picus Security. Customers in the Middle East are concerned about cloud solutions, the data or software component has to reside within their premise or at least inside the boundaries of this country. The majority… more »

Pros and Cons

  • "You have the liberty of physically executing a specific set of rules in your environment."
  • "Let's say if a customer's environment has 10 security devices and they need to know that there is an attack that has bypassed their devices, they cannot go and inspect every device and every rule in their security devices."

What other advice do I have?

As far as the implementation is concerned, you definitely need to evaluate our own infrastructure first. I see a lot of customers installing the agents at an inappropriate place. For example, let's say we want to initiate an attack from the Picus cloud to somewhere inside your own network. You need to access and ensure that the traffic is going through every security device you're evaluating. Customers frequently install agents at a place which doesn't cover all the security devices. There is a need to ensure that traffic is going through all the security devices.