Picus Security Valuable Features

KA
Information Security System Manager at CS-Consulting

The most valuable feature of the solution is its integration capabilities with the other security tools.

View full review »
erdemerdag - PeerSpot reviewer
Cybersecurity Operations Engineer at a tech services company with 201-500 employees

It's very useful software because the customer mostly configures their IPS and manages their firewalls, WAF, and the DBS according to the latest update, latest news, or according to the situation. Sometimes they miss a configuration, but they aren't aware of it. Picus gives the wheel to the customer because they are using the real payloads, real attack, and real simulation, but not to the production servers or simulation servers. That's why it's not damaging the customer's reports. But they can see the current situation of their product.

It's a complete solution, so they have network vectors, endpoint vectors, and  email vectors. They provide almost a complete solution.

View full review »
Mauro Restante - PeerSpot reviewer
Cybersecurity Customer Service Manager and Technical Account Manager at Cybersel

One of the most valuable features would be the detection capability, specifically the ability to detect alarms and logs collected from SIEM tools.

View full review »
Buyer's Guide
Picus Security
April 2024
Learn what your peers think about Picus Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.
Taha Hussain - PeerSpot reviewer
Solutions Architect Cybersecurity

The list of vulnerabilities that get detected is the most valuable feature. The list of injections, basically that we identify within the infrastructure is the most valuable one, as they can see which attack has actually been successfully executed in their environment. You can navigate through different options on the product and you can do exercises. One of the beneficial features is that if you do not want to perform a specific set of attacks, you can uncheck them. Alternatively, if there are certain attacks that you want to execute, you can do that as well. You have the liberty of physically executing a specific set of rules in your environment.  For example, let's say the customers don't have Apache servers. If there are any vulnerabilities or injections that are performed on Apache servers, a lot of tools rely on those rules. Customers can basically uncheck those injections that are performed on servers that do not exist in their environment.

View full review »
Buyer's Guide
Picus Security
April 2024
Learn what your peers think about Picus Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.