Picus Security is a breach and attack simulation software. It has a dictionary attack. According to your peers and attack vectors, it's trying to attack with the files. It also has some lateral movement attacks. They need to install or configure the peers or attack vectors so we can support it. The solution updates almost daily because the dictionary updates. The latest version is 4273. We have some customers using the on cloud platform. We also have some military customers who are using the on-prem solution. The system managers or administrators are managing this product, so I don't have a specific number of clients that are using the solution.
We enagage with customers in the Middle East to check the visibility of the use cases that we create, using the Picus solution. We want to check the strength of their infrastructure, their application servers. This is the type of integration exercise we do for our customers. We check if there are any loopholes or weak links that can be hardened using a visibility tool, of course like Picus Security. Customers in the Middle East are concerned about cloud solutions, the data or software component has to reside within their premise or at least inside the boundaries of this country. The majority of them prefer the on-premise solution, and sometimes we use cloud-based solutions as well. When using the cloud they have a SaaS service available and it's hosted on Amazon cloud.
Independent from any vendor or technology, the unparalleled Picus Platform is designed to continuously measure the effectiveness of security defenses by using emerging threat samples in production environments. Created by a team that’s been working together more than 10 years already and has proven their expertise in enterprise cybersecurity, Picus is trusted by many large multinational corporations and government agencies.
I have used Picus Security to see what it can do. I use Picus Security for continuous security validation and control effectiveness.
In general terms, our clients use Picus Security to verify the security controls in their environments.
Picus Security is a breach and attack simulation software. It has a dictionary attack. According to your peers and attack vectors, it's trying to attack with the files. It also has some lateral movement attacks. They need to install or configure the peers or attack vectors so we can support it. The solution updates almost daily because the dictionary updates. The latest version is 4273. We have some customers using the on cloud platform. We also have some military customers who are using the on-prem solution. The system managers or administrators are managing this product, so I don't have a specific number of clients that are using the solution.
We enagage with customers in the Middle East to check the visibility of the use cases that we create, using the Picus solution. We want to check the strength of their infrastructure, their application servers. This is the type of integration exercise we do for our customers. We check if there are any loopholes or weak links that can be hardened using a visibility tool, of course like Picus Security. Customers in the Middle East are concerned about cloud solutions, the data or software component has to reside within their premise or at least inside the boundaries of this country. The majority of them prefer the on-premise solution, and sometimes we use cloud-based solutions as well. When using the cloud they have a SaaS service available and it's hosted on Amazon cloud.