TrustRadius: an HG Insights company

Picus Security

Score8.2 out of 10

2 Reviews and Ratings

What is Picus Security?

Picus Security, headquartered in San Francisco, offers Continuous Security Validation and Mitigation as the most proactive approach to ensure cyber-resilience. The Picus Platform measures the effectiveness of defenses by using emerging threat samples in production environments, providing the insight required to build the right security strategy to better manage complex operations.

Innovative Solution that exceeds our expectations

Use Cases and Deployment Scope

Picus is being used a security validation and breach attack simulation/detection system in our enterprise network. Picus

is the main scoring system in out enterprise networks. It’s being used not after the products implementation even we use picus before acquiring of any security software solution. Any software or hardware solution which does not pass the scoring automatically eliminated. Scoring is based on zones and products/services where the picus vectors are implemented. Integration with the sim/siem enhances the analytics and detection/prevention. Specific rules are

implemented through the siem and picus outputs. Picus is one of the key elements in cyber resilience. Regulations and compliance enforces KPI in cyber-security, Picus scores are direct input for these KPIs. Therefore our companies have passed the audits throughout the usage of picus without any problem. New threats and attacks are mapped within the Picus database and attack vectors, we can simulate this attacks securely without exposing any potential risk to our

environment.

Pros

  • It has thousands of signatures and up-to-date attack vectors (It's the largest set in the market)
  • Attack vectors are mapped with existing vendors like Checkpoint and Mcafee, where you don't spend time finding out which cve mapped to which protection
  • Ability to focus/highlght solely new threats, it's superb for 0days and up-to-date protections. As there are always timing issue between updates and apply the updates on the products.
  • Blocked vs not blocked ratios on the dashboard with drill down menu specifiying the set of protections or signatures on the defensive measures
  • Already mapped mitre att&ck framework on the dasboard. SOC and analyst team using the Mitre framework.
  • Detection analytics enhance the analytics capabilities with pinpoint accuracy where to focus and how to prevent
  • Timeline and scheduled reports from the dashboard in flexible format

Cons

  • Visualization of network and the products
  • Complex/Scenario based attacks
  • Phishing tests
  • DNS and Data exfiltration attacks
  • Automatic action through the apis for the products on the path
  • Strategical and tactical reports for Cisos
  • Automatic SOAR entegration with already builtin playbooks

Most Important Features

  • Security validation and scoring
  • Number of attacks and CVEs supported on the product
  • Attack simulation
  • Detection analytics with integration Siem products

Return on Investment

  • With Picus we have the tangible KPIs for the security
  • Detetcion and Prevention rates for the latest attacks are significantly increased
  • We work with many security vendors. We use picus scores and share specific outputs with the company in case of decreasing score rates where the development and product team analyzes their updates or product engines to increase the rates.
  • It helps our strategic plans where to focus and invest for the following years and planning/prioritizing the security budgets to specific highlighted areas

Alternatives Considered

Cymulate, AttackIQ Security Optimization Platform, Mandiant Security Validation and SafeBreach

Other Software Used

Cymulate, Mandiant Security Validation, AttackIQ Security Optimization Platform