Picus Security
Products & Solutions

Products

  • Threat Library
    The global threat landscape at your fingertips
  • Mitigation Library
    Industry-wide knowledgebase of threat mitigation products
  • Threat Emulation
    Noise-free architecture with advanced reporting
  • Detection Analytics
    Automated and threat-centric analytics for SOCs

Solutions

  • Detection Analytics & Mitigation
    Uplift your SOC capabilities
  • Security Control Validation & Mitigation
    Elevate your prevention capabilities

Use Cases

  • Offensive Security
  • Security Operations Center
  • IT Operations & SecOps
  • Security Leadership

The Red Report

Your Handbook to Utilize the MITRE ATT&CK Framework

red-report-doc

Company
Partners

Partner Program

  • About the Partner Program
  • Become a Picus Partner
  • Partner Portal

Technology Alliances

  • Network Intrusion & Web Application Firewall
  • Endpoint Detection & Response
  • Security Information & Event Management

The Red Report

Your Handbook to Utilize the MITRE ATT&CK Framework

red-report-doc

Resources

Six Stages of Dealing with a Global Security Incident

Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach

  • View all Resources
  • Blog
  • Webinars
  • Reports & Guides

The Red Report

Your Handbook to Utilize the MITRE ATT&CK Framework

red-report-doc

Request a Demo

Resources

Featured

The Red Report

    Filter:

    Six Stages of Dealing with a Global Security Incident

    Article

    Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach

    Article

    Turkcell Case Study

    Reports

    It is Time to Take Action - How to Defend Against FireEye’s Red Team Tools

    Article

    Tactics, Techniques and Procedures (TTPs) Utilized by FireEye’s Red Team Tools

    Article

    How to Beat Nefilim Ransomware Attacks

    Article

    The Red Report

    Reports

    How to Build a Red Teaming Attack Scenario | Part 2 - Weaponization and Connecting Actions

    Article

    How to Build a Red Teaming Attack Scenario | Part 1 - Bypass Security Controls

    Article

    Turkish Airlines Case Study

    Reports

    MITRE ATT&CK T1562 Impair Defenses

    Article

    MITRE ATT&CK T1082 System Information Discovery

    Article

    Prev 1 2 3 4 5 Next
    Picus Security

    San Francisco

    1355 Market St. #488,
    San Francisco, CA 94103 USA 

    +1 (415) 8905105

    London

    Farnborough, Orpington,
    BR6 7BX, UK

    +44 (1689) 857598

    Ankara

    Hacettepe Teknokent, AR-GE 1,
    No: 12 06800 - Çankaya Ankara, TR

    +90 (312) 2353579

    Email

    info@picussecurity.com

    Products

    • Threat Library
    • Mitigation Library
    • Threat Emulation
    • Detection Analytics

    Solutions

    • Security Control Validation & Mitigation
    • Detection Analytics & Mitigation

    Use Cases

    • Offensive Security
    • Security Operations Center
    • IT & Security Operations
    • Security Leadership

    Resources

    • Reports & Guides
    • Webinars
    • Newsletter
    •  

    Partners

    • Technical Alliances
    • Partner Program

    Company

    • About
    • Leadership
    • Careers
    • Contact
    Follow us on LinkedIn Follow us on Twitter Follow us on Facebook
    © 2021 Copyright. All rights reserved.
    Privacy