Products & Solutions
Products
Threat Library
The global threat landscape at your fingertips
Mitigation Library
Industry-wide knowledgebase of threat mitigation products
Threat Emulation
Noise-free architecture with advanced reporting
Detection Analytics
Automated and threat-centric analytics for SOCs
Solutions
Detection Analytics & Mitigation
Uplift your SOC capabilities
Security Control Validation & Mitigation
Elevate your prevention capabilities
Use Cases
Offensive Security
Security Operations Center
IT Operations & SecOps
Security Leadership
The Red Report
Your Handbook to Utilize the MITRE ATT&CK Framework
Company
Partners
Partner Program
About the Partner Program
Become a Picus Partner
Partner Portal
Technology Alliances
Network Intrusion & Web Application Firewall
Endpoint Detection & Response
Security Information & Event Management
The Red Report
Your Handbook to Utilize the MITRE ATT&CK Framework
Resources
Use Central Log Management for Security Operations Use Cases
Picus Security has been recognized as a leading vendor in Breach & Attack Simulation (BAS) Market 2020
View all Resources
Blog
Webinars
Reports & Guides
MITRE ATT&CK
Purple Academy
The Red Report
Your Handbook to Utilize the MITRE ATT&CK Framework
Purple Academy
Request a Demo
Picus
Use Central Log Management for Security Operations Use Cases
Reports
Frost Radar™: Global Breach and Attack Simulation Market, 2020 Research Report
Reports
Turkcell Case Study
Reports
Turkish Airlines Case Study
Reports
iGA Case Study
Reports
ATT&CK in Action #10: T1562 Impair Defenses with Palo Alto Networks
Webinar
ATT&CK in Action #9: T1082 System Information Discovery
Webinar
ATT&CK in Action #8: T1060 Registry Run Keys / Startup Folder
Webinar
ATT&CK in Action #6: T1064 Scripting
Webinar
ATT&CK in Action #7: T1053 Scheduled Task
Webinar
ATT&CK in Action #5: T1059 Command-line Interface
Webinar
ATT&CK in Action #4: Masquerading with Picus & Darktrace
Webinar
Prev
1
2
Next
Subscribe
Receive regular updates
from Picus