Picus Security Named a Customers’ Choice by Gartner Peer Insights™ 2024 VoC

Update: Picus Security is now also recognized in the 2025 Gartner® “Voice of the Customer” for Adversarial Exposure Validation (AEV), a category that extends breach and attack simulation with automated penetration testing and red teaming. Download the report to discover why users rated us 4.8 out of 5.

At Picus, our success is defined by the trust and results we deliver for our customers every day.

Recognized in the Gartner Peer Insights™ “Voice of the Customer” report, Picus Security achieved the highest willingness to recommend among all Breach and Attack Simulation (BAS) vendors. 

The report utilizes a methodology to plot vendors based on User Interest and Adoption and Overall Experience, placing the vendors in BAS market into four quadrants: Customers’ Choice, Strong Performers, Established, and Aspiring. Picus Security is positioned as the “Customers’ Choice”, which we believe reflects exceptional performance in both dimensions.

With an overall rating of 4.8 out of 5, Picus Security achieved the highest willingness to recommend score among all vendors included in the report. As of 2023, Picus Security had received 100 reviews. This rating represents the aggregated satisfaction of customers across multiple aspects, including platform functionality, deployment, and support.

Our product capabilities received a 4.9 rating—the highest in the document. We believe that our customers rated the platform highly for its ability to simulate real-world threats, identify vulnerabilities, and deliver actionable recommendations to address critical risks effectively. 

With a 4.8 rating for support experience, we believe that our exceptional service quality is reflected at every stage of the customer journey.

We are grateful to our customers for sharing their experiences and insights. Their feedback validates the value of our platform and inspires us to continue delivering excellence.

See Picus Security Validation Platform

Simulate tactics and techniques across the cyber kill chain and address gaps swiftly and effectively with a cutting-edge BAS solution.

 

From BAS to AEV: Expanding the Scope of Validation

While Breach and Attack Simulation remains at the heart of our platform, the industry and our technology have evolved.

Building on success in BAS, Picus Security is now also listed in the 2025 Gartner Peer Insights™ Customers’ Choice for Adversarial Exposure Validation. Gartner defines Adversarial Exposure Validation (AEV) as the evolution of Breach and Attack Simulation, Automated Penetration Testing, and Red Teaming into one unified market category.

Through the Picus Security Validation Platform, security teams can:
Continuously test controls across prevention and detection layers.
Prioritize exposures by factoring validated control performance and exploitability.
Receive actionable, vendor-specific mitigation guidance to close real gaps faster.

This integrated approach ensures that our customers can confidently validate their security posture across the full spectrum of adversarial behaviors from initial access to complete comprimise.

gartner (3)

What Our Customers Say


“Picus: Meeting Unconventional Demand with Customizable Attacks and Baselines

Working with Picus has been exceptional both from a technology perspective and a people perspective. We approached the product with unconventional asks of the tool and it did not fail to meet our needs. Picus enables
our team to customize attacks and run them in our environment on a routine basis while also quickly assessing our
controls to improve our posture with a series of quick wins. The user interface is intuitive and clean, which makes
working with the product that much better."

– VP Information Security, Banking, Read the full review.

“Strong Product to Get a Continuous Security Assessment
Picus is one of the best BAS solutions on the market today. The threat database it is constantly updated, in order to simulate the lastest attack campaign and threat, to better understand if the company has an adequate protection against them. It is possible to customise the campaign or schedule the assessment periodically, to test protection measure implemented on network, endpoint and email . A great value for having a better knowledge of the enterprise cybersecurity posture."

– ICT Security Engineer, Transportation,
Read the full review.

“Cyber Attack Threat Simulation: Constantly Updating, Always Scanning
The product is a cyber attack threat simulation and a very successful and effective product in many areas. The product, which has many features such as constantly updating the threat library, performing timely and continuous scans, effective solution suggestions in the mitigation sections, setting up simulations according to the infrastructure, is quite successful in terms of preliminary preparation/ practice before a real scenario occurs and detecting and eliminating open points."

– Information Security Executive, Insurance,
Read the full review.

 

Evaluating Breach and Attack Simulation

Picus-10-criteria-BAS-mockupBreach and Attack Simulation (BAS) measures and improves cyber resilience by continuously and automatically testing the efficacy of your defenses. As the most effective solution for security control assessment, BAS has become an essential tool in organizations' cyber security toolset.With numerous BAS solutions offering different features, the key question is: Which BAS solution best fits your needs?

Learn the ten most important factors to consider when selecting a Breach and Attack Simulation tool. 

 

Picus Features to Reduce Risk with Evidence

Threat simulations across the full attack kill chain to validate prevention and detection controls against real adversarial tactics.

Attack path validation to identify chained exposures, lateral movement routes, and access to critical assets.

Exploitability-based prioritization that correlates vulnerabilities with control effectiveness to measure real risk.

Continuously updated threat library covering known and emerging malware, ransomware, and APT campaigns mapped to MITRE ATT&CK.

Automated validation cycles that run seamlessly across environments, with flexibility for quick tests or full-scale assessments.

  Actionable mitigation recommendations tailored to both vendor-specific and vendor-neutral technologies for faster, focused remediation.

  Unified visibility and evidence through real-time reporting that proves risk reduction and control effectiveness.

 

Reviews have been edited to account for errors and readability.

Gartner, Gartner Peer Insights Voice of the Customer for Breach and Attack Simulation Tools, Peer Contributors, 30 January 2024.

GARTNER is a registered trademark and service mark of Gartner and Peer Insights is a registered trademark , of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Download Your Report

banner-image