Breach and Attack Simulation (BAS) Users Have Shared Their Experience With Us

Updated May 2025

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE Breach and Attack Simulation (BAS) report based on 45+ real user experiences with these popular products:

...and 7 more!

Where should we email your report?






Pentera review

Richard Marlow
Richard Marlow
Vulnerability Testing Manager at Frasers Group
Provides good features and helps monitor the status of ransomware protection in an...
The tool is quite scalable. There's a one-to-one relationship between the engine and how many scans we can do. We can only do one scan with one engine. We had some issues around the password assessments because we added a lot of users. It took a long time. I rate the scalability a seven out of ten. We have three users in our organization.
Picus Security review

erdemerdag
erdemerdag
Cybersecurity Operations Engineer at a tech services company with 201-500 employees
Breach and attack simulation software that provides network, endpoint, and email...
According to the attack vectors, you cannot specify which product is failing or which product is working well because there's no agent. The best case scenario is to add an agent solution where an agent would have the ability to actually detect which programs aren't working. For the attack software, you put a peer on the cloud site, and you...

Since 2012, we've had 850,760 professionals use our research.

As seen in