Share your experience using CyCognito

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Cybersecurity Engineer at a tech services company with 5,001-10,000 employees
Real User
Offers a solution-oriented approach and straightforward deployment
Pros and Cons
  • "What I like the most about Pentera is its solution-oriented approach."
  • "There is room for improvement in virtualization compatibility."

What is our primary use case?

I have used Pentera as an automation tool both for customers and within my organization.

What is most valuable?

What I like the most about Pentera is its solution-oriented approach.

What needs improvement?

There is room for improvement in virtualization compatibility. Testing with virtual servers didn't yield the same results as on-premises services, and the vendor's support was limited in addressing this issue.

For how long have I used the solution?

I have been using Pentera for six months.

What do I think about the stability of the solution?

Pentera's stability is decent, although there are occasional issues. I would rate the stability as a seven out of ten.

How are customer service and support?

The technical support is very good. I would rate them as an eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

Deployment of Pentera is straightforward, requiring basic networking knowledge, making it accessible for anyone to deploy.

What's my experience with pricing, setup cost, and licensing?

Pentera is expensive.

What other advice do I have?

We use Pentera for routine security assessments by demonstrating vulnerabilities to customers. For example, we show them how fixing one vulnerability, like SMB, can address related vulnerabilities. Customers appreciate the visual map view of their security landscape provided by Pentera.

Pentera helped uncover a critical vulnerability for a company during the pandemic. They had in-house servers with an SMB v2 vulnerability and were using legacy software or operating systems. We demonstrated the risk by conducting ransomware testing on these unsupported servers, highlighting the urgent need for mitigation.

Automated penetration testing with Pentera has boosted our team's efficiency. Manual testing required extensive reporting and specific exploitation of vulnerabilities, which was time-consuming. Pentera streamlines the process, reducing the time and costs associated with generating reports and pinpointing vulnerabilities quickly.

Pentera's vulnerability detection capabilities have about 90% accuracy, based on personal experience. While it accurately identifies most vulnerabilities, there are instances where reported vulnerabilities are not exploitable upon further testing.

New users should consider demonstrating Pentera's capabilities to their company. Automation helps uncover hidden vulnerabilities, improving security and highlighting areas for enhancement.

Overall, I would rate Pentera as an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
Cyber Security at Taxes Authority
Real User
Top 20
Enables to perform scheduled scans to find vulnerabilities and is easy to use
Pros and Cons
  • "The product is easy to use."
  • "The price could be improved."

What is our primary use case?

The solution is used for test simulation. It simulates tests on all our servers to know the vulnerabilities in them.

How has it helped my organization?

We perform scheduled scanning. We create reports for the system administrators.

What is most valuable?

We schedule scans to find all the vulnerabilities. The product is easy to use. It is useful for cybersecurity. It keeps the organization secure.

What needs improvement?

The price could be improved.

For how long have I used the solution?

I have been using the solution for three years.

What do I think about the stability of the solution?

I rate the tool’s stability a nine out of ten.

What do I think about the scalability of the solution?

I rate the tool’s scalability a nine out of ten. We have 700 users. We have four people on the technical team to maintain the product.

How was the initial setup?

It’s easy to deploy the tool. We deploy the tool on our server.

What was our ROI?

The solution provides security.

What other advice do I have?

I don't operate the system. I will recommend the solution to others for automated security validation. It is scalable and easy to set up and use. Overall, I rate the tool a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate