No more typing reviews! Try our Samantha, our new voice AI agent.

CyCognito vs Picus Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyCognito
Ranking in Breach and Attack Simulation (BAS)
13th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Attack Surface Management (ASM) (15th)
Picus Security
Ranking in Breach and Attack Simulation (BAS)
4th
Average Rating
9.0
Reviews Sentiment
7.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2026, in the Breach and Attack Simulation (BAS) category, the mindshare of CyCognito is 1.4%, up from 0.8% compared to the previous year. The mindshare of Picus Security is 12.8%, down from 18.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Breach and Attack Simulation (BAS) Mindshare Distribution
ProductMindshare (%)
Picus Security12.8%
CyCognito1.4%
Other85.8%
Breach and Attack Simulation (BAS)
 

Featured Reviews

Use CyCognito?
Leave a review
erdemerdag - PeerSpot reviewer
Cybersecurity Operations Engineer at a tech services company with 201-500 employees
Breach and attack simulation software that provides network, endpoint, and email vectors
According to the attack vectors, you cannot specify which product is failing or which product is working well because there's no agent. The best case scenario is to add an agent solution where an agent would have the ability to actually detect which programs aren't working. For the attack software, you put a peer on the cloud site, and you have another peer internal network. There is IPS, firewall, WAF, and DBS amongst these peers. The cloud's peer is trying to send the attack file to the internal network. Maybe the firewall is blocking it, maybe the IP, maybe the WAF, but you cannot see the details. You can say, "Yes, my security product is blocking that attack scenario," or, "I cannot block this attack."
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
885,728 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Manufacturing Company
9%
Computer Software Company
9%
Performing Arts
8%
Financial Services Firm
16%
Manufacturing Company
8%
Government
7%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Picus Security?
The most valuable feature of Picus Security is its threat intelligence, providing suggestions to block and prevent attacks by identifying malicious files and providing threat IDs.
What is your experience regarding pricing and costs for Picus Security?
The pricing of Picus Security is average, and it offers a good value for money.
What needs improvement with Picus Security?
There is room for improvement in the response rate provided by customer support. Picus Security could improve the response time.
 

Comparisons

 

Overview

 

Sample Customers

UTA, BERTELSMANN, WIPRO
Akbank, Exclusive Networks, Garanti, ING Bank, QNB Finansbank, Turkcell, Vodafone, Yapı Kredi
Find out what your peers are saying about Horizon3.ai, Cymulate, Pentera and others in Breach and Attack Simulation (BAS). Updated: March 2026.
885,728 professionals have used our research since 2012.