Skip links

Picus Security Validation

Security Validation platform based on the simulation of breaches and attacks

The Picus Security Validation platform allows you to continuously verify the proper functioning and effectiveness of your organization's cybersecurity measures and means, with the help of simulating real cyber threats. Simulate tactics and techniques across the entire cyber kill chain and quickly and efficiently close loopholes without the need for offensive security expertise. The Picus platform allows security teams to analyze risks more accurately and prioritize mitigation efforts based on impact.

Solution overview

The Picus Security Validation platform, based on Breach & Attack Simulation technology, is designed to help you overcome the challenges of manual security analysis by constantly, automated testing and validation of your security. in relation to the latest real-world threats. The Picus SCV works through the five major components, as follows:

  • Attack Surface Validation (ASV): Increase visibility across the entire attack surface and detect hidden risks. Picus ASV allows you to move from asset inventory to view and prioritize assets and vulnerabilities based on risk for effective threat exposure management across all environments.
  • Cloud Security Validation (CSV): Picus CSV enables cloud security posture management by identifying cloud misconfigurations and overly permissive IAM policies – the two leading causes of cloud data loss.
  • Security Control Validation (SCV): By simulating real cyber threats based on a predefined program, Picus SCV continuously and automatically validates the effectiveness of network, end-device, and email controls in your organization, providing clear mitigation recommendations.
  • Attack Path Validation (APV): Stop attackers during attacks by removing paths to critical users and assets. Picus APV identifies and enables automatic visualization of steps an attacker could take to compromise servers, endpoints, and users. Based on the Picus Intelligent Adversary Decision Engine, it simulates the opponent’s actions to find high-risk remedies and provides solutions to fix them.
  • Detection Rule Validation (DRV): Proactively identify performance and hygiene issues with SIEM rules and gain insights to accelerate threat detection and response. Picus DRV allows security teams to monitor the proper functioning of detection capabilities, automating manual verification processes, to achieve continuous and proactive validation of detection rules and means.

Main functionalities

Picus Security Validation works based on the following mechanisms:

Numi AI Virtual Security Assistant

With the help of the Picus platform's virtual security analyst, you get the information you need to quickly assess your organization's threat readiness and make risk-based decisions.

MITRE ATT&CK Mapping

Visualize the status of your security controls in relation to MITRE ATT&CK. Visualize the coverage provided by SIEM and EDR rules and optimize based on the results of attack simulations.

Breach and Attack Simulation (BAS)

It automatically simulates cyberattacks to validate that controls, such as firewalls, SIEMs, and EDR tools, are functioning and performing optimally.

Pen Testing Automation

It allows for faster identification and resolution of risks, reduction of manual testing requirements, extension of visibility on the attack surface.​

Continuous Threat Exposure Management (CTEM)

It allows for a holistic approach to cybersecurity, helps security teams focus on the exposures that will have the most effective impact on risk reduction.

Rapid deployment

The Picus Security Validation platform is available on an annual subscription basis, as a software as a service (SaaS) in the cloud, and is composed of the five products, which can also be licensed individually:

  • Attack Surface Validation (ASV)
  • Cloud Security Validation (CSV)
  • Security Control Validation (SCV)
  • Attack Path Validation (APV)
  • Detection Rule Validation (DRV)

The platform is SOC 2 Type 2 certified.

Main benefits of Picus Security Validation platform

Picus Security Validation brings the following benefits:

• Security validation, both inside out and outside in

Simulate attacks on-premises and in the cloud, save time by automating validation action flows, gain insights for Red Teams and Blue Teams.

Optimizing security controls

Picus Security Control Validation (SCV), not only identifies prevention and detection gaps, but also helps to address them, providing recommendations to optimize controls quickly and efficiently.

Rapid identification of critical attack paths

To verify that the attack methods represent a real risk and not a theoretical one, Picus Attack Path Validation (APV) validates them by simulating more than 30 actions, such as credential harvesting, password cracking and lateral movement.

Continuous validation of detection rules

Picus Detection Rule Validation (DRV) provides holistic visibility of threat detection and response capabilities, provides suggestions on Fixing Items, Improvement Points and Positive Points, reveals the effect of a newly developed rule on SIEM, maps results with the MITRE ATT&CK Framework.

Accelerating Detection Engineering

Integrations with leading security vendors (Splunk, IBM Security QRadar, Microsoft Sentinel) help improve the detection engineering process by building, testing, and updating detections for both new and existing rules.

Discovering the attack surface

Picus Attack Surface Validation (ASV) allows you to get a complete picture of your assets, discover security and policy gaps, prioritize vulnerabilities, accelerate the analysis of security alerts, maintain compliance, automate asset discovery.

Auditing essential AWS (Amazon Web Services) services

By scanning fourteen critical AWS services, Picus Cloud Security Validation (CSV) identifies critical misconfigurations such as excessive privileges, exposed S3 buckets, unused resources, cryptographic errors, and more.

Services provided by Safetech Innovations

Safetech Innovations offers complete services for the efficient installation and use of Picus services, both independently and within a complex security architecture, along with complementary solutions.
Our services include:

Requirements analysis and system design

Requirements analysis and system design

Analysis of project objectives, requirements and constraints, identification of risks, design of integrated architecture, development of a detailed project plan for the integration of various components and subsystems

Implementation

Implementation

Delivering and installing products, configuring, testing, implementing and optimizing the integrated system, verifying that all components work together as planned, training system administrators on how to use the solution

Technical support and service

Technical support and service

Providing technical support and service to ensure the continuous operation of the system optimally, meeting the needs of the organization

Safetech Innovations is one of the most experienced cyber security companies in Romania. We have 12 years of activity and over 600 completed projects in this field for clients from multiple economic sectors.

Currently, Safetech Innovations employs over 60 employees, of which 40 are members of the technical team.

Gestionam complet securitatea cibernetică a clienților, de la analiza amenințărilor/vulnerabilităților existente sau potențiale și evaluarea riscurilor și a impactului de business, la implementarea soluțiilor necesare în vederea realizării unui nivel optim de securitate. In the long term, we ensure continuous monitoring of events and response to cyber security incidents.
Choosing Safetech's system integrator services ensures you reduce the risks of implementation, customization, scalability and flexibility, post-implementation support.