BE

Burcu Erol

CEO Office, Process Management Lead

Picus Security

San Francisco, California


Contact Information

Email
Unlock
LinkedIn

Company Information

Company
Picus Security
Industry
computer & network security
Employees
270.0
Seniority
C suite
Annual Revenue
85000000.0
Total Funding
76950000.0
Latest Funding
Series C

Technologies

Amazon SES Rackspace MailGun Gmail Google Apps Zendesk VueJS Netlify Learnworlds Hubspot WordPress.org HeapAnalytics New Relic Google Dynamic Remarketing Linkedin Marketing Solutions Google Analytics Wistia reCAPTCHA Cedexis Radar Bing Ads Vimeo Amcharts JS Library DoubleClick Conversion Hotjar Mobile Friendly MouseFlow Adobe Media Optimizer Linkedin Widget Google Tag Manager Linkedin Login Nginx Bootstrap Framework Gravity Forms Facebook Widget DoubleClick Google AdSense Google Font API Facebook Login (Connect) Remote Basis Circle AI

Keywords

network security device testing automated security testing automated control assessment control effectiveness testing breach & attack simulation threat exposure management automated pen testing mitre att ck security validation exposure validation cyber security enterprise security security internet information technology automated security validation automated penetration testing adversarial exposure validation security control validation attack surface validation cloud security validation detection rule validation integration with siem cyber risk assessment vulnerability management continuous security validation cyber threat intelligence real-world attack simulations emerging threats management mitre att&ck framework compliance & risk management one-click mitigations security posture validation vulnerability assessment tools threat detection optimization incident response planning automated threat simulation risk prioritization security orchestration attack path discovery security control optimization security operations center (soc) tools real-time threat analytics evolving cyber threat landscape actionable threat intelligence end-to-end security validation data breach prevention malware simulation ransomware defense strategies zero-day threat management security audit & compliance continuous monitoring tools threat landscape analysis cybersecurity training & education threat modeling & simulation ai-powered security solutions data security strategies network security assessments third-party integration customizable security solutions security awareness programs cybersecurity risk assessment real-world threat simulations vulnerability identification security controls optimization proactive cybersecurity it security maturity enterprise security solutions financial services security healthcare data protection regulatory compliance threat intelligence customizable attack scenarios security posture improvement customer satisfaction intuitive interface comprehensive security assessment global reach medium to large enterprises cisos it security managers innovative solutions automated processes detailed reporting mitigation strategies security gaps digital infrastructure security computer & network security information technology & services

Get Full Contact Details

Subscribe to reveal email addresses and export contacts.

View Plans