Validato Description

Validato is a continuous security verification platform that uses safe in production Breach and Attack Simulations. This simulates offensive cyber attacks to validate security control configurations.

Pricing

Pricing Starts At:
$10,000/year
Pricing Information:
Based on size of deployment
Free Version:
Yes
Free Trial:
Yes

Integrations

API:
Yes, Validato has an API

Reviews - 1 Verified Review

Total
ease
features
design
support

Company Details

Company:
Validato
Year Founded:
2021
Headquarters:
United States, UK, Czech Republic
Website:
www.validato.io
Update This Listing

Media

Recommended Products
New Relic provides the most powerful cloud-based observability platform built to help companies create more perfect software. Icon
New Relic provides the most powerful cloud-based observability platform built to help companies create more perfect software.

Get a live and in-depth view of your network, infrastructure, applications, end-user experience, machine learning models and more.

Correlate issues across your stack. Debug and collaborate from your IDE. AI assistance at every step. All in one connected experience - not a maze of charts.
Start for Free

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Live Training (Online)
Webinars
Customer Support
Business Hours
Online Support

Validato Features and Options

Validato Lists

Validato User Reviews

Write a Review
  • Name: Anonymous (Verified)
    Job Title: Manager
    Length of product use: 1-2 Years
    Used How Often?: Monthly
    Role: User, Administrator
    Organization Size: 1 - 25
    Features
    Design
    Ease
    Pricing
    Support
    Likelihood to Recommend to Others
    1 2 3 4 5 6 7 8 9 10

    Best for testing threats against MITRE ATT&CK TTPs

    Date: Aug 27 2025

    Summary: Very easy to use. If you are looking for a threat-informed testing platform to use as a security diagnostics tool for cyber resilience, Validato is an excellent solution.

    Positive: Great price. Validato focuses on testing how Windows, Linux and Mac functions are manipulated and exploited by threat actors, rather than emulating IOCs and vulnerability exploitations.

    Negative: Cannot add custom offensive scripts (at time of writing)

    Read More...
  • Previous
  • You're on page 1
  • Next