Validato Description

Validato is a continuous security verification platform that uses safe in production Breach and Attack Simulations. This simulates offensive cyber attacks to validate security control configurations.

Pricing

Pricing Starts At:
$10,000/year
Pricing Information:
Based on size of deployment
Free Version:
Yes
Free Trial:
Yes

Integrations

API:
Yes, Validato has an API

Reviews - 1 Verified Review

Total
ease
features
design
support

Company Details

Company:
Validato
Year Founded:
2021
Headquarters:
United States, UK, Czech Republic
Website:
www.validato.io
Update This Listing

Media

Recommended Products
Simple, Secure Domain Registration Icon
Simple, Secure Domain Registration

Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Sign up for free

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Live Training (Online)
Webinars
Customer Support
Business Hours
Online Support

Validato Features and Options

Validato Lists

Validato User Reviews

Write a Review
  • Name: Anonymous (Verified)
    Job Title: Manager
    Length of product use: 1-2 Years
    Used How Often?: Monthly
    Role: User, Administrator
    Organization Size: 1 - 25
    Features
    Design
    Ease
    Pricing
    Support
    Likelihood to Recommend to Others
    1 2 3 4 5 6 7 8 9 10

    Best for testing threats against MITRE ATT&CK TTPs

    Date: Aug 27 2025

    Summary: Very easy to use. If you are looking for a threat-informed testing platform to use as a security diagnostics tool for cyber resilience, Validato is an excellent solution.

    Positive: Great price. Validato focuses on testing how Windows, Linux and Mac functions are manipulated and exploited by threat actors, rather than emulating IOCs and vulnerability exploitations.

    Negative: Cannot add custom offensive scripts (at time of writing)

    Read More...
  • Previous
  • You're on page 1
  • Next