- Revenue
- $27M
- Customers
- 100
- Year founded
- 2015
- Funding
- $2.2M
- Team size
- 210
- Growth
- 115.19%
Top 25 Breach and Attack Simulation (BAS) Software SaaS Companies in May 2026
As of May 2026, there are 25 SaaS companies in Breach and Attack Simulation (BAS) Software. They have combined revenues of $294M and employ 1.9K people. They have raised $458.4M and serve 12.2K customers combined.
Breach and Attack Simulation (BAS) software is a cybersecurity tool designed to proactively assess and enhance an organization's security posture by simulating real-world cyberattacks. It automates the process of testing security measures, enabling organizations to identify vulnerabilities and validate the effectiveness of their defenses. Key use cases include continuous monitoring of security readiness, validating security controls, and complementing traditional penetration testing efforts. Typically, BAS solutions provide features such as automated attack simulations, detailed reporting on vulnerabilities, and guidance on remediation strategies. They cater to a variety of organizations focusing on cybersecurity, including IT departments, security operations teams, and compliance professionals. By facilitating routine testing, BAS software helps organizations prepare for potential breaches, thereby strengthening their overall cybersecurity framework.
Filters
Sorting: Highest -> Lowest
Top Breach and Attack Simulation (BAS) Software Companies
Showing 10 of 8 companies ranked by annual revenue.

Sunnyvale, California, United States
Provider of a cyber-security platform intended to stimulate hacks on companies' systems to help them identify holes. The company's platform constantly runs breach simulations such as brute force and exploits malware on a client's network to theoretically and proactively locate and remediate security issues, enabling users to analyze the impact of attacks on a company's systems and the efficacy of its defenses.
- Revenue
- $21M
- Customers
- -
- Year founded
- 2014
- Funding
- $53M
- Team size
- 135
- Growth
- 116.49%

Asnieres-sur-seine, France
Filigran provides open-source cybersecurity solutions covering threat intelligence management, breach and attack simulation, and cyber risk management.
- Revenue
- $19.7M
- Customers
- -
- Year founded
- -
- Funding
- -
- Team size
- 147
- Growth
- -

New York, New York, United States
Built by industry leaders, BreachLock enables you to find and fix your next Cyber Breach before it happens.
- Revenue
- $17.3M
- Customers
- -
- Year founded
- 2018
- Funding
- $3.1M
- Team size
- 122
- Growth
- 83.17%

London, England, United Kingdom
Provider of a cloud-based security monitoring platform intended to secure internet-facing infrastructure. The company's security monitoring platform focuses on vulnerabilities and prioritizing the most critical threats by breaching the systems, enabling clients to identify loopholes in network security and improve its vulnerability before hackers expose them.
- Revenue
- $16.1M
- Customers
- 3K
- Year founded
- 2015
- Funding
- $1.2M
- Team size
- 67
- Growth
- 61.33%
- Revenue
- $15M
- Customers
- 100
- Year founded
- 2019
- Funding
- -
- Team size
- 68
- Growth
- 72.46%

Herndon, Virginia, United States
LetsDefend is a hands-on Blue Team training platform that enables people to gain practical experience by investigating real cyber attacks inside a simulated SOC.
- Revenue
- $11.2M
- Customers
- -
- Year founded
- 2020
- Funding
- -
- Team size
- 102
- Growth
- -

Atlanta, Georgia, United States
Developer of an automated platform intended to address the challenges of email phishing. The company's platform uses a combination of machine learning and human intelligence to offer phishing simulation training, detection, incidence responses and automated intelligence sharing, enabling organizations to protect themselves from the threat of phishing and make emails secure.
- Revenue
- $10.9M
- Customers
- 5K
- Year founded
- 2013
- Funding
- $95M
- Team size
- 144
- Growth
- 26.5%
Inclusion Criteria
- The product must automate the simulation of real-world cyberattacks. - It should provide detailed reports on vulnerabilities and security posture. - The software must facilitate ongoing monitoring and assessment of security controls. - It needs to support various attack scenarios to test different components of the security infrastructure. - Not just focused on compliance; must also improve proactive threat detection and response capabilities.

