Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

6 AWS reviews

External reviews

40 reviews
from and

External reviews are not included in the AWS star rating for the product.


5-star reviews ( Show all reviews )

    Verified User

Simplifies Security with Ease, Highly Recommended!

  • April 06, 2026
  • Review provided by G2

What do you like best about the product?
I love the simplicity of NodeZero from Horizon3.ai. You don’t have to be a pen tester to run a test, and I really appreciate that the results come back on the same day, highlighting what to fix, how to fix it, and showing remediations. The tenant setup is very easy, and once it's done, you're ready to test. We look at best-in-breed technologies, and Horizon3 is certainly that!
What do you dislike about the product?
I think the only thing is to add web application testing but this is on the roadmap
What problems is the product solving and how is that benefiting you?
It helps customers find, fix, and verify exploitables within their infrastructure quickly and simply, even without being a pen tester.


    Financial Services

Unlimited Internal & External Scanning with Fantastic Reporting

  • March 27, 2026
  • Review provided by G2

What do you like best about the product?
You can scan internally, externally, and unlimited times, and fantastic reporting
What do you dislike about the product?
Would like to see more features from the platform
What problems is the product solving and how is that benefiting you?
Dealing with Pen testers, on boarding them


    Fabian Brandt

Automated pentesting has transformed our quality assurance and now prioritizes real attack paths

  • March 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

The easiest way to describe the use case would be quality assurance. It is very easy to miss a single configuration file or overlook something easy in the heat of the moment. Having that quality assurance to consistently find and verify the fixing of issues is an amazing game changer, especially when comparing it to traditional vulnerability management.

It used to be running into a wall and now it's actually about identifying your priorities and determining where there's a point in investing the time to start on it.

What is most valuable?

Speed, scalability, and the ability to see how an attack path is actually formed are the best features. The proof that what was claimed to have happened actually did happen is what I like the most about The NodeZero Platform by Horizon3.ai.

My impressions of the solution's feature that allows my security team to fix and retest vulnerabilities instantly is that it's awesome. I really love it. It is great. Instead of running a whole retest, which for some issues you will have to do, consider the classic scenario where it's Friday and almost time to leave for the weekend, but you found about 10 or so criticals that have all been worked through. The question becomes whether you trust yourself enough that all those fixes worked or whether you trust the provider enough that all those fixes worked. The NodeZero Platform by Horizon3.ai allows you to do a one-click verify, where you only test these specific issues. Being able to do that reduces the verification time to about 20 to 30 minutes rather than several hours. I love it because you don't have to tell your employees to miss their children's sports games.

I would say I trust The NodeZero Platform by Horizon3.ai with 99 percent certainty in identifying vulnerabilities in my on-premises systems. We found some essentially insane things. There are some basic issues you find every now and then, but also things that make you really surprised about how this worked and how that company hasn't been breached years ago already. It is awesome at finding just about everything.

The endpoint security effectiveness feature is really nice to get a direct mapping to tell me which endpoints do need to be looked at and where some of the topics that actually need to be addressed are. It does speed up the understanding for the EDR teams to actually see what are the issues that need to be addressed.

What needs improvement?

I would like to see an improvement in the notification management. Right now, the notifications, for example, when you schedule tests, the notification that the test has started and or finished, will only go to the person who has set up the test. I'm told that this is coming in the future, but I would like to on a per-test or per-schedule basis be able to set the notification recipient.

For how long have I used the solution?

I have been working with the solution since early 2023.

What do I think about the stability of the solution?

There's constantly improvement in the attack content itself, but on the technical basis, I'm super happy with The NodeZero Platform by Horizon3.ai.

What do I think about the scalability of the solution?

Scalability is great for me and all my clients.

How are customer service and support?

Regarding technical support, I think I'll give it a 10. There have been a couple of tickets in the recent months that I've needed to open, but those were always addressed super quickly, especially if you have something that needs an ad hoc solution. You can go via the chat and you will have a response in a couple minutes at most. Most issues have been resolved in under 20 minutes.

How was the initial setup?

It is really easy to work with The NodeZero Platform by Horizon3.ai. It's easy to set up and easy to understand. The onboarding or the POC is the education for the team. After that has been done, everyone at the customer will know how to use the tool. It is really easy to get started. There's such a low barrier to entry and a minimal investment with really high reward.

What was our ROI?

It is difficult to put a number to regarding the rewards and the ROI from The NodeZero Platform by Horizon3.ai. I would essentially say either immeasurable improvement or 99.9 percent. We've had customers who had quite literally insane issues in their networks. Being able to find them because there have been no eyes on that particular section so far ever, and fixing those potentially prevented those companies from getting breached. I will say absolutely 99.9 percent.

Regarding how much time The NodeZero Platform by Horizon3.ai has reduced me in testing, for comparison, this is a bit of a difficult question because it's not really directly comparable. For example, we've tested a global company and tested their entire network. That took us two days. If you were to do that with a manual pentest on the entire network, that would take months. The amount of manpower and costs associated with that is almost an immeasurable improvement again.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, that is a bit of a difficult question. I'm seeing this solely from the technical perspective. Going back to the previous point, if a solution can find the issue that would have allowed your company to get breached in seconds, what kind of price can you reasonably say you wouldn't pay? I would say it is very cost-efficient.

Which other solutions did I evaluate?

In the past, I've had a look at Pentera, for example.

What other advice do I have?

My thoughts on the integration or API aspects are positive. There's also always the option of the MCP server. But in general, regarding integration, for example, we have our ticketing system integrated. So if there's a finding, you can say in the console that you want to create a ticket for this. Then, when this finding gets closed in the ticketing system, there is an instant call to verify that fix. If the fix worked and the finding is closed successfully, it will stay closed. If it wasn't fixed, the ticket will be reopened. The service agent knows that they need to look at this again. It works great.

If someone was looking into this product, I would absolutely recommend it. I am not exaggerating when I say that this is my absolute favorite product. If I could, I would deploy this for everyone everywhere now. The basic solution would be to start with a proof of concept. Even then, the initial test is great. You will instantly get some results. I've never had a single test without findings. There were some with lower criticalities, but you will get some great results.

After that first test is done and you fix the first findings, then you will see the point that autonomous and recurring pentesting is great. For example, if you fixed something during day one, retest. Fix something during day two, run a full retest. Run tests in a different segment and run a different scenario. It is so much fun, especially when you compare it to old-school vulnerability scanners. Getting that 2,000 to 3,000-page PDF report or even classical pentests where at the point where you get the report for the pentest, it is already out of date because in the meantime, you changed a configuration or a patch was applied. The NodeZero Platform by Horizon3.ai gets you essentially as close as possible to consistent, real-time pentesting data. I would give this product a rating of 10 out of 10.


    Dr. Michael N.

Intuitive Yet Powerful—A Critical Part of Our Cybersecurity Toolbox

  • January 16, 2026
  • Review provided by G2

What do you like best about the product?
It is both intuitive and thorough with easy integration and implementation. During product review, NodeZero became an obvious choice because interaction was simple enough for our nontechnical personnel to follow yet the platform capabilities matched those of skilled professionals. The company has VERY responsive customer service and keeps up with the most recently discovered vulnerabilities and offers rapid release of testing against them. This has become a highly used and critical part of our cybersecurity toolbox.
What do you dislike about the product?
The only issue is something I just discovered and have not brought to their product team yet. Tripwires doesn't report the specific machines it failed on and succeeded on in an obvious manner.
What problems is the product solving and how is that benefiting you?
The NodeZero platform continuously uncovers our unknown unknowns. If an organization does not know they have a vulnerability, they cannot patch it. NodeZero solves this problem of the unknown unknowns.


    Mariya O.

Essential for Compliance and Flexibility

  • January 14, 2026
  • Review provided by G2

What do you like best about the product?
I really like the service and attention that NodeZero from Horizon3.ai offers. The platform's CMMC aligned guidance is great, providing us with the necessary support to comply under CMMC and covering those pentest controls. I appreciate the flexibility to run focused or ad hoc tests, which is invaluable for us. The expertise of the team is unmatched, and I couldn't have chosen a better company. You all are great, and Will is particularly excellent. The initial setup was very easy too.
What do you dislike about the product?
N/A
What problems is the product solving and how is that benefiting you?
NodeZero from Horizon3.ai identifies vulnerabilities, provides solutions, and ensures compliance. It aligns with CMMC, covering pentest controls expertly. Its flexibility for focused or ad hoc tests and exceptional service make it invaluable.


    Brian Burnett

Has improved internal and co-op security validation through detailed reporting and continuous vulnerability detection

  • October 31, 2025
  • Review provided by PeerSpot

What is our primary use case?

The NodeZero Platform is used internally every month, aligned with the patch cycle, to run the pen test and validate the patching that was done previously and find anything new in the environment. It is run at least monthly, and if something else comes up, it is run between those times. Additionally, The NodeZero Platform is used to perform pen testing for co-ops. Since some internet infrastructure is shared with co-ops, the platform can be deployed and a virtual machine can be spun up in their environment. They provide IP ranges, the pen test is deployed, the report comes back, and it is shared with them. This has been a great capability to provide to co-ops.

What is most valuable?

My favorite feature of The NodeZero Platform is that all of it has been really good. The reporting piece is very clear and very useful, which was a big piece from the start. The reporting is huge, and the fact that it learns the environment on an ongoing basis is impressive. An external third-party pen tester is brought in every two years, and the plan is to move it to every three years. After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify. It has stood up against that test every time.

The feature that allows security teams to fix and retest vulnerabilities instantly adds a lot of quick mitigation and the ability to fix issues on the fly. Everything that has been added and modified and improved since acquiring the tool has worked seamlessly.

The Real Attack Capabilities help in identifying vulnerabilities in on-premises systems because if patching was missed, it will identify that. With deployment across the system, any recent vulnerability will be found. The way it learns the environment makes it an easy-to-use tool. It does what it says it is going to do, which is finding vulnerabilities as they appear.

The Endpoint Security Effectiveness feature helps in understanding potential security threats better because everything that it identifies improves things on an ongoing basis. It ensures that everything is kept current, so it adds an extra layer to what is being done with the main EDR solution.

What needs improvement?

The speed of the scans takes some time, but in my opinion, it is not surprising for what it is doing. It could be a little quicker, but speed does not necessarily mean it is going to be better, since speed does not equate to doing what it needs to do.

For how long have I used the solution?

The NodeZero Platform has been used for about close to four years.

What do I think about the stability of the solution?

Regarding stability, it has never crashed, and there has not been any lagging from deployment or running. It is sometimes run randomly to see if managed service personnel will get alerted, and it has performed as expected. There has not been anything with lag or alerts, it has not crashed, and it has not caused issues.

What do I think about the scalability of the solution?

The scalability of The NodeZero Platform has been great because it is offered out to the 26 co-ops that are worked with, and over half of those have had it run on their environment, and it has worked out great.

How are customer service and support?

Technical support has never been contacted because there have never been any issues that required reaching out to them.

Which solution did I use previously and why did I switch?

There have not been any alternatives encountered that can be compared with The NodeZero Platform. After conversations with people and they have looked at it, nothing has stood out as being worth even trying to test. There is nothing that compares to it from everything that has been seen.

How was the initial setup?

The initial deployment of The NodeZero Platform was easy, from what is remembered, as that was about four years ago.

What about the implementation team?

The networking team was involved in this type of job, and it was probably just one of the networking team members and a senior engineer.

What was our ROI?

A reduction in remediation time has been seen because it is finding things before they happen. Much time is not being spent on remediation since acquiring it because it is finding things before they become an issue. Even if there is a zero-day and patching is done and then run, it verifies that, so it is preventing a lot of remediation time with anything.

What's my experience with pricing, setup cost, and licensing?

The pricing has been good, as it has not made huge leaps. Contracts and renewals are handled, so the changes have not been astronomical. It has stayed typically below what was expected for the changes as contracts are renewed, so it has all been fine.

What other advice do I have?

The overall rating given to The NodeZero Platform is ten out of ten.


    Timothy Rice

One-click re-testing has validated remediations and improved threat visibility

  • October 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.

What is most valuable?

I think the one-click feature to fix and re-test vulnerabilities is great. This feature allows us to validate whether the remediation actually resolved the issue. It's pretty easy. You click it and it starts scanning. This is super helpful. I don't think anybody else has anything like that.

The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems. It shows us whether it really was able to do or meet the objectives that a threat actor could do. It really helps identify the likelihood instead of simply indicating a potential vulnerability.

The NodeZero Platform impacts my understanding of potential security threats in an eye-opening way. It provides validation of the actual security flaw, and it also provides remediation steps. Usually, it's an article that's written up, but it also shows proof as well.

I haven't seen much of an impact on my remediation time from using The NodeZero Platform. I think what it does is it justifies a vulnerable aspect. For the most part, it does speed up remediation because we have proof that there is a vulnerability. We classify those vulnerabilities as a POF or a Pants on Fire and they have to be remediated within 72 hours. It does help remediate.

What needs improvement?

I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.

For how long have I used the solution?

I have used the solution for about two and a half years.

What do I think about the stability of the solution?

I haven't seen any stability issues such as crashing, lagging, or downtime. I have seen that their portal has been inaccessible for probably about 30 minutes one time.

What do I think about the scalability of the solution?

The NodeZero Platform is very scalable.

How are customer service and support?

I have never had to contact their technical support or customer support.

Which solution did I use previously and why did I switch?

We've used Pantera, Symptom and Attack IQ.

How was the initial setup?

The initial deployment was so easy. It only took us about five minutes.

What's my experience with pricing, setup cost, and licensing?

I think the pricing could be a little bit more competitive. For example, Centerra had a little bit more flexible pricing than NodeZero.

Which other solutions did I evaluate?

I would say Pentera is the closest competitor to The NodeZero Platform. When I compare them, I think the flexibility of scanning is where Horizon 3 edges Pentera. Pentera does a better job at cracking passwords, but deploying remote nodes is very difficult. It's kind of convoluted, so it makes it difficult to operate. The NodeZero Platform's pricing is competitive. I think it could be a little bit more competitive. For example, Pentera had a little bit more flexible pricing than The NodeZero Platform.

What other advice do I have?

Based on everything we've looked at and used in the past, I would rate The NodeZero Platform a 10 out of 10 as they are the best.


    Shaun Hunt

Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing

  • October 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

For us, The NodeZero Platform is literally the single best security solution we have because the way that it works is we're able to scan every part of our network, both internally and externally, and then get completely actionable feedback that doesn't matter if it's for an application developer or a network admin. The way that the feedback is presented leaves no room for what is the problem. Our use cases are internal network scans, external penetration tests, and then all of the remediation that goes along with those two results. The final use case that we use is we actively scan every single network password and make sure that no one has password reuse, duplication, or any of the things that have gotten a lot of other companies in trouble. This is one of their easiest features to start with. That is the primary use case.

What is most valuable?

The favorite feature of The NodeZero Platform is that it's easiest from a password perspective because when examining all the things in cybersecurity and all the things in the news, it almost always comes down to somehow the bad guys got someone's username and password. Being able to scan literally thousands of passwords to see if there's an issue with them and then immediately take action is amazing because it keeps our network safe and we don't have to worry about constantly having accounts taken over by criminals. By immediately taking action, they told us about this thing that allows the security teams to fix and retest vulnerabilities instantly, which is their one-click feature.

For us, it's so quick to test every single password. We're able to get a list of anyone that has a password that is compromised because some other website, they use that same password. We're able to actually just rescan all passwords in such a short period, we don't need to use the one-click verification. That's more for if there's a vulnerability on a specific computer or server, which we do use that as well. But just the ability to scan all passwords in such a short time is my favorite feature.

The NodeZero Platform's real attack capabilities have helped in identifying vulnerabilities in our on-prem systems in a few ways. First and foremost, other security platforms used to have so many things that they would report on. Because they would give so many issues and in a way that wasn't clear, a lot of times there was ambiguity and the different sub-teams within IT would disagree on how the problem was or if there was a problem. The way that it's helped us is that it got rid of all of that confusion. We're able to see an issue and then resolve an issue. The one-click verify has helped us several times because in the past, we would do a penetration test once a year and if we thought we fixed it, we would wait a whole other year until we figured it out. Now with the one-click verify, our team will take an action, scan it again, and then a lot of times, even though the fix is pretty straightforward, it doesn't solve the issue. For instance, everyone has NVIDIA in the news all the time because they have these amazing graphics cards. We had an issue. We thought we resolved it. We updated a version, we did the one-click verify, the issue was still there. It said to upgrade to the newest version. So we upgraded another version, did the one-click verify, still was an issue. We ended up going through four or five different iterations and then realized what was actually the problem is that one of the checkboxes needed to be checked differently across our network. Being able to actually go through those iterations so quickly has really helped from a security standpoint.

What needs improvement?

One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful.

There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.

For how long have I used the solution?

We've been using The NodeZero Platform for a little over four years now.

What do I think about the stability of the solution?

I have not seen any lagging, crashing, downtime, or anything with The NodeZero Platform. I had some unusual situations where because some of our third parties had their systems misconfigured, our scan would run forever because we would start scanning beyond our own four walls of our company. But we've never had major issues with the product itself.

What do I think about the scalability of the solution?

Our company has about 2,000 people, about 5,000 total devices including phones and network equipment. We're a medium-sized company and it takes us a few hours to run every single scan. I am uncertain how it would work if you're on an AT&T or a Walmart where you have a million network objects. I would think it does fairly, but I don't have the experience to say anything more than what we do, which is a mid-sized company.

How are customer service and support?

I have contacted their technical support or customer support many times. The main reason that we contact their technical support and customer support isn't because their product isn't working, it's because their product tells us we have an issue and we need a little bit more help on how we actually resolve the issue. They'll have really good guidance, but sometimes we need to say how they really found this because we're seeing this other flag set this way and we need their help. So we reach out to their support to help resolve the issues that we have within our own environment, not with their product.

My team's been very happy with The NodeZero Platform support. They're not 100%, but their support is above average. Sometimes even their support doesn't know why we're seeing certain issues. But the vast majority of times they are able to resolve the exact questions my team has on the first attempt, which is really good for customer or technical support. On a scale from 1 to 10, most of the time I'd give them a 10 out of 10. Sometimes you get people and it's not their best subject. Not every person is always 100% with every issue, but grading against other customer supports of similar products, 10 out of 10.

How was the initial setup?

The initial deployment of The NodeZero Platform was extremely easy. They basically just need you to install a scanner on your network or wherever you want to scan from. Then you just click a couple of buttons and wait a few hours and then voila, you have results. We've learned a lot over time where there's certain things that maybe we weren't doing as optimally as we wanted, but the initial deployment from the time that we saw a demo to the time that we had some production results was extremely fast. It was same day. I don't know if it was two hours or four hours, but it was very quick.

Which other solutions did I evaluate?

We have used alternatives to The NodeZero Platform. We originally did several proof of concepts and looked at several competitors. What we really appreciated about Horizon is they actually attack your network. They literally do the test to see if something is open, whereas other tools would just say it's on this version and we know this version has this issue. We've looked at a lot of other tools. We really appreciated Horizon. In the four years, we also do a lot of tools that aren't 100% competitors to The NodeZero Platform, but they do many of the same things. They scan your network, they tell you the devices that are there, they tell you if there's different types of configurations. For Microsoft, we use tools that actually tell us if Microsoft is secure. For our storage devices or our network devices, every one of those tools has their own scanners. We use all of the vendor-specific, which is only good for that one vendor, but it also helps us validate that The NodeZero Platform has been spot on and has been finding all the things that we would hope it would.

What other advice do I have?

The NodeZero Platform helps us to understand better the potential security threats. We don't really use it that way because for us, we're able to scan all of our internal network and all of our external network and have so few issues, we don't really have to worry about hypothetically there's this issue in the wild or there's this issue that's going around with other companies, because our list is so short now and we're just able to resolve everything. We don't use it really as a knowledge tool to inform us on what's going on. We have a lot of other literature to keep us appraised on what's going on. We use it more of just validating that everything we do is right and we don't have to fret about a bunch of hypotheticals. On a scale from 1 to 10, The NodeZero Platform rates a 10 out of 10 overall as it is the best security investment we've ever made, mainly because it got all of our IT people talking together and seeing the issues as they truly were, and that visibility knocked down a lot of walls between teams.


    Mike Bulyk

Has provided deep visibility into offensive tooling and improved trust through transparent command execution

  • September 30, 2025
  • Review provided by PeerSpot

What is our primary use case?

My use cases for The NodeZero Platform involve using the tool as a validation tool on top of existing vulnerability management processes. The general idea is that if I identify a subset of vulnerabilities that might be of interest to an attacker, I use The NodeZero Platform to validate my assumptions. Essentially, I'm using it as a red team validation tool to test and validate blue team findings.

What is most valuable?

The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. That's the main use case and the consistent configuration purpose.

The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio.

The Endpoint Security Effectiveness feature impacts my understanding of potential security threats by providing validation through endpoint testing. The NodeZero Platform deploys a script to verify whether endpoint protection tools such as EDR or EPP can detect and prevent attacks. This validation ensures that endpoint protection is configured correctly, revealing that default settings often don't work as expected. This makes the feature unique, as no other vendor seems to offer such validation capabilities.

What needs improvement?

The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools such as Rapid7, Tenable, or Qualys. Such integration would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning. Currently, this process is manual. Native API-based integration would make the workflow far more efficient.

For how long have I used the solution?

I have been using The NodeZero Platform in my career for about two and a half years, and I think it's coming up on the third year.

What do I think about the stability of the solution?

My thoughts about the stability of The NodeZero Platform are that it's not an issue in production. During initial testing in a VirtualBox virtual machine, it was less stable due to insufficient resources. The system requires fast SSD storage, at least 16 GB of RAM, and a 1G network interface. Once properly provisioned, it runs stably without issues.

What do I think about the scalability of the solution?

The scalability of The NodeZero Platform is limited by our license to 1,000 IPs, so my experience beyond that is limited. However, we successfully tested multiple NodeZero scanners running concurrently without any concerns. The system scales well within the licensed range.

How are customer service and support?

I have contacted The NodeZero Platform's technical support once in two and a half years. The issue was related to the reporting process getting stuck during telemetry capture and report generation. The support team resolved it quickly by restarting the process. I rate the support experience as 10 out of 10.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial deployment of The NodeZero Platform has two components: external and internal. For the external scanner, which uses AWS hosting, setup takes just minutes once the cloud space is provisioned. The tool performs domain and IP validation (whois, DNS lookup, etc.) before allowing scans, which can take up to 24 hours.

For internal deployment, it depends on corporate practices. Our process took about two weeks due to our sprint cycle and change management procedures. For larger or more complex network environments, deployment may take longer. Ideally, a NodeZero scanner should be positioned in each segmented subnet for full coverage.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing for The NodeZero Platform, I can say it's reasonable and the vendor is flexible. When discussing licensing, they were initially limited to 10,000 IPs, but agreed to let us target 1,000 IPs instead. That flexibility allowed us to use the tool effectively despite a smaller license count. While managing subsets of IPs introduces some overhead, the flexibility and support make the pricing worthwhile.

What other advice do I have?

The NodeZero Platform requires minimal maintenance. The NodeZero scanner is a small Linux wrapper with scripts that need occasional package updates. Although it auto-updates before scans, it's safer to manually update dependencies beforehand to prevent issues during testing.

Overall, I think The NodeZero Platform is a necessity in any security portfolio. With 15 years in the industry, I see it as an essential tool for organizations of any size to determine whether vulnerabilities are truly exploitable. The product works well, is stable, and provides unique validation capabilities. I would rate it a 10 out of 10 for everything.

I am a customer of The NodeZero Platform.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    reviewer2761140

Streamlines vulnerability validation through automation and also tells us how to resolve issues

  • September 30, 2025
  • Review provided by PeerSpot

How has it helped my organization?

The NodeZero Platform has been instrumental in identifying vulnerabilities across our entire network. Its automated scanning capabilities provide detailed insights and alert me to issues, which is exactly what we need from a security tool.

The interface is intuitive and easy to use, and the reporting features are excellent—offering both high-level executive summaries and in-depth technical reports. What stands out is that it not only tells you what's wrong but also explains how to fix it, complete with step-by-step instructions and the exact commands it used during the scan. This transparency is incredibly helpful, especially when validating fixes.

Even when vulnerabilities are detected, they may not always be exploitable in our specific environment. But knowing what's there—and having guidance on remediation—lets me act confidently. I use FortiClient and patch regularly, but NodeZero adds an extra layer of assurance by catching things that might slip through. I don’t have the budget for a dozen expensive tools, but with NodeZero, I get significant value without overspending.

What is most valuable?

The automation is by far the most valuable feature. NodeZero performs tasks comparable to what we used to get from a manual penetration testing firm—at a similar or even lower cost. The big difference? I can retest whenever I want, without waiting weeks or paying extra fees.

IT environments are dynamic, and things change quickly. In one case, I assumed a group policy was fixing an SMB issue across the network, but NodeZero revealed a few devices were still vulnerable. That allowed us to go back, identify the gap, and validate the fix—all using the platform.

The learning curve was minimal. Setup took just a couple of hours at most. Once installed, I simply choose the endpoints and let it run. There are safety warnings for potentially disruptive scans, which I appreciate—it helps prevent unintended issues like system crashes.

What needs improvement?

As someone who isn’t a dedicated security engineer, I find the platform comprehensive. However, I’d benefit from additional training on specific features, like their honeypot and tripwire system. Deeper education on these would help me take fuller advantage of the tool.


For how long have I used the solution?

I’ve been using NodeZero for one year.

What do I think about the stability of the solution?

The platform has been stable overall. It did crash our phone system once, but that was due to a Mitel vulnerability—not NodeZero itself. That incident actually led us to strengthen our firewall rules by eliminating “any-any” configurations and narrowing down allowed ports.

What do I think about the scalability of the solution?

NodeZero is highly scalable. I have around 1,000 public IPs and about 20 internal VLANs that can be scanned. The IP-based pricing can add up, but it’s manageable and worth the investment.

Scheduling scans is simple. I run external tests every Saturday at 3:30 AM and receive detailed notifications about any issues. It gives me confidence knowing the system is being continuously evaluated.

How are customer service and support?

Customer support has been excellent. The team is responsive, knowledgeable, and eager to walk me through any questions or features. I’d give them a perfect 10 out of 10.

Which solution did I use previously and why did I switch?

Before NodeZero, I relied solely on manual penetration testing. The switch was driven by the need for more frequent, flexible, and cost-effective testing.

How was the initial setup?

Initial setup was straightforward. I downloaded an OVA file, deployed it in Hyper-V, powered it on, and used a few simple CLI commands via SSH. Monthly maintenance is easy too—just a quick update command and it's done in seconds.

What's my experience with pricing, setup cost, and licensing?

Pricing is competitive and aligns with what I paid for manual testing—but with more flexibility. Traditional pen tests usually limit you to a few subnets, while NodeZero lets me scan a much broader range without added cost.

What other advice do I have?

I’d rate the NodeZero Platform a 10 out of 10. It’s a powerful, cost-effective, and reliable tool that gives me peace of mind in maintaining a secure IT environment.