The primary use case for the NodeZero platform by Horizon3.ai is to deliver penetration testing as a service to our clients, enabling us to support their security assurance, risk reduction, and compliance obligations.
Horizon3.ai NodeZero Platform
Horizon3.aiExternal reviews
External reviews are not included in the AWS star rating for the product.
Automated testing has transformed how we deliver fast, consistent security assessments
What is our primary use case?
What is most valuable?
The key capabilities of the NodeZero platform by Horizon3.ai that I have found most valuable are its speed, scalability, and consistency. It is able to cover a broad scope in a relatively short period of time, which delivers significant efficiency gains when compared with traditional manual testing. It also provides a more consistent outcome, as the process is not influenced by human bias or variability.
One of the most valuable features is the ability for security teams to remediate and retest vulnerabilities immediately. The one-click verification capability is particularly effective, as it allows fixes to be validated quickly without the need to rerun the entire assessment. This streamlines the remediation cycle and supports faster confirmation of security improvements.
The platform’s real attack capabilities have also helped reduce false positives in the identification of vulnerabilities across our on-premises systems. Because the findings are evidence-based and validated prior to reporting, the results are more reliable and actionable. This enables us to focus our efforts on confirmed security issues that genuinely require attention, rather than spending time investigating theoretical or unverified exposures.
The NodeZero platform also strengthens my understanding of potential security threats through its continuously updated capabilities. With new vulnerabilities emerging and being exploited in the wild on a regular basis, it is valuable to have a platform backed by a strong research and development function that continuously updates attack content to reflect the current threat landscape. This makes the platform effective not only as a point-in-time validation tool, but as part of an ongoing and continuous security assurance programme.
What needs improvement?
At present, the platform is relatively rigid in how it operates and offers limited flexibility to align with individual user preferences or organisational requirements. While this structured approach has advantages in maintaining consistency, it can also be restrictive in practice.
In particular, greater flexibility around reporting and risk scoring would add significant value. For example, the ability for users to adjust or contextualise vulnerability ratings based on their own environment, risk appetite, or compensating controls would make the reporting more adaptable and relevant to different use cases.
For how long have I used the solution?
I have been working with the NodeZero platform by Horizon3.ai for nearly a year, with hands-on experience using the platform since August of last year.
What do I think about the stability of the solution?
I would evaluate the NodeZero platform by Horizon3.ai as excellent in terms of stability and reliability. We have not experienced any issues with accessibility or availability, and the platform has consistently performed as expected.
I would rate the stability of the NodeZero platform by Horizon3.ai as 10 out of 10.
What do I think about the scalability of the solution?
I consider the NodeZero platform by Horizon3.ai to be highly scalable. It is well-suited to enterprise environments, straightforward to deploy, and can be implemented within minutes. Its speed and breadth of testing enable it to assess large areas of network coverage in a relatively short period of time.
I would rate the scalability of the NodeZero platform by Horizon3.ai as 10 out of 10.
How are customer service and support?
I interact with both the technical support and customer service teams at Horizon3.ai in relation to the NodeZero platform.
I have direct access to representatives in my region through a dedicated messaging channel, which makes communication quick and efficient. Whenever I need assistance, I can reach out directly and typically receive a response within an hour, and often sooner. In my experience, the team has been consistently responsive, helpful, and easy to work with.
I would rate the technical support for the NodeZero platform by Horizon3.ai as 9 out of 10, with 10 representing the highest level of support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Prior to using the NodeZero platform by Horizon3.ai, our security testing activities were conducted entirely through manual methods, as we had not previously utilised an automated platform of this nature.
How was the initial setup?
The installation process for the NodeZero platform by Horizon3.ai is straightforward and easy to complete. The deployment workflow is simple: you download the preconfigured virtual machine from the Horizon3.ai website, run it within the target environment, and then copy and execute the provided script within the locally deployed agent. Once that is done, the platform is ready to begin testing almost immediately.
In my experience, I have not encountered any challenges or blockers during installation. The overall setup process has been smooth, intuitive, and reliable.
What about the implementation team?
I participated in the initial setup and deployment process of The NodeZero Platform by Horizon3.ai.
What was our ROI?
So far, I have seen a clear return on investment from the NodeZero platform by Horizon3.ai. As an autonomous solution, it has enabled us to save a significant amount of time and effort by reducing the level of manual work required. This has been one of the key benefits of adopting a platform of this type.
In addition, because the platform is designed to scale effectively for enterprise environments, it has also helped us improve efficiency on larger engagements. As a result, we are seeing cost savings through reduced effort and a more streamlined delivery model.
Which other solutions did I evaluate?
Before selecting the NodeZero platform by Horizon3.ai, I evaluated several alternative solutions from other vendors, including Pentera and RidgeBot.
We ultimately chose NodeZero for three main reasons. First, its technical capabilities were better aligned with the specific use cases and outcomes we were looking to achieve. Second, it was more commercially competitive and offered better value than the other solutions we assessed. Third, the quality of both customer and technical support was a key differentiator. Whenever we required assistance, advice, or issue resolution, the Horizon3.ai team was responsive, accessible, and highly supportive in working through our requirements.
What other advice do I have?
As a managed security service provider, we use the NodeZero platform by Horizon3.ai in both a reseller and advisory capacity.
Its impact on remediation has been particularly positive. The platform provides a clear and efficient way to manage remediation through its dedicated vulnerability management capabilities, with the added benefit of integration into platforms such as Jira and ServiceNow. Because findings are evidence-based and validated, the output is highly actionable and carries a low false-positive rate, making it a strong remediation enablement tool.
From a commercial perspective, I am familiar with the platform’s pricing and licensing structure and consider it to be well-positioned across market segments. Its tiered pricing model makes it accessible for small and medium-sized businesses, while its enterprise packages provide the additional functionality required by larger organisations.
The platform has helped us reduce our penetration testing delivery costs, which was a key objective for us as a consultancy and service provider. Although I cannot disclose a specific percentage reduction, the cost savings have been significant.
My overall rating for the NodeZero platform by Horizon3.ai is eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated pentesting has transformed our quality assurance and now prioritizes real attack paths
What is our primary use case?
The easiest way to describe the use case would be quality assurance. It is very easy to miss a single configuration file or overlook something easy in the heat of the moment. Having that quality assurance to consistently find and verify the fixing of issues is an amazing game changer, especially when comparing it to traditional vulnerability management.
It used to be running into a wall and now it's actually about identifying your priorities and determining where there's a point in investing the time to start on it.
What is most valuable?
Speed, scalability, and the ability to see how an attack path is actually formed are the best features. The proof that what was claimed to have happened actually did happen is what I like the most about The NodeZero Platform by Horizon3.ai.
My impressions of the solution's feature that allows my security team to fix and retest vulnerabilities instantly is that it's awesome. I really love it. It is great. Instead of running a whole retest, which for some issues you will have to do, consider the classic scenario where it's Friday and almost time to leave for the weekend, but you found about 10 or so criticals that have all been worked through. The question becomes whether you trust yourself enough that all those fixes worked or whether you trust the provider enough that all those fixes worked. The NodeZero Platform by Horizon3.ai allows you to do a one-click verify, where you only test these specific issues. Being able to do that reduces the verification time to about 20 to 30 minutes rather than several hours. I love it because you don't have to tell your employees to miss their children's sports games.
I would say I trust The NodeZero Platform by Horizon3.ai with 99 percent certainty in identifying vulnerabilities in my on-premises systems. We found some essentially insane things. There are some basic issues you find every now and then, but also things that make you really surprised about how this worked and how that company hasn't been breached years ago already. It is awesome at finding just about everything.
The endpoint security effectiveness feature is really nice to get a direct mapping to tell me which endpoints do need to be looked at and where some of the topics that actually need to be addressed are. It does speed up the understanding for the EDR teams to actually see what are the issues that need to be addressed.
What needs improvement?
I would like to see an improvement in the notification management. Right now, the notifications, for example, when you schedule tests, the notification that the test has started and or finished, will only go to the person who has set up the test. I'm told that this is coming in the future, but I would like to on a per-test or per-schedule basis be able to set the notification recipient.
For how long have I used the solution?
I have been working with the solution since early 2023.
What do I think about the stability of the solution?
There's constantly improvement in the attack content itself, but on the technical basis, I'm super happy with The NodeZero Platform by Horizon3.ai.
What do I think about the scalability of the solution?
Scalability is great for me and all my clients.
How are customer service and support?
Regarding technical support, I think I'll give it a 10. There have been a couple of tickets in the recent months that I've needed to open, but those were always addressed super quickly, especially if you have something that needs an ad hoc solution. You can go via the chat and you will have a response in a couple minutes at most. Most issues have been resolved in under 20 minutes.
How was the initial setup?
It is really easy to work with The NodeZero Platform by Horizon3.ai. It's easy to set up and easy to understand. The onboarding or the POC is the education for the team. After that has been done, everyone at the customer will know how to use the tool. It is really easy to get started. There's such a low barrier to entry and a minimal investment with really high reward.
What was our ROI?
It is difficult to put a number to regarding the rewards and the ROI from The NodeZero Platform by Horizon3.ai. I would essentially say either immeasurable improvement or 99.9 percent. We've had customers who had quite literally insane issues in their networks. Being able to find them because there have been no eyes on that particular section so far ever, and fixing those potentially prevented those companies from getting breached. I will say absolutely 99.9 percent.
Regarding how much time The NodeZero Platform by Horizon3.ai has reduced me in testing, for comparison, this is a bit of a difficult question because it's not really directly comparable. For example, we've tested a global company and tested their entire network. That took us two days. If you were to do that with a manual pentest on the entire network, that would take months. The amount of manpower and costs associated with that is almost an immeasurable improvement again.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, that is a bit of a difficult question. I'm seeing this solely from the technical perspective. Going back to the previous point, if a solution can find the issue that would have allowed your company to get breached in seconds, what kind of price can you reasonably say you wouldn't pay? I would say it is very cost-efficient.
Which other solutions did I evaluate?
In the past, I've had a look at Pentera, for example.
What other advice do I have?
My thoughts on the integration or API aspects are positive. There's also always the option of the MCP server. But in general, regarding integration, for example, we have our ticketing system integrated. So if there's a finding, you can say in the console that you want to create a ticket for this. Then, when this finding gets closed in the ticketing system, there is an instant call to verify that fix. If the fix worked and the finding is closed successfully, it will stay closed. If it wasn't fixed, the ticket will be reopened. The service agent knows that they need to look at this again. It works great.
If someone was looking into this product, I would absolutely recommend it. I am not exaggerating when I say that this is my absolute favorite product. If I could, I would deploy this for everyone everywhere now. The basic solution would be to start with a proof of concept. Even then, the initial test is great. You will instantly get some results. I've never had a single test without findings. There were some with lower criticalities, but you will get some great results.
After that first test is done and you fix the first findings, then you will see the point that autonomous and recurring pentesting is great. For example, if you fixed something during day one, retest. Fix something during day two, run a full retest. Run tests in a different segment and run a different scenario. It is so much fun, especially when you compare it to old-school vulnerability scanners. Getting that 2,000 to 3,000-page PDF report or even classical pentests where at the point where you get the report for the pentest, it is already out of date because in the meantime, you changed a configuration or a patch was applied. The NodeZero Platform by Horizon3.ai gets you essentially as close as possible to consistent, real-time pentesting data. I would give this product a rating of 10 out of 10.
Integrated security platform has unified monitoring and continuously finds critical vulnerabilities
What is our primary use case?
The use cases for The NodeZero Platform by Horizon3.ai include Attack Surface Monitoring primarily, followed by third-party risk management and Attack Surface Management, as well as social media monitoring. These are probably the three biggest use cases.
What is most valuable?
What I appreciate the most about The NodeZero Platform by Horizon3.ai is its distinctive competitive advantage, which is the ability to bundle multiple security solutions into one single tool. While there is competition, there is nothing quite like The NodeZero Platform by Horizon3.ai at the moment, at least to my knowledge. That is the biggest USP.
Otherwise, it is a question of time. If you benchmark a pure play Attack Surface Management tool alongside The NodeZero Platform by Horizon3.ai, then sometimes The NodeZero Platform by Horizon3.ai may do a better job, whereas sometimes the other tool might do a better job. It is a question of always catching up, much as the different AI models evolve. At some point, ChatGPT was super good, then suddenly it became Gemini and today it is flawed. Competition is constantly ongoing. However, the area where The NodeZero Platform by Horizon3.ai has done pretty well is to build multiple tools and stack them into one single solution, and that is something which competition has not really done. I have no answers to why, but that is the biggest thing with The NodeZero Platform by Horizon3.ai.
The feature that allows security teams to fix and retest vulnerabilities instantly is part of the Attack Surface Management functionality of The NodeZero Platform by Horizon3.ai. The whole idea of ASM is continuous monitoring of vulnerabilities, so the minute you actually fix it and you say that it is fixed, it will go back and check against the same particular use case. That is the functionality being discussed.
What needs improvement?
The downsides of The NodeZero Platform by Horizon3.ai are that it is an expensive tool; it is a very expensive tool.
Since The NodeZero Platform by Horizon3.ai is integrated, for people who are not looking for everything but just one particular functionality, compared to any other tool, The NodeZero Platform by Horizon3.ai tends to be a little more expensive.
For how long have I used the solution?
I have probably been working on it for a year.
What do I think about the stability of the solution?
In terms of stability, I have not seen any issues with The NodeZero Platform by Horizon3.ai; I have not experienced lagging, crashing, or downtime.
I do not know the underlying architecture of The NodeZero Platform by Horizon3.ai; it is a SaaS solution, and since it has not crashed ever, and it is not a business-critical application, it is not your ERP. So frankly, even if they did crash, it would be very hard to notice unless we really manage to try and use it at that time and we get caught. The whole idea of The NodeZero Platform by Horizon3.ai is to work in the shadows and just keep pushing alerts to you. You only log into the tool when you want to. The idea is it works behind the shadows; so even if there was a downtime of, for example, five minutes or ten minutes, it is not your ERP system and you will not really notice it.
Which solution did I use previously and why did I switch?
There is no single tool which can really say it has all the features that The NodeZero Platform by Horizon3.ai has. However, I have tried other tools which offer some parts of The NodeZero Platform by Horizon3.ai functionality. For example, I have used different third-party risk management tools, ASM tools such as SpyCompass, and IzoLogic for dark web monitoring and things of that nature, which are different tools, but they serve different areas; whereas The NodeZero Platform by Horizon3.ai is a combination of everything.
How was the initial setup?
The initial deployment of The NodeZero Platform by Horizon3.ai is absolutely straightforward and simple; all I need to do is request for an instance, specify these things, and there is nothing really to install apart from the agent server that I need to install. It is not a big deal.
What other advice do I have?
In terms of the platform's real attack capabilities, The NodeZero Platform by Horizon3.ai identifies vulnerabilities in my on-premises systems as good as any other vulnerability scanning solution that is out there. It does a very good job of finding real vulnerabilities and prioritizing them based on the criticality of the asset and contextualization of the organization's nature, which is very standard to any typical vulnerability scanning solution that is out there.
For The NodeZero Platform by Horizon3.ai overall, I would rate it an eight out of ten, with ten being the highest and one being the lowest.
Intuitive Yet Powerful—A Critical Part of Our Cybersecurity Toolbox
Essential for Compliance and Flexibility
Has improved internal and co-op security validation through detailed reporting and continuous vulnerability detection
What is our primary use case?
What is most valuable?
The feature that allows security teams to fix and retest vulnerabilities instantly adds a lot of quick mitigation and the ability to fix issues on the fly. Everything that has been added and modified and improved since acquiring the tool has worked seamlessly.
The Real Attack Capabilities help in identifying vulnerabilities in on-premises systems because if patching was missed, it will identify that. With deployment across the system, any recent vulnerability will be found. The way it learns the environment makes it an easy-to-use tool. It does what it says it is going to do, which is finding vulnerabilities as they appear.
The Endpoint Security Effectiveness feature helps in understanding potential security threats better because everything that it identifies improves things on an ongoing basis. It ensures that everything is kept current, so it adds an extra layer to what is being done with the main EDR solution.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
Which solution did I use previously and why did I switch?
How was the initial setup?
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
One-click re-testing has validated remediations and improved threat visibility
What is our primary use case?
We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.
What is most valuable?
I think the one-click feature to fix and re-test vulnerabilities is great. This feature allows us to validate whether the remediation actually resolved the issue. It's pretty easy. You click it and it starts scanning. This is super helpful. I don't think anybody else has anything like that.
The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems. It shows us whether it really was able to do or meet the objectives that a threat actor could do. It really helps identify the likelihood instead of simply indicating a potential vulnerability.
The NodeZero Platform impacts my understanding of potential security threats in an eye-opening way. It provides validation of the actual security flaw, and it also provides remediation steps. Usually, it's an article that's written up, but it also shows proof as well.
I haven't seen much of an impact on my remediation time from using The NodeZero Platform. I think what it does is it justifies a vulnerable aspect. For the most part, it does speed up remediation because we have proof that there is a vulnerability. We classify those vulnerabilities as a POF or a Pants on Fire and they have to be remediated within 72 hours. It does help remediate.
What needs improvement?
I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.
For how long have I used the solution?
I have used the solution for about two and a half years.
What do I think about the stability of the solution?
I haven't seen any stability issues such as crashing, lagging, or downtime. I have seen that their portal has been inaccessible for probably about 30 minutes one time.
What do I think about the scalability of the solution?
The NodeZero Platform is very scalable.
How are customer service and support?
I have never had to contact their technical support or customer support.
Which solution did I use previously and why did I switch?
We've used Pantera, Symptom and Attack IQ.
How was the initial setup?
The initial deployment was so easy. It only took us about five minutes.
What's my experience with pricing, setup cost, and licensing?
I think the pricing could be a little bit more competitive. For example, Centerra had a little bit more flexible pricing than NodeZero.
Which other solutions did I evaluate?
I would say Pentera is the closest competitor to The NodeZero Platform. When I compare them, I think the flexibility of scanning is where Horizon 3 edges Pentera. Pentera does a better job at cracking passwords, but deploying remote nodes is very difficult. It's kind of convoluted, so it makes it difficult to operate. The NodeZero Platform's pricing is competitive. I think it could be a little bit more competitive. For example, Pentera had a little bit more flexible pricing than The NodeZero Platform.
What other advice do I have?
Based on everything we've looked at and used in the past, I would rate The NodeZero Platform a 10 out of 10 as they are the best.
Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing
What is our primary use case?
For us, The NodeZero Platform is literally the single best security solution we have because the way that it works is we're able to scan every part of our network, both internally and externally, and then get completely actionable feedback that doesn't matter if it's for an application developer or a network admin. The way that the feedback is presented leaves no room for what is the problem. Our use cases are internal network scans, external penetration tests, and then all of the remediation that goes along with those two results. The final use case that we use is we actively scan every single network password and make sure that no one has password reuse, duplication, or any of the things that have gotten a lot of other companies in trouble. This is one of their easiest features to start with. That is the primary use case.
What is most valuable?
The favorite feature of The NodeZero Platform is that it's easiest from a password perspective because when examining all the things in cybersecurity and all the things in the news, it almost always comes down to somehow the bad guys got someone's username and password. Being able to scan literally thousands of passwords to see if there's an issue with them and then immediately take action is amazing because it keeps our network safe and we don't have to worry about constantly having accounts taken over by criminals. By immediately taking action, they told us about this thing that allows the security teams to fix and retest vulnerabilities instantly, which is their one-click feature.
For us, it's so quick to test every single password. We're able to get a list of anyone that has a password that is compromised because some other website, they use that same password. We're able to actually just rescan all passwords in such a short period, we don't need to use the one-click verification. That's more for if there's a vulnerability on a specific computer or server, which we do use that as well. But just the ability to scan all passwords in such a short time is my favorite feature.
The NodeZero Platform's real attack capabilities have helped in identifying vulnerabilities in our on-prem systems in a few ways. First and foremost, other security platforms used to have so many things that they would report on. Because they would give so many issues and in a way that wasn't clear, a lot of times there was ambiguity and the different sub-teams within IT would disagree on how the problem was or if there was a problem. The way that it's helped us is that it got rid of all of that confusion. We're able to see an issue and then resolve an issue. The one-click verify has helped us several times because in the past, we would do a penetration test once a year and if we thought we fixed it, we would wait a whole other year until we figured it out. Now with the one-click verify, our team will take an action, scan it again, and then a lot of times, even though the fix is pretty straightforward, it doesn't solve the issue. For instance, everyone has NVIDIA in the news all the time because they have these amazing graphics cards. We had an issue. We thought we resolved it. We updated a version, we did the one-click verify, the issue was still there. It said to upgrade to the newest version. So we upgraded another version, did the one-click verify, still was an issue. We ended up going through four or five different iterations and then realized what was actually the problem is that one of the checkboxes needed to be checked differently across our network. Being able to actually go through those iterations so quickly has really helped from a security standpoint.
What needs improvement?
One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful.
There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.
For how long have I used the solution?
We've been using The NodeZero Platform for a little over four years now.
What do I think about the stability of the solution?
I have not seen any lagging, crashing, downtime, or anything with The NodeZero Platform. I had some unusual situations where because some of our third parties had their systems misconfigured, our scan would run forever because we would start scanning beyond our own four walls of our company. But we've never had major issues with the product itself.
What do I think about the scalability of the solution?
Our company has about 2,000 people, about 5,000 total devices including phones and network equipment. We're a medium-sized company and it takes us a few hours to run every single scan. I am uncertain how it would work if you're on an AT&T or a Walmart where you have a million network objects. I would think it does fairly, but I don't have the experience to say anything more than what we do, which is a mid-sized company.
How are customer service and support?
I have contacted their technical support or customer support many times. The main reason that we contact their technical support and customer support isn't because their product isn't working, it's because their product tells us we have an issue and we need a little bit more help on how we actually resolve the issue. They'll have really good guidance, but sometimes we need to say how they really found this because we're seeing this other flag set this way and we need their help. So we reach out to their support to help resolve the issues that we have within our own environment, not with their product.
My team's been very happy with The NodeZero Platform support. They're not 100%, but their support is above average. Sometimes even their support doesn't know why we're seeing certain issues. But the vast majority of times they are able to resolve the exact questions my team has on the first attempt, which is really good for customer or technical support. On a scale from 1 to 10, most of the time I'd give them a 10 out of 10. Sometimes you get people and it's not their best subject. Not every person is always 100% with every issue, but grading against other customer supports of similar products, 10 out of 10.
How was the initial setup?
The initial deployment of The NodeZero Platform was extremely easy. They basically just need you to install a scanner on your network or wherever you want to scan from. Then you just click a couple of buttons and wait a few hours and then voila, you have results. We've learned a lot over time where there's certain things that maybe we weren't doing as optimally as we wanted, but the initial deployment from the time that we saw a demo to the time that we had some production results was extremely fast. It was same day. I don't know if it was two hours or four hours, but it was very quick.
Which other solutions did I evaluate?
We have used alternatives to The NodeZero Platform. We originally did several proof of concepts and looked at several competitors. What we really appreciated about Horizon is they actually attack your network. They literally do the test to see if something is open, whereas other tools would just say it's on this version and we know this version has this issue. We've looked at a lot of other tools. We really appreciated Horizon. In the four years, we also do a lot of tools that aren't 100% competitors to The NodeZero Platform, but they do many of the same things. They scan your network, they tell you the devices that are there, they tell you if there's different types of configurations. For Microsoft, we use tools that actually tell us if Microsoft is secure. For our storage devices or our network devices, every one of those tools has their own scanners. We use all of the vendor-specific, which is only good for that one vendor, but it also helps us validate that The NodeZero Platform has been spot on and has been finding all the things that we would hope it would.
What other advice do I have?
The NodeZero Platform helps us to understand better the potential security threats. We don't really use it that way because for us, we're able to scan all of our internal network and all of our external network and have so few issues, we don't really have to worry about hypothetically there's this issue in the wild or there's this issue that's going around with other companies, because our list is so short now and we're just able to resolve everything. We don't use it really as a knowledge tool to inform us on what's going on. We have a lot of other literature to keep us appraised on what's going on. We use it more of just validating that everything we do is right and we don't have to fret about a bunch of hypotheticals. On a scale from 1 to 10, The NodeZero Platform rates a 10 out of 10 overall as it is the best security investment we've ever made, mainly because it got all of our IT people talking together and seeing the issues as they truly were, and that visibility knocked down a lot of walls between teams.
Has allowed me to increase testing coverage and focus on remediation by automating repetitive tasks
What is our primary use case?
I use The NodeZero Platform as a consultant on penetration testing engagements for various customers. This might be different than some of their more common use cases where companies use it internally. The primary use case is for penetration testing engagements, and the main driver for having The NodeZero Platform is that it's a force multiplier for me as an individual to perform more penetration testing without additional human resources.
What is most valuable?
My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise. It can be set and forgotten while it performs its tasks. It does exactly what it claims to do.
What needs improvement?
I started with The NodeZero Platform when it was less mature. Anytime I encountered something annoying or identified a gap that needed attention, they had already fixed or added it by the time I would have requested it. The product is being rapidly developed at this stage. There really isn't anything feature-wise that I would request or change because it's a good product. It does what it claims and excels at finding issues and covering large environments so humans don't have to perform repetitive tasks for extended periods. This allows us to focus on what's important: fixing and protecting systems. If there was one thing I would change, I would want their consulting licensing to return to being unlimited.
For how long have I used the solution?
I have been using The NodeZero Platform for four years this month.
What do I think about the stability of the solution?
In the early stages, I experienced issues with large penetration tests where things might get delayed or require intervention, but I cannot remember the last time that occurred. While one of their main selling points is that it's safe to run in production, we might still try to avoid unnecessary risk. For companies operating during normal business hours, we might conduct penetration testing at night. When using SaaS-based products at night, maintenance windows can cause downtime, but I haven't encountered any of these issues with The NodeZero Platform. I cannot recall any instances of downtime or the platform being offline.
What do I think about the scalability of the solution?
I have used it for tests ranging from tens to thousands to tens of thousands of assets, and I haven't encountered any trouble scaling. While I wouldn't say it's infinitely scalable, it certainly handles scaling effectively.
How are customer service and support?
The support currently is really good. When I have questions or concerns, I receive responses promptly. They've added a chatbot which isn't particularly useful, but when it can't answer questions, it forwards messages to human support. I typically receive human responses within 12 hours, usually the same day or next day. Previously, with time-sensitive engagements, I would worry about resolving issues before deadlines. That concern has diminished as they've become more responsive and require less escalation to engineering. Support cases are now handled more efficiently, either by directing to documentation or providing workarounds for project completion.
How was the initial setup?
The setup process is extremely straightforward. It has become even easier with the addition of Runners feature, which allows for automatic setup of repeated tests throughout the year. The initial setup takes approximately 30 minutes, mostly spent reading documentation, as the process is primarily point-and-click.
Which other solutions did I evaluate?
I have used three alternatives: Pentera, Core Impact, and Metasploit Professional. Core Impact and Metasploit Professional aren't direct competitors as they are penetration testing toolkits with built-in automation. Pentera markets itself similarly to The NodeZero Platform. Compared to Pentera, The NodeZero Platform requires less setup and delivers higher quality results. Pentera follows a consistent pattern of running vulnerability scans and attempting exploits, producing results similar to vulnerability scans. The NodeZero Platform varies its approach and continues exploring potential vulnerabilities more thoroughly, similar to a real threat actor.
What other advice do I have?
The NodeZero Platform has helped identify vulnerabilities with on-premises systems effectively. They handle all technical aspects internally. I have given The NodeZero Platform a rating of 9 out of 10.
Has provided deep visibility into offensive tooling and improved trust through transparent command execution
What is our primary use case?
My use cases for The NodeZero Platform involve using the tool as a validation tool on top of existing vulnerability management processes. The general idea is that if I identify a subset of vulnerabilities that might be of interest to an attacker, I use The NodeZero Platform to validate my assumptions. Essentially, I'm using it as a red team validation tool to test and validate blue team findings.
What is most valuable?
The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. That's the main use case and the consistent configuration purpose.
The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio.
The Endpoint Security Effectiveness feature impacts my understanding of potential security threats by providing validation through endpoint testing. The NodeZero Platform deploys a script to verify whether endpoint protection tools such as EDR or EPP can detect and prevent attacks. This validation ensures that endpoint protection is configured correctly, revealing that default settings often don't work as expected. This makes the feature unique, as no other vendor seems to offer such validation capabilities.
What needs improvement?
The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools such as Rapid7, Tenable, or Qualys. Such integration would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning. Currently, this process is manual. Native API-based integration would make the workflow far more efficient.
For how long have I used the solution?
I have been using The NodeZero Platform in my career for about two and a half years, and I think it's coming up on the third year.
What do I think about the stability of the solution?
My thoughts about the stability of The NodeZero Platform are that it's not an issue in production. During initial testing in a VirtualBox virtual machine, it was less stable due to insufficient resources. The system requires fast SSD storage, at least 16 GB of RAM, and a 1G network interface. Once properly provisioned, it runs stably without issues.
What do I think about the scalability of the solution?
The scalability of The NodeZero Platform is limited by our license to 1,000 IPs, so my experience beyond that is limited. However, we successfully tested multiple NodeZero scanners running concurrently without any concerns. The system scales well within the licensed range.
How are customer service and support?
I have contacted The NodeZero Platform's technical support once in two and a half years. The issue was related to the reporting process getting stuck during telemetry capture and report generation. The support team resolved it quickly by restarting the process. I rate the support experience as 10 out of 10.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment of The NodeZero Platform has two components: external and internal. For the external scanner, which uses AWS hosting, setup takes just minutes once the cloud space is provisioned. The tool performs domain and IP validation (whois, DNS lookup, etc.) before allowing scans, which can take up to 24 hours.
For internal deployment, it depends on corporate practices. Our process took about two weeks due to our sprint cycle and change management procedures. For larger or more complex network environments, deployment may take longer. Ideally, a NodeZero scanner should be positioned in each segmented subnet for full coverage.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing for The NodeZero Platform, I can say it's reasonable and the vendor is flexible. When discussing licensing, they were initially limited to 10,000 IPs, but agreed to let us target 1,000 IPs instead. That flexibility allowed us to use the tool effectively despite a smaller license count. While managing subsets of IPs introduces some overhead, the flexibility and support make the pricing worthwhile.
What other advice do I have?
The NodeZero Platform requires minimal maintenance. The NodeZero scanner is a small Linux wrapper with scripts that need occasional package updates. Although it auto-updates before scans, it's safer to manually update dependencies beforehand to prevent issues during testing.
Overall, I think The NodeZero Platform is a necessity in any security portfolio. With 15 years in the industry, I see it as an essential tool for organizations of any size to determine whether vulnerabilities are truly exploitable. The product works well, is stable, and provides unique validation capabilities. I would rate it a 10 out of 10 for everything.
I am a customer of The NodeZero Platform.