Try our new research platform with insights from 80,000+ expert users

Picus Security vs The NodeZero Platform by Horizon3.ai comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Picus Security
Ranking in Breach and Attack Simulation (BAS)
4th
Average Rating
9.0
Reviews Sentiment
7.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
The NodeZero Platform by Ho...
Ranking in Breach and Attack Simulation (BAS)
1st
Average Rating
9.0
Reviews Sentiment
5.7
Number of Reviews
11
Ranking in other categories
Vulnerability Management (11th), Advanced Threat Protection (ATP) (12th), Penetration Testing Services (1st), Risk-Based Vulnerability Management (5th)
 

Mindshare comparison

As of February 2026, in the Breach and Attack Simulation (BAS) category, the mindshare of Picus Security is 12.9%, down from 18.9% compared to the previous year. The mindshare of The NodeZero Platform by Horizon3.ai is 13.6%, up from 7.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Breach and Attack Simulation (BAS) Market Share Distribution
ProductMarket Share (%)
The NodeZero Platform by Horizon3.ai13.6%
Picus Security12.9%
Other73.5%
Breach and Attack Simulation (BAS)
 

Featured Reviews

erdemerdag - PeerSpot reviewer
Cybersecurity Operations Engineer at a tech services company with 201-500 employees
Breach and attack simulation software that provides network, endpoint, and email vectors
According to the attack vectors, you cannot specify which product is failing or which product is working well because there's no agent. The best case scenario is to add an agent solution where an agent would have the ability to actually detect which programs aren't working. For the attack software, you put a peer on the cloud site, and you have another peer internal network. There is IPS, firewall, WAF, and DBS amongst these peers. The cloud's peer is trying to send the attack file to the internal network. Maybe the firewall is blocking it, maybe the IP, maybe the WAF, but you cannot see the details. You can say, "Yes, my security product is blocking that attack scenario," or, "I cannot block this attack."
SH
Chief Information Officer at a construction company with 1,001-5,000 employees
Has unified our IT teams by providing clear visibility into network vulnerabilities and accelerated remediation with real-world attack testing
One of the things that we've shared with Horizon is just the reporting. They've made a lot of changes over time, but when examining computers, most average normal people don't look at a computer and identify it as 114.82.117.180. They identify it as 'the printer for accounting.' When many of the reports give the very detailed technical IP address or serial number, that's really not helpful for anyone other than the person, the hands-on person that's trying to remediate it. All the managers, all the leaders, having information in that format isn't helpful. Being able to have information about what those devices are would be very helpful. There's a technical reason they can't just have an easy button because some people have really complicated networks. When examining things for the average company, the average executive, that 114 number, there's only one of those. But if examining an AT&T or a Walmart, it isn't unique. They haven't solved that problem. But for the 90% of companies, being able to have just a human readable name for all devices on your network in all of the reports all of the time would be the most beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"One of the most valuable features would be the detection capability, specifically the ability to detect alarms and logs collected from SIEM tools."
"You have the liberty of physically executing a specific set of rules in your environment."
"The most valuable feature of the solution is its integration capabilities with the other security tools."
"It's very useful software because the customer mostly configures their IPS and manages their firewalls, WAF, and the DBS according to the latest update, latest news, or according to the situation."
"The most valuable feature of Picus Security is its threat intelligence, providing suggestions to block and prevent attacks by identifying malicious files and providing threat IDs."
"It provides good reports and offers signature-based solutions."
"Overall, I'd rate NodeZero at nine to 9.5 out of ten."
"I rate the stability of the NodeZero Platform a ten out of ten."
"After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify."
"We experienced a threat that could have severely crippled us, but we were able to shut it down before it escalated, thanks to internal vulnerability testing and addressing critical vulnerabilities using their tool."
"Honestly, it's one of the most transformational technologies we've implemented in our company."
"The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio."
"The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems."
"My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise—it can be set and forgotten while it performs its tasks, and it does exactly what it claims to do."
 

Cons

"There is room for improvement in the response rate provided by customer support."
"To improve, Picus Security could consider establishing a data center in India to address trust issues and increase interest from Indian customers."
"Let's say if a customer's environment has 10 security devices and they need to know that there is an attack that has bypassed their devices, they cannot go and inspect every device and every rule in their security devices."
"The amount of integrations that the product can handle is an area of concern, making it one of the aspects where improvements are required."
"The reporting and data analysis could be improved. Specifically, the analysis of the results."
"According to the attack vectors, you cannot specify which product is failing or which product is working well because there's no agent."
"The only issue we’ve encountered is that sometimes the scans take a long time to complete."
"You need to be cautious about what it scans, as it could potentially cause issues."
"Sometimes even their support doesn't know why we're seeing certain issues."
"One of the areas where improvement is needed is in the visibility and reporting for large enterprises."
"The reports are quite useless."
"They've added a chatbot which isn't particularly useful, but when it can't answer questions, it forwards messages to human support."
"The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools that would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning since the process is currently manual."
"I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good."
 

Pricing and Cost Advice

"There is a yearly license according to the number of vectors. The pricing is moderate."
"They have certain price ranges for their products, depending upon the use cases, and the number of applications the customer wants to try."
Information not available
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
881,707 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
9%
Manufacturing Company
8%
Government
8%
Computer Software Company
9%
Manufacturing Company
8%
Comms Service Provider
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What do you like most about Picus Security?
The most valuable feature of Picus Security is its threat intelligence, providing suggestions to block and prevent attacks by identifying malicious files and providing threat IDs.
What is your experience regarding pricing and costs for Picus Security?
The pricing of Picus Security is average, and it offers a good value for money.
What needs improvement with Picus Security?
There is room for improvement in the response rate provided by customer support. Picus Security could improve the response time.
What do you like most about Horizon3.ai?
Penetration testing and scans are useful features.
What needs improvement with Horizon3.ai?
I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.
What is your primary use case for Horizon3.ai?
We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.
 

Also Known As

No data available
Horizon3.ai
 

Overview

 

Sample Customers

Akbank, Exclusive Networks, Garanti, ING Bank, QNB Finansbank, Turkcell, Vodafone, Yapı Kredi
Government agencies, Defense Industrial Base organizations, and enterprises in regulated industries such as finance, healthcare, manufacturing, and criticalinfrastructure rely on NodeZero to meet rigorous security and compliance requirements with continuous, scheduled, and on-demand testing.
Find out what your peers are saying about Picus Security vs. The NodeZero Platform by Horizon3.ai and other solutions. Updated: December 2025.
881,707 professionals have used our research since 2012.