No more typing reviews! Try our Samantha, our new voice AI agent.
Security Engineer at Herjavec Group
MSP
Top 20
Mar 27, 2026
Automated penetration testing has reduced remediation time and provides clear attack evidence
Pros and Cons
  • "The NodeZero Platform by Horizon3.ai is better than manual penetration test scans, definitely worth trying if you are considering using it because it reduces the time and cost associated with manual scans and presents the data in a very clear way that even non-technical people can understand."

    What is our primary use case?

    I use The NodeZero Platform by Horizon3.ai for internal and external pentest scans, and it also provides Kubernetes scanning and scanning of GitHub accounts. Primarily, I use it for internal and external pentest scans.

    Regarding on-premises systems, I have executed pentest scans on externally located and internally located systems, but I have not tried much with on-premises servers. I honestly do not have significant exposure in that area and cannot provide feedback on that part at this time.

    What is most valuable?

    The best features of The NodeZero Platform by Horizon3.ai are that it does not require much effort compared to manual penetration testing. You simply configure the scan and modify the requirements you need, and it scans and provides quite good results. The platform presents the data in a very clear way that even non-technical people can understand the dashboard and read through it.

    The user interface is significantly more user-friendly than other tools I have used. The data and evidence gathered from the penetration test scan is excellent. It shows any compromised accounts and devices, demonstrating exactly how The NodeZero Platform by Horizon3.ai executed the attack. This is considerably better than any other tools I have used. 

    The NodeZero Platform by Horizon3.ai incorporates technologies that go beyond traditional testing and scanning methods for vulnerabilities, such as Nessus, Qualys, and Rapid7. While those tools focus on finding vulnerabilities, The NodeZero Platform by Horizon3.ai not only finds the vulnerabilities but also attempts to exploit them, gathers available evidence, and provides possible ways to fix them. This is one of the greatest features of The NodeZero Platform by Horizon3.ai.

    When we run the penetration test scans, The NodeZero Platform by Horizon3.ai definitely identifies all negative points and the external attack surface related to them, showing what those external attack surfaces are and how we could fix them.

    What needs improvement?

    I feel there could be improvements in scalability, although at this point I have no specific negative points to report.

    For how long have I used the solution?

    I have used the NodeZero Platform by Horizon3.ai for approximately eight or nine months.

    Buyer's Guide
    The NodeZero Platform by Horizon3.ai
    March 2026
    Learn what your peers think about The NodeZero Platform by Horizon3.ai. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
    885,444 professionals have used our research since 2012.

    How are customer service and support?

    The customer support is fantastic. I personally reached out to them, and The NodeZero Platform by Horizon3.ai provides sufficient evidence needed to understand the attacks it attempted, gathering relevant information regarding compromised accounts.

    Which solution did I use previously and why did I switch?

    For automated scans, I have not used any other tools apart from manual scanning. I have been using The NodeZero Platform by Horizon3.ai for the first time, and it feels good and easy to work with.

    What was our ROI?

    I do not know exactly in terms of the client because I work for the client, but personally I feel the remediation time is significantly reduced compared to what we used to do with manual testing. I would estimate approximately thirty to forty percent reduction.

    What's my experience with pricing, setup cost, and licensing?

    The NodeZero Platform by Horizon3.ai is better than manual penetration test scans. Usually, manual penetration test scans take considerable time and money, but I believe The NodeZero Platform by Horizon3.ai is definitely worth trying if you are considering using it, because it reduces the time and cost associated with manual scans.

    I do not have detailed knowledge about specific costs, but I definitely feel that investing in manual penetration test scans is much higher than the automated scans of The NodeZero Platform by Horizon3.ai. Although I have no idea about the exact cost difference, I definitely believe there is a significant difference in favor of The NodeZero Platform by Horizon3.ai in terms of lower cost.

    What other advice do I have?

    Regarding deployment, it is quite easy if you are talking about the cloud environment and configuring the scan. I do not find it too complex. The setup should be very quick, almost instantaneous, comparable to logging into any other portal.

    The NodeZero Platform by Horizon3.ai offers options in both directions, but I personally used it in a cloud environment, and I feel it is much easier than an on-premises environment. It is easy to install, but it takes a little bit of time. Once you log in and share your targets, you can configure your scan and run it, making it much easier overall.

    I would certainly recommend The NodeZero Platform by Horizon3.ai to others. I am sure they would appreciate how it presents the data and reports. It does not just provide a technical report; it presents multiple reports of various attacks that may be useful for management who might not understand technical terms. It definitely helps to have those kinds of reports as well, allowing anyone to understand what is happening in the environment and what can be done about it.

    Based on my work experience over seven to eight months of using The NodeZero Platform by Horizon3.ai, I am still learning more about the product, and there is much more to explore. I would give this product a rating of eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer. partner
    Last updated: Mar 27, 2026
    Flag as inappropriate
    PeerSpot user
    Principal Consultant at JTI Cybersecurity
    Consultant
    Top 20
    Oct 21, 2025
    Has allowed me to increase testing coverage and focus on remediation by automating repetitive tasks
    Pros and Cons
    • "My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise—it can be set and forgotten while it performs its tasks, and it does exactly what it claims to do."
    • "They've added a chatbot which isn't particularly useful, but when it can't answer questions, it forwards messages to human support."

    What is our primary use case?

    I use The NodeZero Platform as a consultant on penetration testing engagements for various customers. This might be different than some of their more common use cases where companies use it internally. The primary use case is for penetration testing engagements, and the main driver for having The NodeZero Platform is that it's a force multiplier for me as an individual to perform more penetration testing without additional human resources.

    What is most valuable?

    My favorite feature about The NodeZero Platform is that it's autonomous, and it truly delivers on that promise. It can be set and forgotten while it performs its tasks. It does exactly what it claims to do.

    What needs improvement?

    I started with The NodeZero Platform when it was less mature. Anytime I encountered something annoying or identified a gap that needed attention, they had already fixed or added it by the time I would have requested it. The product is being rapidly developed at this stage. There really isn't anything feature-wise that I would request or change because it's a good product. It does what it claims and excels at finding issues and covering large environments so humans don't have to perform repetitive tasks for extended periods. This allows us to focus on what's important: fixing and protecting systems. If there was one thing I would change, I would want their consulting licensing to return to being unlimited.

    For how long have I used the solution?

    I have been using The NodeZero Platform for four years this month.

    What do I think about the stability of the solution?

    In the early stages, I experienced issues with large penetration tests where things might get delayed or require intervention, but I cannot remember the last time that occurred. While one of their main selling points is that it's safe to run in production, we might still try to avoid unnecessary risk. For companies operating during normal business hours, we might conduct penetration testing at night. When using SaaS-based products at night, maintenance windows can cause downtime, but I haven't encountered any of these issues with The NodeZero Platform. I cannot recall any instances of downtime or the platform being offline.

    What do I think about the scalability of the solution?

    I have used it for tests ranging from tens to thousands to tens of thousands of assets, and I haven't encountered any trouble scaling. While I wouldn't say it's infinitely scalable, it certainly handles scaling effectively.

    How are customer service and support?

    The support currently is really good. When I have questions or concerns, I receive responses promptly. They've added a chatbot which isn't particularly useful, but when it can't answer questions, it forwards messages to human support. I typically receive human responses within 12 hours, usually the same day or next day. Previously, with time-sensitive engagements, I would worry about resolving issues before deadlines. That concern has diminished as they've become more responsive and require less escalation to engineering. Support cases are now handled more efficiently, either by directing to documentation or providing workarounds for project completion.

    How was the initial setup?

    The setup process is extremely straightforward. It has become even easier with the addition of Runners feature, which allows for automatic setup of repeated tests throughout the year. The initial setup takes approximately 30 minutes, mostly spent reading documentation, as the process is primarily point-and-click.

    Which other solutions did I evaluate?

    I have used three alternatives: Pentera, Core Impact, and Metasploit Professional. Core Impact and Metasploit Professional aren't direct competitors as they are penetration testing toolkits with built-in automation. Pentera markets itself similarly to The NodeZero Platform. Compared to Pentera, The NodeZero Platform requires less setup and delivers higher quality results. Pentera follows a consistent pattern of running vulnerability scans and attempting exploits, producing results similar to vulnerability scans. The NodeZero Platform varies its approach and continues exploring potential vulnerabilities more thoroughly, similar to a real threat actor.

    What other advice do I have?

    The NodeZero Platform has helped identify vulnerabilities with on-premises systems effectively. They handle all technical aspects internally. I have given The NodeZero Platform a rating of 9 out of 10.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
    Last updated: Oct 21, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    The NodeZero Platform by Horizon3.ai
    March 2026
    Learn what your peers think about The NodeZero Platform by Horizon3.ai. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
    885,444 professionals have used our research since 2012.
    Mike Bulyk - PeerSpot reviewer
    Senior Director IT Security at a wellness & fitness company with 1,001-5,000 employees
    Real User
    Top 5Leaderboard
    Oct 8, 2025
    Has provided deep visibility into offensive tooling and improved trust through transparent command execution
    Pros and Cons
    • "The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio."
    • "The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools that would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning since the process is currently manual."

    What is our primary use case?

    My use cases for The NodeZero Platform involve using the tool as a validation tool on top of existing vulnerability management processes. The general idea is that if I identify a subset of vulnerabilities that might be of interest to an attacker, I use The NodeZero Platform to validate my assumptions. Essentially, I'm using it as a red team validation tool to test and validate blue team findings.

    What is most valuable?

    The NodeZero Platform's real attack capabilities help identify vulnerabilities on my on-premise systems by adding an element of validation and offensive security testing on top of known vulnerabilities. That's the main use case and the consistent configuration purpose.

    The feature that allows security teams to fix and retest vulnerabilities instantly is very useful, even though it may not happen literally 'instantly.' It's a necessary tool for any organization to understand whether vulnerabilities are genuinely exploitable by attackers. With its near-real-time testing capabilities, it's an essential part of any security portfolio.

    The Endpoint Security Effectiveness feature impacts my understanding of potential security threats by providing validation through endpoint testing. The NodeZero Platform deploys a script to verify whether endpoint protection tools such as EDR or EPP can detect and prevent attacks. This validation ensures that endpoint protection is configured correctly, revealing that default settings often don't work as expected. This makes the feature unique, as no other vendor seems to offer such validation capabilities.

    What needs improvement?

    The areas for improvement for The NodeZero Platform involve integration and automation. It would be beneficial if it could integrate directly with vulnerability management tools such as Rapid7, Tenable, or Qualys. Such integration would allow the platform to automatically import data, identify vulnerable systems, and test targets immediately, potentially even enabling automated feedback loops for rescanning. Currently, this process is manual. Native API-based integration would make the workflow far more efficient.

    For how long have I used the solution?

    I have been using The NodeZero Platform in my career for about two and a half years, and I think it's coming up on the third year.

    What do I think about the stability of the solution?

    My thoughts about the stability of The NodeZero Platform are that it's not an issue in production. During initial testing in a VirtualBox virtual machine, it was less stable due to insufficient resources. The system requires fast SSD storage, at least 16 GB of RAM, and a 1G network interface. Once properly provisioned, it runs stably without issues.

    What do I think about the scalability of the solution?

    The scalability of The NodeZero Platform is limited by our license to 1,000 IPs, so my experience beyond that is limited. However, we successfully tested multiple NodeZero scanners running concurrently without any concerns. The system scales well within the licensed range.

    How are customer service and support?

    I have contacted The NodeZero Platform's technical support once in two and a half years. The issue was related to the reporting process getting stuck during telemetry capture and report generation. The support team resolved it quickly by restarting the process. I rate the support experience as 10 out of 10.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial deployment of The NodeZero Platform has two components: external and internal. For the external scanner, which uses AWS hosting, setup takes just minutes once the cloud space is provisioned. The tool performs domain and IP validation (whois, DNS lookup, etc.) before allowing scans, which can take up to 24 hours.

    For internal deployment, it depends on corporate practices. Our process took about two weeks due to our sprint cycle and change management procedures. For larger or more complex network environments, deployment may take longer. Ideally, a NodeZero scanner should be positioned in each segmented subnet for full coverage.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing for The NodeZero Platform, I can say it's reasonable and the vendor is flexible. When discussing licensing, they were initially limited to 10,000 IPs, but agreed to let us target 1,000 IPs instead. That flexibility allowed us to use the tool effectively despite a smaller license count. While managing subsets of IPs introduces some overhead, the flexibility and support make the pricing worthwhile.

    What other advice do I have?

    The NodeZero Platform requires minimal maintenance. The NodeZero scanner is a small Linux wrapper with scripts that need occasional package updates. Although it auto-updates before scans, it's safer to manually update dependencies beforehand to prevent issues during testing.

    Overall, I think The NodeZero Platform is a necessity in any security portfolio. With 15 years in the industry, I see it as an essential tool for organizations of any size to determine whether vulnerabilities are truly exploitable. The product works well, is stable, and provides unique validation capabilities. I would rate it a 10 out of 10 for everything.

    I am a customer of The NodeZero Platform.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Last updated: Oct 8, 2025
    Flag as inappropriate
    PeerSpot user
    Brian Burnett - PeerSpot reviewer
    Director of Enterprise Security at a energy/utilities company with 51-200 employees
    Real User
    Top 20
    Oct 31, 2025
    Has improved internal and co-op security validation through detailed reporting and continuous vulnerability detection
    Pros and Cons
    • "After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify."
    • "The speed of the scans takes some time, but in my opinion, it is not surprising for what it is doing."

    What is our primary use case?

    The NodeZero Platform is used internally every month, aligned with the patch cycle, to run the pen test and validate the patching that was done previously and find anything new in the environment. It is run at least monthly, and if something else comes up, it is run between those times. Additionally, The NodeZero Platform is used to perform pen testing for co-ops. Since some internet infrastructure is shared with co-ops, the platform can be deployed and a virtual machine can be spun up in their environment. They provide IP ranges, the pen test is deployed, the report comes back, and it is shared with them. This has been a great capability to provide to co-ops.

    What is most valuable?

    My favorite feature of The NodeZero Platform is that all of it has been really good. The reporting piece is very clear and very useful, which was a big piece from the start. The reporting is huge, and the fact that it learns the environment on an ongoing basis is impressive. An external third-party pen tester is brought in every two years, and the plan is to move it to every three years. After the third party conducts the pen test, The NodeZero Platform is run, and it finds the same things they found and sometimes a few other things that they did not even identify. It has stood up against that test every time.

    The feature that allows security teams to fix and retest vulnerabilities instantly adds a lot of quick mitigation and the ability to fix issues on the fly. Everything that has been added and modified and improved since acquiring the tool has worked seamlessly.

    The Real Attack Capabilities help in identifying vulnerabilities in on-premises systems because if patching was missed, it will identify that. With deployment across the system, any recent vulnerability will be found. The way it learns the environment makes it an easy-to-use tool. It does what it says it is going to do, which is finding vulnerabilities as they appear.

    The Endpoint Security Effectiveness feature helps in understanding potential security threats better because everything that it identifies improves things on an ongoing basis. It ensures that everything is kept current, so it adds an extra layer to what is being done with the main EDR solution.

    What needs improvement?

    The speed of the scans takes some time, but in my opinion, it is not surprising for what it is doing. It could be a little quicker, but speed does not necessarily mean it is going to be better, since speed does not equate to doing what it needs to do.

    For how long have I used the solution?

    The NodeZero Platform has been used for about close to four years.

    What do I think about the stability of the solution?

    Regarding stability, it has never crashed, and there has not been any lagging from deployment or running. It is sometimes run randomly to see if managed service personnel will get alerted, and it has performed as expected. There has not been anything with lag or alerts, it has not crashed, and it has not caused issues.

    What do I think about the scalability of the solution?

    The scalability of The NodeZero Platform has been great because it is offered out to the 26 co-ops that are worked with, and over half of those have had it run on their environment, and it has worked out great.

    How are customer service and support?

    Technical support has never been contacted because there have never been any issues that required reaching out to them.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    There have not been any alternatives encountered that can be compared with The NodeZero Platform. After conversations with people and they have looked at it, nothing has stood out as being worth even trying to test. There is nothing that compares to it from everything that has been seen.

    How was the initial setup?

    The initial deployment of The NodeZero Platform was easy, from what is remembered, as that was about four years ago.

    What about the implementation team?

    The networking team was involved in this type of job, and it was probably just one of the networking team members and a senior engineer.

    What was our ROI?

    A reduction in remediation time has been seen because it is finding things before they happen. Much time is not being spent on remediation since acquiring it because it is finding things before they become an issue. Even if there is a zero-day and patching is done and then run, it verifies that, so it is preventing a lot of remediation time with anything.

    What's my experience with pricing, setup cost, and licensing?

    The pricing has been good, as it has not made huge leaps. Contracts and renewals are handled, so the changes have not been astronomical. It has stayed typically below what was expected for the changes as contracts are renewed, so it has all been fine.

    What other advice do I have?

    The overall rating given to The NodeZero Platform is ten out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Last updated: Oct 31, 2025
    Flag as inappropriate
    PeerSpot user
    reviewer2761140 - PeerSpot reviewer
    Works at a hospitality company with 201-500 employees
    Real User
    Top 20
    Oct 2, 2025
    Streamlines vulnerability validation through automation and also tells us how to resolve issues
    Pros and Cons
    • "The NodeZero Platform is amazing; what I love most about it is that it's automated and comparable to the manual pen testing we did with a third-party company, but with the added benefit of unlimited retesting to validate fixes."
    • "You need to be cautious about what it scans, as it could potentially cause issues."

    How has it helped my organization?

    The NodeZero Platform has been instrumental in identifying vulnerabilities across our entire network. Its automated scanning capabilities provide detailed insights and alert me to issues, which is exactly what we need from a security tool.

    The interface is intuitive and easy to use, and the reporting features are excellent—offering both high-level executive summaries and in-depth technical reports. What stands out is that it not only tells you what's wrong but also explains how to fix it, complete with step-by-step instructions and the exact commands it used during the scan. This transparency is incredibly helpful, especially when validating fixes.

    Even when vulnerabilities are detected, they may not always be exploitable in our specific environment. But knowing what's there—and having guidance on remediation—lets me act confidently. I use FortiClient and patch regularly, but NodeZero adds an extra layer of assurance by catching things that might slip through. I don’t have the budget for a dozen expensive tools, but with NodeZero, I get significant value without overspending.

    What is most valuable?

    The automation is by far the most valuable feature. NodeZero performs tasks comparable to what we used to get from a manual penetration testing firm—at a similar or even lower cost. The big difference? I can retest whenever I want, without waiting weeks or paying extra fees.

    IT environments are dynamic, and things change quickly. In one case, I assumed a group policy was fixing an SMB issue across the network, but NodeZero revealed a few devices were still vulnerable. That allowed us to go back, identify the gap, and validate the fix—all using the platform.

    The learning curve was minimal. Setup took just a couple of hours at most. Once installed, I simply choose the endpoints and let it run. There are safety warnings for potentially disruptive scans, which I appreciate—it helps prevent unintended issues like system crashes.

    What needs improvement?

    As someone who isn’t a dedicated security engineer, I find the platform comprehensive. However, I’d benefit from additional training on specific features, like their honeypot and tripwire system. Deeper education on these would help me take fuller advantage of the tool.


    For how long have I used the solution?

    I’ve been using NodeZero for one year.

    What do I think about the stability of the solution?

    The platform has been stable overall. It did crash our phone system once, but that was due to a Mitel vulnerability—not NodeZero itself. That incident actually led us to strengthen our firewall rules by eliminating “any-any” configurations and narrowing down allowed ports.

    What do I think about the scalability of the solution?

    NodeZero is highly scalable. I have around 1,000 public IPs and about 20 internal VLANs that can be scanned. The IP-based pricing can add up, but it’s manageable and worth the investment.

    Scheduling scans is simple. I run external tests every Saturday at 3:30 AM and receive detailed notifications about any issues. It gives me confidence knowing the system is being continuously evaluated.

    How are customer service and support?

    Customer support has been excellent. The team is responsive, knowledgeable, and eager to walk me through any questions or features. I’d give them a perfect 10 out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Before NodeZero, I relied solely on manual penetration testing. The switch was driven by the need for more frequent, flexible, and cost-effective testing.

    How was the initial setup?

    Initial setup was straightforward. I downloaded an OVA file, deployed it in Hyper-V, powered it on, and used a few simple CLI commands via SSH. Monthly maintenance is easy too—just a quick update command and it's done in seconds.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is competitive and aligns with what I paid for manual testing—but with more flexibility. Traditional pen tests usually limit you to a few subnets, while NodeZero lets me scan a much broader range without added cost.

    What other advice do I have?

    I’d rate the NodeZero Platform a 10 out of 10. It’s a powerful, cost-effective, and reliable tool that gives me peace of mind in maintaining a secure IT environment.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Last updated: Oct 2, 2025
    Flag as inappropriate
    PeerSpot user
    Timothy Rice - PeerSpot reviewer
    Chief Information Security Officer at a construction company with 1,001-5,000 employees
    Real User
    Top 5Leaderboard
    Oct 22, 2025
    One-click re-testing has validated remediations and improved threat visibility
    Pros and Cons
    • "The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems."
    • "I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good."

    What is our primary use case?

    We use The NodeZero Platform for control validation and we are also looking for the likelihood of vulnerabilities.

    What is most valuable?

    I think the one-click feature to fix and re-test vulnerabilities is great. This feature allows us to validate whether the remediation actually resolved the issue. It's pretty easy. You click it and it starts scanning. This is super helpful. I don't think anybody else has anything like that.

    The NodeZero Platform's real attack capabilities help in identifying vulnerabilities on our on-prem systems because it provides actual vulnerabilities by attacking our systems. It shows us whether it really was able to do or meet the objectives that a threat actor could do. It really helps identify the likelihood instead of simply indicating a potential vulnerability.

    The NodeZero Platform impacts my understanding of potential security threats in an eye-opening way. It provides validation of the actual security flaw, and it also provides remediation steps. Usually, it's an article that's written up, but it also shows proof as well.

    I haven't seen much of an impact on my remediation time from using The NodeZero Platform. I think what it does is it justifies a vulnerable aspect. For the most part, it does speed up remediation because we have proof that there is a vulnerability. We classify those vulnerabilities as a POF or a Pants on Fire and they have to be remediated within 72 hours. It does help remediate.

    What needs improvement?

    I think The NodeZero Platform could improve by leveraging GPUs for password cracking, which would be pretty good.

    For how long have I used the solution?

    I have used the solution for about two and a half years.

    What do I think about the stability of the solution?

    I haven't seen any stability issues such as crashing, lagging, or downtime. I have seen that their portal has been inaccessible for probably about 30 minutes one time.

    What do I think about the scalability of the solution?

    The NodeZero Platform is very scalable.

    How are customer service and support?

    I have never had to contact their technical support or customer support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We've used Pantera, Symptom and Attack IQ.

    How was the initial setup?

    The initial deployment was so easy. It only took us about five minutes.

    What's my experience with pricing, setup cost, and licensing?

    I think the pricing could be a little bit more competitive. For example, Centerra had a little bit more flexible pricing than NodeZero.

    Which other solutions did I evaluate?

    I would say Pentera is the closest competitor to The NodeZero Platform. When I compare them, I think the flexibility of scanning is where Horizon 3 edges Pentera. Pentera does a better job at cracking passwords, but deploying remote nodes is very difficult. It's kind of convoluted, so it makes it difficult to operate. The NodeZero Platform's pricing is competitive. I think it could be a little bit more competitive. For example, Pentera had a little bit more flexible pricing than The NodeZero Platform.

    What other advice do I have?

    Based on everything we've looked at and used in the past, I would rate The NodeZero Platform a 10 out of 10 as they are the best.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Last updated: Oct 22, 2025
    Flag as inappropriate
    PeerSpot user
    CEO at cybovate
    Real User
    Top 5
    May 6, 2025
    Deploying autonomous security tools improves network protection and efficiency
    Pros and Cons
    • "I rate the stability of the NodeZero Platform a ten out of ten."
    • "One of the areas where improvement is needed is in the visibility and reporting for large enterprises."

    What is our primary use case?

    The primary use case for the NodeZero Platform is as an extension to existing vulnerability management systems. Initially, it complemented solutions like Qualys or Tenable. However, there has been a shift towards using NodeZero to replace existing vulnerability management solutions altogether. The motivations include cost savings and addressing issues that traditional vulnerability managers might report but do not actually affect system security.

    What is most valuable?

    Deploying the NodeZero Platform is straightforward for me as it involves just a Docker container in a network or a network segment, saving time and eliminating the need for agents on every endpoint. Its autonomous operation, safe for production use, makes it practical to schedule pen tests during business hours. The tripwires feature acts like a honeypot, providing network alerts for potential threats. These factors make it an effective tool for enhancing security in organizations.

    What needs improvement?

    One of the areas where improvement is needed is in the visibility and reporting for large enterprises. The existing GUI or NodeZero insights provide better visibility, but there's still room for enhancement. Moreover, there is a need to automate interactions with other systems, particularly in triggering or opening tickets in ServiceNow. Adding the application layer would also be valuable for clients.

    For how long have I used the solution?

    I have used the solution for 1.5 years.

    What was my experience with deployment of the solution?

    No issues were encountered in deploying the NodeZero Platform. Once the firewalls are open and communication with the cloud is enabled, it's a matter of installing a Docker container or VMware and opening the ports for smooth operation.

    What do I think about the stability of the solution?

    I rate the stability of the NodeZero Platform a ten out of ten. We have not encountered any issues on the platform regarding accessibility, performance, or stability.

    What do I think about the scalability of the solution?

    I rate the scalability of the NodeZero Platform a ten out of ten. We have conducted pen tests in environments with hundreds of thousands of IP addresses without any scalability issues. The platform is built for large scale deployment and operation.

    How are customer service and support?

    I rate their support an eight out of ten. The support is skilled and effective, although there are sometimes delays due to bandwidth issues, possibly due to the size of the team.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Initially, NodeZero and similar solutions were used alongside existing vulnerability management solutions like Qualys or Tenable. However, there has been a shift towards replacing these existing solutions as businesses seek to address vulnerability issues more efficiently.

    How was the initial setup?

    The initial setup is very easy, rated 10 out of 10. It involves straightforward steps of installing a Docker container, configuring firewalls, and ensuring communication with the cloud.

    What about the implementation team?

    The deployment process involves an initial meeting with the client to choose the deployment method—either on a VMware or Docker container. This is followed by defining and setting up firewall rules. After preparing everything, deploying the Docker container or VMware takes a few minutes, and the pen test can begin.

    What's my experience with pricing, setup cost, and licensing?

    I rate the pricing a six out of ten. Pricing is moderate compared to competitors but depends on the solutions in comparison. While cheaper than XM Cyber and human pen testers, it's more expensive than vulnerability managers.

    Which other solutions did I evaluate?

    I evaluated Pentera and XM Cyber alongside the NodeZero Platform at various points. Pentera was assessed about two years ago, and we have clients currently using XM Cyber.

    What other advice do I have?

    I rate the NodeZero Platform an eight out of ten. The platform is scalable and stable, suitable for large enterprises and businesses. It needs improvement in areas like visibility, reporting, and automation with third-party systems. The overall product rating is eight.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
    PeerSpot user
    Shankar V. - PeerSpot reviewer
    Assistant Vice President at a tech services company with 1,001-5,000 employees
    Reseller
    Top 20
    Mar 18, 2026
    Integrated security platform has unified monitoring and continuously finds critical vulnerabilities
    Pros and Cons
    • "What I appreciate the most about The NodeZero Platform by Horizon3.ai is its distinctive competitive advantage, which is the ability to bundle multiple security solutions into one single tool."
    • "The downsides of The NodeZero Platform by Horizon3.ai are that it is an expensive tool; it is a very expensive tool."

    What is our primary use case?

    The use cases for The NodeZero Platform by Horizon3.ai include Attack Surface Monitoring primarily, followed by third-party risk management and Attack Surface Management, as well as social media monitoring. These are probably the three biggest use cases.

    What is most valuable?

    What I appreciate the most about The NodeZero Platform by Horizon3.ai is its distinctive competitive advantage, which is the ability to bundle multiple security solutions into one single tool. While there is competition, there is nothing quite like The NodeZero Platform by Horizon3.ai at the moment, at least to my knowledge. That is the biggest USP.

    Otherwise, it is a question of time. If you benchmark a pure play Attack Surface Management tool alongside The NodeZero Platform by Horizon3.ai, then sometimes The NodeZero Platform by Horizon3.ai may do a better job, whereas sometimes the other tool might do a better job. It is a question of always catching up, much as the different AI models evolve. At some point, ChatGPT was super good, then suddenly it became Gemini and today it is flawed. Competition is constantly ongoing. However, the area where The NodeZero Platform by Horizon3.ai has done pretty well is to build multiple tools and stack them into one single solution, and that is something which competition has not really done. I have no answers to why, but that is the biggest thing with The NodeZero Platform by Horizon3.ai.

    The feature that allows security teams to fix and retest vulnerabilities instantly is part of the Attack Surface Management functionality of The NodeZero Platform by Horizon3.ai. The whole idea of ASM is continuous monitoring of vulnerabilities, so the minute you actually fix it and you say that it is fixed, it will go back and check against the same particular use case. That is the functionality being discussed.

    What needs improvement?

    The downsides of The NodeZero Platform by Horizon3.ai are that it is an expensive tool; it is a very expensive tool.

    Since The NodeZero Platform by Horizon3.ai is integrated, for people who are not looking for everything but just one particular functionality, compared to any other tool, The NodeZero Platform by Horizon3.ai tends to be a little more expensive.

    For how long have I used the solution?

    I have probably been working on it for a year.

    What do I think about the stability of the solution?

    In terms of stability, I have not seen any issues with The NodeZero Platform by Horizon3.ai; I have not experienced lagging, crashing, or downtime.

    I do not know the underlying architecture of The NodeZero Platform by Horizon3.ai; it is a SaaS solution, and since it has not crashed ever, and it is not a business-critical application, it is not your ERP. So frankly, even if they did crash, it would be very hard to notice unless we really manage to try and use it at that time and we get caught. The whole idea of The NodeZero Platform by Horizon3.ai is to work in the shadows and just keep pushing alerts to you. You only log into the tool when you want to. The idea is it works behind the shadows; so even if there was a downtime of, for example, five minutes or ten minutes, it is not your ERP system and you will not really notice it.

    Which solution did I use previously and why did I switch?

    There is no single tool which can really say it has all the features that The NodeZero Platform by Horizon3.ai has. However, I have tried other tools which offer some parts of The NodeZero Platform by Horizon3.ai functionality. For example, I have used different third-party risk management tools, ASM tools such as SpyCompass, and IzoLogic for dark web monitoring and things of that nature, which are different tools, but they serve different areas; whereas The NodeZero Platform by Horizon3.ai is a combination of everything.

    How was the initial setup?

    The initial deployment of The NodeZero Platform by Horizon3.ai is absolutely straightforward and simple; all I need to do is request for an instance, specify these things, and there is nothing really to install apart from the agent server that I need to install. It is not a big deal.

    What other advice do I have?

    In terms of the platform's real attack capabilities, The NodeZero Platform by Horizon3.ai identifies vulnerabilities in my on-premises systems as good as any other vulnerability scanning solution that is out there. It does a very good job of finding real vulnerabilities and prioritizing them based on the criticality of the asset and contextualization of the organization's nature, which is very standard to any typical vulnerability scanning solution that is out there.

    For The NodeZero Platform by Horizon3.ai overall, I would rate it an eight out of ten, with ten being the highest and one being the lowest.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
    Last updated: Mar 18, 2026
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Download our free The NodeZero Platform by Horizon3.ai Report and get advice and tips from experienced pros sharing their opinions.
    Updated: March 2026
    Buyer's Guide
    Download our free The NodeZero Platform by Horizon3.ai Report and get advice and tips from experienced pros sharing their opinions.