Streamlines vulnerability validation through automation and also tells us how to resolve issues
How has it helped my organization?
The NodeZero Platform effectively scans the whole network to identify vulnerabilities. That is the purpose of the tool: to identify vulnerabilities and alert me about them.
I have no complaints about it; It's great. The GUI and interface are user-friendly and easy to understand. The reporting features are impressive, offering both executive-level summaries and detailed reports. It even tells you how to resolve issues, which is fantastic. Additionally, it provides the commands that were executed to identify the issues, so I can run those same commands if needed. The output clearly indicates what was found—proof is in the pudding, as they say. From that perspective, it's certainly a valuable tool.
It also outlines step-by-step instructions on how to fix problems, which can sometimes be challenging to research on your own. Having that information readily accessible with just a click is incredibly helpful.
I’m not sure if I've used NodeZero's endpoint security effectiveness feature yet; I mainly focus on scanning. However, I believe that being aware of any exploits it identifies helps me maintain the best possible security measures. I currently use FortiClient for vulnerability scanning, and we conduct regular patching. It's important to note that just because a vulnerability is found doesn’t necessarily mean it’s exploitable in our ecosystem. A combination of fixing vulnerabilities through patching and utilizing various software vendors, along with the knowledge that NodeZero has to identify as many exploits as possible, allows me to feel secure. It gives me peace of mind to know that I am as secure as I can be, given the resources and budget I have. I can’t invest a million dollars in ten different tools, but I can spend an appropriate amount based on my business needs to ensure we are as secure as possible.
What is most valuable?
The NodeZero Platform is amazing. What I love most about it is that it's automated. It's comparable to the manual pen testing that we did with a third-party company. I can quickly validate vulnerabilities or exploits that I've found. With the manual pen testing company, I pay about the same amount of money and they'll come back and they'll retest and that's it. If I didn't fix it or I find it again, I must ask how to get this retested. They're not going to do it unless they want to charge me a fee. With this tool, I can get comparable testing and I can go back an unlimited amount of time to see if I fixed it.
Networking, or the IT ecosystem, is a live environment. What I learned is when I thought the group policy was taking effect on my network and was remediating an SMB file, it was not. There were a few devices that didn't have it or didn't take it and they had exploits that were vulnerable. The NodeZero Platform found it. We went back and reviewed potential mistakes, so then we used the quick fix piece of it to validate the solution.
The learning curve was minimal. It didn't take long at all. It took maybe thirty minutes to an hour, or a couple of hours at most. You just set it up, choose the endpoint you want it to scan, and let it run. However, you need to be cautious about what it scans, as it could potentially cause issues. Fortunately, it has features that warn you, letting you know if a certain action might lead to a blue screen. It's best to avoid turning those options on.
What needs improvement?
I'm not a security engineer, so I don't know what might be missing. What they have is great and I use it. I could use more training on their honeypot. They have something called tripwires, and I'd benefit from better understanding more of the tripwires through additional training.
For how long have I used the solution?
I have been using The NodeZero Platform for one year.
What do I think about the stability of the solution?
The platform has shown excellent stability. It did crash my phone system when scanning it in the past, but this was related to the Mitel phone vendor rather than The NodeZero Platform. This issue led to strengthening our firewalls by removing any-any rules and implementing only required communication ports between networks.
What do I think about the scalability of the solution?
The NodeZero Platform is very scalable. I have approximately 1,000 public IPs and internally about 20 different VLANs that can be added to the scanner. Though it might be costly due to IP-based pricing, it's completely doable.
Scheduling is straightforward. I run external pen tests every Saturday morning at 3:30 AM and receive notifications about any weaknesses. It's nice to know that. It's awesome from that perspective.
How are customer service and support?
The quality of customer service is amazing. The support team is really helpful and will do everything possible to show and explain features. The support deserves a perfect ten out of ten score.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have only used manual pen testing before The NodeZero Platform.
How was the initial setup?
The initial setup was simple. It involved downloading an OVA file as a virtual machine file, putting it in Hyper-V, turning it on, and using a few simple CLI commands through SSH.
In terms of maintenance, I check in about once a month. I'll issue a quick command in the CLI to perform the update. It only takes a few seconds for it to download and complete the update automatically.
What's my experience with pricing, setup cost, and licensing?
I'm familiar with the pricing, and I believe it is competitive and in line with what I have paid for manual testing, specifically manual penetration testing. Actually, it's a bit cheaper than manual penetration testing because manual testing typically allows you to scan only a few subnets. With this option, I can select many more subnets.
What other advice do I have?
I would rate The NodeZero Platform a ten out of ten.
Provides a complete understanding of the attack chain along with clear and actionable reports
What is our primary use case?
We use The NodeZero Platform for its automated internal penetration testing and automated external penetration testing. We use both of them and drop tripwires in the same thing, and we also run rapid response. We don't have the highest level subscription, but we have access to a lot of it. I use it for segmentation testing. I use it to help validate vulnerabilities through vulnerability management because we use Rapid7 and CrowdStrike. I now have a three-way assessment of our vulnerabilities and which vulnerabilities actually matter. I assess the attack chain with it. We use a lot of the platform and leverage its true capabilities within our subscription.
How has it helped my organization?
It prevented an attack indirectly. We experienced a threat that could have severely crippled us, but we were able to shut it down before it escalated. This was possible because we had been conducting internal vulnerability testing and addressed some critical vulnerabilities using their tool. If we hadn’t done that, those vulnerabilities could have been exploited to incapacitate us. So, in real time, it protected us from a potentially crippling attack.
NodeZero's Endpoint Security Effectiveness feature significantly enhances our understanding of potential security threats. I previously used CrowdStrike and Rapid7 to identify vulnerabilities. Both highlight which vulnerabilities are exploitable using tools like Metasploit or are actively being leveraged by malicious actors. However, these tools don’t provide a complete understanding of the attack chain, which is where NodeZero excels. I encountered challenges with patch management, as we struggled to test and implement patches due to time constraints. This led to our patch management process being ineffective. After conducting an initial internal penetration test with The NodeZero Platform, we were able to clearly see the attack paths and identify critical vulnerabilities. Instead of facing a daunting list of 300 critical vulnerabilities, our team could now focus on just 30 key vulnerabilities that would effectively mitigate most of the attack vectors. As a result, we reduced our potential for significant attacks to a minimal level, thanks to NodeZero’s ability to highlight the critical pathways and prioritize the vulnerabilities that truly matter.
What is most valuable?
The NodeZero Platform is awesome. It's intuitive, easy on the eyes, and the platform and presentation are clean and crisp. The reports generated from internal or external penetration tests require little to no adjustment when I'm presenting to the C-suite. They need information that's quickly consumable so they can move on to the next task, and many other platforms just don't provide that. The reports from The NodeZero Platform deliver a clean export that can be easily copied and pasted onto a presentation. I can summarize everything in three PowerPoint slides, highlighting our current status, our goals, and what has been resolved, as well as what is still outstanding. This streamlined export is incredibly beneficial for the C-suite.
Moreover, the detailed reports not only list the vulnerabilities that matter, but they also include direct links to patches. This feature saves our team time, as we don't have to search for fixes for each vulnerability. We're a small team, servicing around 400 employees with just 12 IT personnel. So, having all vulnerabilities laid out with links to their respective fixes is immensely convenient.
This platform is truly exceptional for anyone involved in these types of scans, and I believe everyone should be conducting them regularly. With the ease of use in deploying both internal and external scan engines, even someone with minimal computer knowledge can operate it. This makes it accessible to all organizations, whether they are municipalities, government entities, or small local businesses. Being able to sign up with the company and start scanning, both internally and externally, within an hour is remarkable. You can even automate your scans on a monthly basis, along with scheduling hands-on keyboard penetration testing at least once a year. Human testers bring creativity that currently exceeds that of AI, so having that annual hands-on review is important. Many organizations neglect this practice, but the usability of this platform allows anyone to manage it. For example, my wife works as the mayor of our city, and our police chief is not very computer-savvy—he can barely open a Word document. As a test case, I plan to have him set it up to demonstrate its simplicity, as the city is considering adopting this platform. I want to see if he can manage the setup and launch, which would confirm that basic users with little computer experience can successfully execute it. Even my wife kicked off a scan and felt like a hacker, despite her limited technical skills. As someone who enjoys penetration testing and has a good amount of computer knowledge, I find using this platform not only efficient but also enjoyable.
What needs improvement?
Adding an OSINT tool would greatly improve their platform. One of the things that many vendors are pushing is identity protection, which scans the deep web for compromised credentials and identifies fake profiles of your company's leadership. Essentially, it provides an open-source intelligence view of what is happening out there and what has been compromised that attackers could potentially exploit. This service reveals which credentials and email addresses are available on the deep web, as well as which domains have been set up using typo-squatting techniques. It summarizes all this information and helps raise awareness among users. For example, if it detects that someone's credentials are exposed, it can prompt them to change their email address and passwords. If it identifies typo-squatting on certain domains, you can pass this information on to the vendors to have those domains taken down.
For how long have I used the solution?
I have been using The NodeZero Platform for approximately two years.
What do I think about the stability of the solution?
I have not experienced any issues with The NodeZero Platform on their end. Occasionally the runner gets delayed, but that's due to our misconfigurations or internal issues, not their machines.
What do I think about the scalability of the solution?
Scalability with The NodeZero Platform is straightforward. I deployed it across multiple systems - Graperoberts, Selmid, Sky Geek, and our DLC. It scales seamlessly. We currently scan approximately 1,500-2,000 assets and haven't encountered any scaling or throughput issues.
How are customer service and support?
The technical support for The NodeZero Platform is exceptional. On the federal side, response times are incredibly fast - typically within five to ten minutes, with a maximum wait time of 30 minutes. Their responsiveness is remarkable.
When we were attacked, our endpoint detection and response (EDR) system was slower to respond than they were. I contacted our EDR team immediately, informing them that we were under attack and that files were being compromised. I asked for guidance on what they were seeing on the back end.
Next, I reached out to the Horizon3 team, even though I acknowledged that this wasn’t their typical area of expertise. I explained the situation and asked for their thoughts on what the next phase of the attack might be, so we could start shutting things down. Remarkably, they replied within five to ten minutes, which was an hour faster than CrowdStrike responded. Even though it wasn't their specialty, they provided valuable advice on what we should do and how to execute our response. They are truly a solid team—ethical and highly competent.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We have used alternatives to The NodeZero Platform that we found through Coalition Control, our cyber insurance company. While the alternative conveyed similar information, it functioned more as a standard vulnerability scanner. What sets The NodeZero Platform apart is the presentation of findings, making it clear and easy to understand the attack chain. The alternative tool was essentially another vulnerability scanner that could check boxes for internal and external penetration testing but didn't provide the attack chain capabilities that The NodeZero Platform does.
How was the initial setup?
It's super easy. The setup takes about 30 minutes. It’s really quite simple. You log in, enter a couple of IP addresses, and hit “scan” for your external assets. I'd estimate that the external scan setup took around thirty minutes. The internal scan setup took a bit longer, probably about an hour before I could actually start scanning. I had to reach out to one of my developers, Jason, to assist because I couldn’t build it myself; I don’t have the necessary admin credentials as the InfoSec Manager. I asked Jason to create a virtual machine (VM) and install the tool for me, and after that, I was able to run it.
To summarize, it took about an hour from the time I requested help from Jason until I ran my first internal penetration test. So, we’re looking at 30 minutes for the external setup and an hour for the internal setup. However, keep in mind that we’re not a new operation—we have skilled personnel. If you're a small business that has never set up a VM before, it might take you two to three hours to follow the instructions. Unless you have a Horizon3 team member to guide you, it generally takes about an hour. Overall, it's very simple.
What other advice do I have?
It couldn't be better unless it fixed the vulnerabilities automatically. I've already communicated this to them, stating, "You need to fix them for me." They have seen the issues and have the link, so I just want them to apply the patch.
If I were to rate this solution on a scale from one to ten, it would definitely be a ten.
Effectively prioritizes vulnerabilities and has been one of the most transformative technologies
What is our primary use case?
The primary use case that we have for The NodeZero Platform is for scanning the environment and identifying vulnerabilities. The tool prioritizes vulnerabilities, focusing on the most critical ones.
How has it helped my organization?
It has evolved significantly over time. What sets this tool apart from others is its ability to prioritize vulnerabilities effectively. Many vulnerability management (VM) tools today provide users with extensive lists of vulnerabilities—often numbering in the thousands, with categories like four thousand critical and three thousand high. Upon deeper examination, it's common to find that more than half of those vulnerabilities aren't even exploitable. This results in overwhelming amounts of data without a clear focus on what needs immediate attention to improve security. In contrast, this tool excels at prioritizing vulnerabilities based on their relevance to attack scenarios. It analyzes specific attack chains to determine how critical each vulnerability is and assesses how frequently those vulnerabilities appear across various attack chains. By doing this, this tool can elevate the priority of certain vulnerabilities, allowing organizations to concentrate their remediation efforts on the most critical issues. A prime example of this effectiveness comes from an acquisition we conducted. The organization believed it had a robust security environment. However, after running The NodeZero Platform over a weekend, we discovered vulnerabilities that allowed for compromise in approximately 35 different ways. With other tools, addressing these vulnerabilities could have taken six to twelve months due to poor prioritization. In our case, we were able to eliminate the risk of domain compromise within one month and address all single-host vulnerabilities by the second month, all done with a small team, thanks to our precise focus on what truly mattered.
The solution’s feature that allows security teams to fix and re-test vulnerabilities instantly is fantastic. With traditional penetration tests conducted by a human, the process is very expensive. You typically get two weeks of testing, then you make your fixes, and sometimes you can get them to retest. However, often you have to pay extra, and sometimes you just don't have enough time. This results in going another year hoping or thinking that vulnerabilities are fixed, but they might not be. With Horizon3, you can immediately retest vulnerabilities, and it will clearly indicate whether or not they are still present. Probably 20 times in the last year or two, we were told something was fixed when it actually wasn’t. Sometimes it’s due to a patch not being applied correctly, or perhaps they missed adding a registry key. There could be various root causes. The ability to dig in with our team and confirm whether a vulnerability is resolved is crucial. They can go back and fix it, and sometimes that takes multiple attempts. So this functionality is really valuable.
The platform's real attack capabilities have massively helped in identifying vulnerabilities in our on-prem systems. The best litmus test I can give is that during our previous penetration tests, attackers would easily gain domain admin access. However, with Horizon3, we can prioritize vulnerabilities and address them effectively. We recently conducted our first penetration test where the testers were completely unable to gain domain admin access, which is impressive given that this was done by a well-known player in penetration testing.
In terms of NodeZero's Endpoint Security Effectiveness feature's impact on our understanding of potential security threats, looking at it from the endpoint perspective really helps us identify what needs to be done to address vulnerabilities. Once we know what those are, we can go in and fix them. It’s pretty cool.
What is most valuable?
Prioritization is really key; it's a massive differentiator. The prioritization aspect is crucial. The ability to capture or crack credentials and then use that to move laterally and identify additional vulnerabilities is significant. Their password-cracking capability is a distinct function that is very helpful.
Additionally, when a new vulnerability, such as a zero-day exploit, is identified, they review your previous scans to determine if you might be vulnerable to it, and they proactively notify you. That's a huge benefit.
Also, the fact that they provide fixes alongside all their identified vulnerabilities means you don’t have to search for fixes yourself. They give you specific actions to take, which is incredibly helpful and saves a lot of time.
What needs improvement?
One significant area to focus on is external vulnerabilities, particularly in the web application space. This often requires a greater level of human ingenuity, as it typically involves navigating a webpage, creating an account, and testing for various vulnerabilities, such as SQL injection. Adding this capability would be a valuable enhancement.
For how long have I used the solution?
I have been using The NodeZero Platform for approximately four to five years.
What do I think about the stability of the solution?
The only issue we’ve encountered is that sometimes the scans take a long time to complete. This happens when a credential is identified late in the scan, leading the system to attempt that credential on all the other hosts. As a result, the scans can run longer than expected and may even cause some memory issues. Fortunately, this is a relatively easy fix; you just need to increase the amount of memory on the server. Overall, it’s a minor issue.
What do I think about the scalability of the solution?
The NodeZero Platform has unbelievable scalability. The limiting factor is just where you have the hardware infrastructure to be able to add additional VMs. Anywhere you can put a VM, you can run another concurrent scan.
How are customer service and support?
I might sound like a fanboy, but I truly have about three and a half vendors that I really like. I'm generally tough on most of my other vendors, but these particular ones stand out because they are that good. From a tech support perspective, I would say they have some of the best support compared to any of the companies I work with. Microsoft, for example, is very hit or miss. Sometimes you get an excellent support representative, but I find that about 80% of the time, the person assisting you has no idea what they're doing. As for other decent options, CrowdStrike typically provides good support, but it seems like they focus more on managing tickets from an ITIL perspective, prioritizing the speed of ticket resolution over thoroughness. Zscaler is similar in that respect; They are better than Microsoft, but the quality of support can still be somewhat inconsistent.
Overall, when it comes to The NodeZero Platform's tech support, you can reach them via a chat message on their website, and they respond almost immediately. You're quickly connected with a very knowledgeable engineer, and you receive prompt responses. They are really good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We have used Nessus, Qualys, and Tenable as alternatives to The NodeZero Platform. We were paying for Tenable. We were paying for Qualys. We basically stopped and moved to Horizon3.
If you were looking for a super wide net of everything that you could possibly try and identify, I think the other ones might be more holistic, but their prioritization is lacking, leaving you less secure because they do not help you prioritize.
How was the initial setup?
It was super easy. From initially getting it set up to running it, it took about 24 hours. The biggest time requirement is actually getting a virtual machine (VM) stood up. If you can get a Linux VM set up, that’s the hardest part of the whole process. After that, it’s really easy.
From a maintenance perspective, in terms of keeping the system healthy and functional, there isn’t much that we need to do; it pretty much runs itself. However, where we do put in work is in reviewing the outputs and determining our priorities. We then collaborate with the rest of the team, particularly on the server side, to address vulnerabilities and other issues that arise. So, while there is work involved, it’s not about maintaining the Horizon3 product itself, but rather managing the findings that we need to fix.
The benefits of The NodeZero Platform are immediate. Just having access to a list of prioritized vulnerabilities and understanding how they were exploited in various attack chains was eye-opening. You might think you have a highly secure environment, but in reality, it can be compromised easily. This insight highlighted everything that needed improvement. Honestly, it's one of the most transformational technologies we've implemented in our company.
What's my experience with pricing, setup cost, and licensing?
They offer really fantastic pricing. We've been with them for a long time, so I believe we might have a special deal. However, from conversations with other peers, it seems their pricing is very competitive as well.
What other advice do I have?
I would rate The NodeZero Platform a 10 out of 10.
Deploying autonomous security tools improves network protection and efficiency
What is our primary use case?
The primary use case for the NodeZero Platform is as an extension to existing vulnerability management systems. Initially, it complemented solutions like Qualys or Tenable. However, there has been a shift towards using NodeZero to replace existing vulnerability management solutions altogether. The motivations include cost savings and addressing issues that traditional vulnerability managers might report but do not actually affect system security.
What is most valuable?
Deploying the NodeZero Platform is straightforward for me as it involves just a
Docker container in a network or a network segment, saving time and eliminating the need for agents on every endpoint. Its autonomous operation, safe for production use, makes it practical to schedule pen tests during business hours. The tripwires feature acts like a honeypot, providing network alerts for potential threats. These factors make it an effective tool for enhancing security in organizations.
What needs improvement?
One of the areas where improvement is needed is in the visibility and reporting for large enterprises. The existing GUI or NodeZero insights provide better visibility, but there's still room for enhancement. Moreover, there is a need to automate interactions with other systems, particularly in triggering or opening tickets in
ServiceNow. Adding the application layer would also be valuable for clients.
For how long have I used the solution?
I have used the solution for 1.5 years.
What was my experience with deployment of the solution?
No issues were encountered in deploying the NodeZero Platform. Once the firewalls are open and communication with the cloud is enabled, it's a matter of installing a
Docker container or VMware and opening the ports for smooth operation.
What do I think about the stability of the solution?
I rate the stability of the NodeZero Platform a ten out of ten. We have not encountered any issues on the platform regarding accessibility, performance, or stability.
What do I think about the scalability of the solution?
I rate the scalability of the NodeZero Platform a ten out of ten. We have conducted pen tests in environments with hundreds of thousands of IP addresses without any scalability issues. The platform is built for large scale deployment and operation.
How are customer service and support?
I rate their support an eight out of ten. The support is skilled and effective, although there are sometimes delays due to bandwidth issues, possibly due to the size of the team.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Initially, NodeZero and similar solutions were used alongside existing vulnerability management solutions like Qualys or Tenable. However, there has been a shift towards replacing these existing solutions as businesses seek to address vulnerability issues more efficiently.
How was the initial setup?
The initial setup is very easy, rated 10 out of 10. It involves straightforward steps of installing a Docker container, configuring firewalls, and ensuring communication with the cloud.
What about the implementation team?
The deployment process involves an initial meeting with the client to choose the deployment method—either on a VMware or Docker container. This is followed by defining and setting up firewall rules. After preparing everything, deploying the Docker container or VMware takes a few minutes, and the pen test can begin.
What's my experience with pricing, setup cost, and licensing?
I rate the pricing a six out of ten. Pricing is moderate compared to competitors but depends on the solutions in comparison. While cheaper than
XM Cyber and human pen testers, it's more expensive than vulnerability managers.
Which other solutions did I evaluate?
I evaluated
Pentera and
XM Cyber alongside the NodeZero Platform at various points.
Pentera was assessed about two years ago, and we have clients currently using XM Cyber.
What other advice do I have?
I rate the NodeZero Platform an eight out of ten. The platform is scalable and stable, suitable for large enterprises and businesses. It needs improvement in areas like visibility, reporting, and automation with third-party systems. The overall product rating is eight.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Penetration testing adapts to our schedule with cloud integration
What is our primary use case?
To meet standards, I am required to do penetration testing periodically. This is something I can do on-demand anytime I choose, or I can set it up to recur on a recurring schedule.
What is most valuable?
The NodeZero Platform has a great cost, and its usability is straightforward. It can be deployed in the cloud. There is an on-premise container that I need to spin up to allow it to run in my environment, but it is automatically updated because it is cloud-based. It uses AI to try and gain access to my network and learns from the environment as it goes, providing a report on vulnerabilities, and demonstrates how their system exploits them to either elevate privilege or gain access to specific credentials or devices.
What needs improvement?
I haven't really come across anything that I say needs to be improved with it, other than the container runner, which tends to lose time. It does not always sync with the cloud versions, so I have to do it manually.
For how long have I used the solution?
I have used the solution for over a year.
What do I think about the stability of the solution?
Initially, there were some devices that, when it scanned, it caused network issues. So I had to exclude those, but that was fairly simple to do.
How are customer service and support?
I reached out to support and they were very responsive. I would rate them a nine out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have reviewed other penetration testing solutions but haven't used them due to cost constraints, as they were really expensive compared to the NodeZero Platform.
How was the initial setup?
The initial setup was simple and easy to operate.
What's my experience with pricing, setup cost, and licensing?
The pricing is much more affordable than traditional penetration tests.
Which other solutions did I evaluate?
I have reviewed other penetration testing solutions but did not use any due to cost constraints.
What other advice do I have?
I would advise taking advantage of the support when you have it. For Horizon360 NodeZero, they are always responsive. Let them show you how to use it and the best way to get the most out of it. Overall, I'd rate NodeZero at nine to 9.5 out of ten.
Which deployment model are you using for this solution?
Public Cloud
Fast, Accurate and Affordable
What do you like best about the product?
Finding the misconfigurations that have been inherent to an environment for years. Finding weaknesses that I didn't realize were an issue. Finally the ability to be alerted by Rapid Response for existing new vulnerabilities that are exploitable.
What do you dislike about the product?
No downside. If there is one part that I would like more out of is the application testing (specifically on the external pentests)
What problems is the product solving and how is that benefiting you?
Securing environments by finding weaknesses that creat major gaps within. Also validating security tools.
Doesn’t identify threats and vulnerabilities, and the reports are quite useless
What is our primary use case?
The solution is used for penetration testing.
What is most valuable?
Penetration testing and scans are useful features. These features are the reason why we started using the product.
What needs improvement?
We run the penetration testing and look at the reports. The reports are quite useless. We are looking for a different product. The tool did not help enhance our organization's cybersecurity posture. The reports had a lot of false positives. They didn't detect anything. The tool didn’t identify any vulnerabilities. The solution must detect threats and vulnerabilities.
For how long have I used the solution?
I have been using the solution for about a year. I am using the latest version of the solution.
What do I think about the stability of the solution?
We didn’t have any issues with stability.
What do I think about the scalability of the solution?
We didn’t have any issues with scalability. We didn’t need it.
How are customer service and support?
My team interacts with the support team. I haven't heard any complaints.
How was the initial setup?
The solution is deployed on the cloud. The initial deployment was easy.
What was our ROI?
We haven’t seen a return on investment.
What other advice do I have?
We used another solution parallelly. We got help from a third-party vendor to do that. I will definitely not recommend the product to others. It was quite useless for us. It didn't give us any useful results. Overall, I rate the solution a one out of ten.