Skip to content
Penetration Testing
Pentest as a Service · powered by NodeZero · Horizon3.ai

Pentest as a Service with NodeZero

Continuous, autonomous attack simulation delivered as a managed service — together with our technology partner Horizon3.ai and their platform NodeZero. Real attack chains mapped to MITRE ATT&CK, startable on demand, production-safe and GDPR-compliant. Complementary to the classic pentest — not a replacement.

NodeZero Run #42

last 24h · hybrid scope

Completed
Hosts enumerated3,428
Attack paths discovered17
Critical paths3
High-risk paths6
Proof of exploitability12
1-click fix actions generated

What is Pentest as a Service?

PTaaS closes the gap between two annual pentests. Instead of a single snapshot, you get continuous, autonomous attack simulation against your production environment — driven and interpreted by SecTepe.

Continuous, not a snapshot

Regular runs surface drift, new exposures and regressions after releases immediately — instead of waiting for next year's pentest.

Autonomous attack chains

NodeZero combines vulnerabilities, misconfigurations and weak credentials into real attack paths — not just a list of single CVEs.

Production-safe & GDPR-compliant

Safe exploitation without DoS risk, no agents on endpoints, EU data handling and full logging of every action.

Our technology partner

Horizon3.ai & NodeZero

SecTepe delivers PTaaS as a managed service on top of NodeZero — the autonomous pentesting platform from Horizon3.ai. You get platform strength combined with the analysis, triage and remediation expertise of a German security team.

Horizon3.ai

Pioneer of autonomous pentesting, founded in 2019 by former US special operations and NSA security experts. The platform is used globally by Fortune-500 enterprises, government agencies and managed security providers to continuously put attack surfaces under pressure.

  • Founded by security practitioners with an offensive background
  • Specialised in autonomous attack simulation in real operations
  • Broad customer base across critical infrastructure, government and enterprise

NodeZero

Autonomous pentesting platform with a MITRE ATT&CK-based attack model. NodeZero maps your environment, looks for exploitable combinations of vulnerabilities and configurations, and rates every finding against a complete attack chain — instead of a pure CVSS list.

  • No permanent agent required on endpoints
  • External, internal and hybrid pentest runs
  • Cloud modules for AWS, Azure and M365 / Entra ID
  • 1-click fix actions with prioritised remediation playbooks

Horizon3.ai and NodeZero are trademarks of Horizon3.AI, Inc. SecTepe is an independent partner and does not act on behalf of Horizon3.ai.

What NodeZero delivers

Eight core capabilities that clearly set PTaaS apart from classic vulnerability scanning.

Autonomous Pentest Operations

Plans and executes attack chains autonomously — even across large, heterogeneous environments.

Exploitable Vulnerability Discovery

Shows what is actually exploitable — instead of just a raw CVSS list.

Full Attack-Chain Visualisation

Graphical chain from the entry point to domain admin or crown-jewel asset.

Credential Theft & Lateral Movement

Simulates credential theft, Kerberos attacks and lateral movement realistically.

Cloud Pentesting

Modules for AWS, Azure and Microsoft 365 / Entra ID including identity paths.

Phishing impact tests

Assesses the consequences of successful phishing without running a real employee campaign.

Continuous / on-demand runs

Startable on schedule or per click — before each release or after an incident.

1-click fix actions

Prioritised remediation playbooks with step-by-step guidance for Dev and Ops.

Our managed PTaaS process

Five clearly bounded steps — so PTaaS acts as a continuous security service, not just a tool.

1

Onboarding & scoping

Define crown jewels, environments, run frequency and rules of engagement together.

2

NodeZero setup

Tenant setup, runner deployment, integrations with AD, cloud accounts and ticketing.

3

Continuous pentesting

Automated runs on schedule or event — external, internal, cloud, hybrid.

4

Triage by SecTepe

Our analysts assess every finding in context, remove noise and prioritise.

5

Remediation & retest

Remediation guidance, retest after fix, trend reporting towards audit.

Classic pentest vs. PTaaS (NodeZero)

Both approaches complement each other — neither replaces the other. The table below lists the strengths per approach.

CriterionClassic pentestPTaaS with NodeZero
Methodologymanual, analyst-drivenautonomous, platform-driven
Frequencypoint in time (annual / release)continuous / on-demand
Business-logic flaws stronglimited
Environment coveragescope-limited very broad
Time to react to changesproject cadenceminutes to hours
Regulatory fitISO 27001, NIS2, TISAX, DORA (formal evidence)complementary evidence of continuous effectiveness
Typical valuedeep audit, logic risksdrift detection, release gating

Best practice: an annual manual pentest for depth and creativity plus ongoing PTaaS for breadth and timeliness.

Where PTaaS is particularly strong

Four scenarios where continuous, autonomous pentesting delivers the biggest leverage.

Mid-market under NIS2

Regular evidence of effectiveness between audits — without building your own red team.

Critical-infrastructure operators

Continuous attack-surface monitoring for regulated sectors (energy, healthcare, finance).

MSSP and SOC customers

Complements detection & response with proactive validation: does your SOC react to real attack paths?

DevOps & release-driven teams

Release gating inside CI/CD: no release without a green PTaaS run on the changed attack surface.

What you get out of every run

Every PTaaS run produces directly actionable results — for the C-level, for technical teams and for audit.

  • Executive summary

    C-level-ready summary with attack paths, risk score and progress over time.

  • Exploit evidence with attack chain

    Reproducible steps, screenshots and MITRE ATT&CK mapping for every finding.

  • Prioritised 1-click fix actions

    Remediation playbooks sorted by impact — Dev and Ops know immediately what to do first.

  • Trend reporting over time

    Continuous view: are attack surfaces shrinking, are risks staying open for long?

  • Compliance mapping

    Automatic mapping to ISO 27001 A.12.6, NIS2 risk management and DORA testing requirements.

  • SecTepe triage & remediation guidance

    Our analysts interpret findings, remove noise and accompany remediation including retest.

PTaaS Trend — Q1/2026

12 runs · hybrid scope

Attack paths at start42
Attack paths now9
Critical open1
High open3
Median fix time9 days
NIS2 mapping Art. 21 covered

Frequently asked questions about PTaaS

Answers to the most common questions about Pentest as a Service with NodeZero.

Does Pentest as a Service replace a classic penetration test?
No. PTaaS with NodeZero is a strong complement, not a replacement. The manual pentest remains essential for business-logic flaws, zero-days and creative attack paths. NodeZero fills the gap in between with continuous coverage: autonomous attack chains that make changes in your infrastructure immediately visible. For NIS2, ISO 27001 and DORA we recommend an annual manual pentest plus ongoing PTaaS runs.
Where does NodeZero run and how is data processed (GDPR)?
NodeZero runs as a SaaS platform at Horizon3.ai with an EU region option. Attack orchestration happens from there; the actual actions take place exclusively in your environment. SecTepe secures the GDPR-compliant framework — including DPA, scoping documentation and data minimisation. Sensitive findings are processed in our German data centres.
Is NodeZero safe for production?
Yes. NodeZero is explicitly designed for use in production environments ("safe exploitation") — no DoS, no destructive payloads, no agent installation on endpoints. Still, we agree time windows, scope and emergency communication with you before every run.
How often should PTaaS run?
Typically monthly to weekly runs for external attack surfaces, and event-based runs for internal environments (e.g. after major releases, cloud migrations, M&A integration). The biggest value emerges when PTaaS becomes part of your release and change process.
How is pricing structured?
We offer PTaaS as an annual subscription with a defined asset and run volume. The price includes onboarding, NodeZero licence, triage by SecTepe analysts, remediation guidance and retest after fixes. A transparent fixed-price model without hidden follow-up costs.
Which environments does NodeZero cover?
External attack surfaces (internet-exposed assets), internal networks including Active Directory, cloud (AWS, Azure, M365 / Entra ID) as well as hybrid scenarios. NodeZero additionally simulates phishing impact without the need for real employee campaigns.

Ready for continuous pentesting?

Start with a no-obligation NodeZero demo or a scoping call. We walk you through a live run against a demo environment — and show how PTaaS fits into your security operations.

How we work with you

We treat every engagement as a long-term partnership rather than a one-off delivery. Our approach is organised into four clear phases so that you always know what happens when, who owns which responsibility and which outcomes you can expect.

1. Free initial conversation

We learn about your starting position, your goals and the constraints you operate under. In 30 to 45 minutes we check whether our offering fits your situation, outline possible paths and answer your questions – no obligation attached.

2. Structured assessment

We capture the current state systematically – technically, organisationally and in regulatory terms. You receive a prioritised assessment that clearly names strengths, gaps and action areas and forms the basis for a robust offer.

3. Delivery with a dedicated lead

A senior lead guides you through the delivery with clear milestones, transparent effort and cost planning and a weekly status. All results are documented and remain fully owned by you.

4. Continuous operations & review

After project close, we stay alongside you in operations – via managed-service components, regular reviews, action tracking and proactive recommendations on new threats, regulatory changes or technology shifts.

Frequently asked questions about our services

The questions we are most often asked in first conversations – answered concisely. For anything else, our team is available at hello@sectepe.de or by phone at any time.

How do we start working with SecTepe?
All engagements start with a free initial conversation. You then receive an offer with a clear scope of effort, timeline and outcomes. On request we start with a small pilot to build trust and experience our delivery before moving into full implementation.
What company sizes and sectors do you support?
We work with small and mid-sized businesses as well as with corporate divisions and operators of critical infrastructure (KRITIS). Our core sectors are manufacturing, trades, healthcare, financial services, energy providers, public sector and the DACH mid-market.
Do you work on site, remotely or hybrid?
Both. Assessments, consulting and most managed services run remotely from our German data centres. For on-site work (workshops, training, incident response) we are primarily active in North Rhine-Westphalia, the Rhineland and the Ruhr area and extend our radius as needed.
Which standards and regulations do you cover?
We work to ISO 27001:2022, BSI IT-Grundschutz, TISAX, B3S KRITIS, NIS2, DORA and sector-specific requirements. Our methodology is grounded in recognised frameworks such as NIST CSF, MITRE ATT&CK, OWASP and OSSTMM, combined tailored to each project.
How do you protect the confidentiality of my data?
Confidentiality is anchored contractually and technically. Before every engagement we sign a mutual non-disclosure agreement, data is processed exclusively in German data centres, access is governed by zero-trust policies with multi-factor authentication, and all employees are contractually and GDPR-compliant bound to confidentiality.