Skip to content

NodeZero® Portal

The NodeZero® Portal is your command center for autonomous penetration testing, empowering security teams, IT administrators, and DevOps professionals to enhance their organization’s security posture. This intuitive web UI enables you to launch and manage a variety of tests and assessments, including internal pentests, external evaluations, and cloud-focused scans. The portal integrates with key components like the NodeZero Host for internal testing, leverages NodeZero Runners for scheduling automation, and supports strategic deployment approaches—delivering real-time insights, actionable results, and comprehensive reporting to identify vulnerabilities and track remediation progress.

Essential Functions

  • Launch and manage tests and assessments (internal, external, OSINT-focused, and more)
  • Access comprehensive reports to plan and track remediation efforts
  • Monitor real-time progress of all pentests in a centralized interface
  • Manage user permissions, integrations, and system configurations
  • Integrate with NodeZero components for a complete testing solution
policy Tests and Assessments chevron_right
Explore available test types to assess your network’s security posture.
list Portal Features chevron_right
Discover additional capabilities and tools within the NodeZero Portal.
settings Portal Settings chevron_right
Configure user permissions, integrations, and system settings.

Critical Components

The NodeZero Portal relies on critial components to conduct tests and assessments.

  • The NodeZero Host is essential for internal pentests, enabling the Portal to assess your network from within.
  • The Host’s Runner automates these tests
  • And a well-planned Deployment Strategy ensures the Host is placed and configured to effectively identify vulnerabilities.
directions_run NodeZero Runner chevron_right
Optional
Enable NodeZero Host’s Runner to automate pentests from the Portal.
verified_user Deployment Strategy chevron_right
Plan your Host’s placement and intent to identify vulnerabilities.