Intelligent Waves and Horizon3.ai join forces to provide security for DoD mission support
Intelligent Waves will utilize Horizon3.ai’s NodeZero autonomous penetration testing platform to validate architecture deployments and ensure customer environments are secure and operationally ready for users. The partnership between IW and Horzon3.ai has enabled the mitigation and prevention of malicious actors trying to gain or deny access to critical networks that support Department of Defense missions.
The inclusion of NodeZero into Intelligent Waves’ DevOps pipeline has significantly reduced the overhead and decreased deployment validation time while simultaneously improving security insight into customer environments through continuous monitoring.
John Hammes, Chief Strategy Officer at Intelligent Waves, said, “Intelligent Waves is honored to include Horizon3.ai’s NodeZero into our ultra-secure tool suite for DevOps for special operations. In these challenging times, with rogue actors constantly on the prowl for vulnerabilities, this solution provides the warfighters with an effective, battle-tested solution.”
Horizon3.ai’s NodeZero acts as a force multiplier, helping preserve or increase margins by enabling Alliance Partners to cover more accounts with a smaller team. It continuously assesses an enterprise’s attack surface to identify ways a skilled attacker could chain together harvested credentials, misconfigurations, dangerous product defaults, and exploitable vulnerabilities to compromise systems and data. NodeZero quickly identifies exploitable attack vectors and ineffective security controls, so Alliance Partners’ resources are spent fixing what matters most.
“Threat actors create threat vectors that you never would imagine to be exploitable by chaining together network misconfigurations, vulnerabilities, harvested credentials, and dangerous product defaults,” said Snehal Antani, CEO and co-founder of Horizon3.ai. “Our partnership with Intelligent Waves allows us to provide APTaaS to customers, helping them understand their cybersecurity risk profile so they can harden their security postures with penetration tests that can be run as often as they want.”