We performed a comparison between Cato SASE Cloud Platform and Rapid7 Metasploit based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE)."The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The product is very simple, and everything can be done very quickly."
"The solution is a simple WAN solution. We've onboarded the socket on the Cato platform, and it provides connectivity. There is no complex routing."
"The most valuable feature is that it also works as a next-gen firewall because it has security features."
"It is a stable solution...it is a scalable solution."
"It's a pretty straightforward solution."
"We appreciate the optimization and acceleration of the performance of SDP users."
"The WAN aggregation feature is the most valuable."
"The query and the SD-WAN are useful features of the solution."
"It's not possible to do penetration testing without being very proficient in Metasploit."
"The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers."
"The most valuable features of the solution are the scripts, the modules, and the tools that the Rapid7 Metasploit framework has."
"All of the features are great."
"Stability-wise, I rate the solution a nine out of ten...Scalability-wise, I rate the solution a nine out of ten."
"I use Rapid7 Metasploit for payload generation and Post-Exploitation."
"Rapid7 Metasploit is a useful product."
"Technical support has been helpful and responsive."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"Cato Networks could improve their intrusion detection. There is not a lot in place."
"They should include a web application firewall feature in the solution."
"The tool needs to be more granular. Its reports are not very in-depth."
"We would like the product to continue to improve its security."
"The product must evolve into the endpoint domain."
"There's no principal in Malaysia, only a distributor."
"The solution could be made more user friendly for the administrator to use the portal. It is difficult to use it for people who are not experienced with Cato Networks."
"A little tweaking or improvement of the UI in terms of logging when troubleshooting would be an improvement because it's very detailed."
"At the time I was using it, the graphical user interface needed some improvements."
"Better automation capabilities would be an improvement."
"The solution should improve the responsiveness of its live technical support."
"There are numerous outdated exploits in their database that should be updated."
"I would like to see more capabilities, more functions, and more features. More types of attack vectors."
"It is necessary to add some training materials and a tutorial for beginners."
"Advanced Infrastructure should be implemented in the next release for better orchestration."
"We'd like them to offer better coverage of malware."
Cato SASE Cloud Platform is ranked 5th in Secure Access Service Edge (SASE) with 21 reviews while Rapid7 Metasploit is ranked 11th in Vulnerability Management with 18 reviews. Cato SASE Cloud Platform is rated 8.8, while Rapid7 Metasploit is rated 7.6. The top reviewer of Cato SASE Cloud Platform writes "Useful remote worker VPN, centralized management, and simple on-boarding process". On the other hand, the top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". Cato SASE Cloud Platform is most compared with Zscaler Zero Trust Exchange, Cisco SD-WAN, Prisma Access by Palo Alto Networks, Fortinet FortiGate and VMware SD-WAN, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Acunetix, Rapid7 InsightVM and Nucleus.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.