We performed a comparison between Check Point CloudGuard CNAPP and Rapid7 Metasploit based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It presents great visibility of the traffic flow of our cloud, providing information on what data and users are circulating and in the event of a threat, it immediately identifies them by providing detailed and granular information from our entire environment."
"Helps identify and correct misconfigurations in cloud environments, ensuring that infrastructure and applications are secure and optimized."
"I love the work involved in maintaining and scaling security services and configurations across multiple public clouds using this solution, versus using native native cloud security controls. It is so much better. The different cloud platforms all have their own way that they handle a lot of the stuff that Dome9 handles. Even within their platform, they are in a lot of disparate places, e.g., in AWS, there are five different tools. You have to jump between them to get the same information that you can just pull in automatically on Dome9, which is just one platform. We are using multiple platforms, so that makes it even more complicated and time consuming if you had to just rely on them to get all of your information. Whereas, it's all just summarized and put together on the Dome9 end."
"The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring."
"Its monitoring and alerts are triggered by a failure or non-compliance with policies. It helps us to be able to act effectively and quickly."
"Dome9 continues to be a major piece of our cloud security architecture and has given our senior leadership team a high degree of confidence in our ability to protect our cloud environment."
"It presents a real-time database that is always updated."
"This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them."
"It allows us to concentrate solely on identified vulnerabilities without the hassle of additional setup."
"The most valuable feature for us is the support for testing Linux-based web server components."
"I don't have any other tools like it, and I always use it when I'm doing a pen test. Metasploit is a great solution for penetration testing,"
"I use Rapid7 Metasploit for payload generation and Post-Exploitation."
"Technical support has been helpful and responsive."
"The tool's most useful feature for penetration testing is its automation capabilities. With the professional edition, you can upload the results from Nessus in the Rapid7 Metasploit solution portal."
"The reporting on the solution is good."
"All of the features are great."
"CloudGuard could be improved by including integration with vendors other than AWS, especially Azure, especially in permissions."
"The solution could be improved with a greater analysis of its Microsoft Security score."
"It should capture more information in metadata including communication detail. Also, Internal IP addresses should not be tracked as this might be having some compliance issues."
"Currently, this solution is somewhat expensive."
"In general, for the product to be successful, they need to improve security, and configuration detection."
"Check Point tools need to improve the latency in the portal since they take a long time to load."
"I am not a technical person, but generically, the user interface can be a little more intuitive. Our staff has trained network security and cloud security professionals, and they get it, but when you are trying to get to the customers to be able to pick it up and maintain it, it can be a bit difficult."
"We're looking for a solution that can incorporate legacy infrastructure for some of our business needs."
"Rapid7 Metasploit could be made easier for new users to learn."
"At the time I was using it, the graphical user interface needed some improvements."
"It is necessary to add some training materials and a tutorial for beginners."
"If your company's patch is not up to date, but you have other detection or defense solutions such as endpoint detection and response and antivirus software, the product exploit may not work effectively. This is because its exploit database update process is slow and not real-time. For zero-day vulnerabilities or new security threats, relying on Rapid7 Metasploit alone may not be effective."
"Better automation capabilities would be an improvement."
"The solution should improve the responsiveness of its live technical support."
"Advanced Infrastructure should be implemented in the next release for better orchestration."
"The open-source version has reporting limitations. You need to develop these capabilities yourself. Built-in reporting is an excellent feature for penetration testing, but it isn't a must-have. The solution could also cover more vulnerabilities. Metasploit has around 10,000 exploits in its library, but more is always better."
Check Point CloudGuard CNAPP is ranked 5th in Vulnerability Management with 60 reviews while Rapid7 Metasploit is ranked 11th in Vulnerability Management with 18 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Rapid7 Metasploit is rated 7.6. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Microsoft Defender for Cloud and Darktrace, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Acunetix, Rapid7 InsightVM and Havoc Shield. See our Check Point CloudGuard CNAPP vs. Rapid7 Metasploit report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.