We performed a comparison between Checkmarx One and Rapid7 Metasploit based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."The most valuable feature for me is the Jenkins Plugin."
"Apart from software scanning, software composition scanning is valuable."
"The setup is very easy. There is a lot of information in the documents which makes the install not difficult at all."
"The setup is fairly easy. We didn't struggle with the process at all."
"We use the solution to validate the source code and do SAST and security analysis."
"It allows for SAST scanning of uncompiled code. Further, it natively integrates with all key repos formats (Git, TFS, SVN, Perforce, etc)."
"The report function is the solution's greatest asset."
"Most valuable features include: ease of use, dashboard. interface and the ability to report."
"It's not possible to do penetration testing without being very proficient in Metasploit."
"The option to generate phishing emails has proven to be very valuable in understanding the behavior of users."
"The greatest advantage of Rapid7 Metasploit is that it is the only system that can directly exploit vulnerabilities on the Metasploit platform."
"The reporting on the solution is good."
"The most valuable feature for us is the support for testing Linux-based web server components."
"It contains almost all the available exploits and payloads."
"The tool's most useful feature for penetration testing is its automation capabilities. With the professional edition, you can upload the results from Nessus in the Rapid7 Metasploit solution portal."
"It allows us to concentrate solely on identified vulnerabilities without the hassle of additional setup."
"Updating and debugging of queries is not very convenient."
"When we first ran it on a big project, there wasn't enough memory on the computer. It originally ran with eight gigabytes, and now it runs with 32. The software stopped at some point, and while I don't think it said it ran out of memory, it just said "stopped" and something else. We had to go to the logs and send them to the integrator, and eventually, they found a memory issue in the logs and recommended increasing the memory. We doubled it once, and it didn't seem enough. We doubled it again, and it helped."
"They should make it more container-friendly and optimized for the CI pipeline. They should make it a little less heavy. Right now, it requires a SQL database, and the way the tool works is that it has an engine and then it has an analysis database in which it stores the information. So, it is pretty heavy from that perspective because you have to have a full SQL Server. They're working on something called Checkmarx Light, which is a slim-down version. They haven't released it yet, but that's what we need. There should be something a little more slimmed down that can just run the analysis and output the results in a format that's readable as opposed to having a full, really big, and thick deployment with a full database server."
"Checkmarx could be improved with more integration with third-party software."
"We are trying to find out if there is a way to identify the run-time null values. I am analyzing different tools to check if there is any tool that supports run-time null value identification, but I don't think any of the tools in the market currently supports this feature. It would be helpful if Checkmarx can identify and throw an exception for a null value at the run time. It would make things a lot easier if there is a way for Checkmarx to identify nullable fields or hard-coded values in the code. The accessibility for customized Checkmarx rules is currently limited and should be improved. In addition, it would be great if Checkmarx can do static code and dynamic code validation. It does a lot of security-related scanning, and it should also do static code and dynamic code validation. Currently, for security-related validation, we are using Checkmarx, and for static code and dynamic code validation, we are using some other tools. We are spending money on different tools. We can pay a little extra money and use Checkmarx for everything."
"Meta data is always needed."
"Micro-services need to be included in the next release."
"One area for improvement in Checkmarx is pricing, as it's more expensive than other products."
"Metasploit cannot be installed on a machine with an antivirus."
"Rapid7 Metasploit can add a GUI feature because it is only available online."
"Better automation capabilities would be an improvement."
"The solution is not user-friendly and has room for improvement."
"The solution should improve the responsiveness of its live technical support."
"I think areas with shortcomings that need improvement are more integration and automation."
"The initial setup was a bit "tweaky" for the open-source version."
"I would like to see more capabilities, more functions, and more features. More types of attack vectors."
Checkmarx One doesn't meet the minimum requirements to be ranked in Vulnerability Management with 67 reviews while Rapid7 Metasploit is ranked 11th in Vulnerability Management with 18 reviews. Checkmarx One is rated 7.6, while Rapid7 Metasploit is rated 7.6. The top reviewer of Checkmarx One writes "The report function is a great, configurable asset but sometimes yields false positives". On the other hand, the top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". Checkmarx One is most compared with SonarQube, Veracode, Fortify on Demand, Snyk and Coverity, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Rapid7 InsightVM, Acunetix and Nucleus.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.