


Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management.
We saw a return on investment through significant savings in time, money, and resources.
Metasploit has helped save time, especially with testing websites or VIPD projects.
The ROI can be very rapid for organizations using vulnerability assessment for the first time.
We usually get on calls with tech support, and they are very helpful.
The response time takes a while.
The technical support provided by Qualys is pretty good.
Rapid7 sometimes struggles with queries from non-security people, whereas Tenable is more patient.
The customer support is excellent
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
Scalability depends on the license and the number of assets being monitored.
Qualys VMDR can handle scalability, although increasing the inventory can raise the licensing costs.
Qualys VMDR's scalability is good, and the customer support is good.
Metasploit can handle big projects and is already prepared for them.
Rapid7 Metasploit is highly scalable.
Rapid7 Metasploit has limited scalability based on my experience, as the customer receives the full functionality of the product with the license.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
Qualys VMDR is stable.
I have never faced any technical issues or downtimes.
I find Metasploit to be very stable, and I would rate its stability as a nine out of ten.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
It does not automate patching unless the patch management module is purchased separately.
If AI features were integrated, it could enhance the capabilities significantly.
One area where Qualys VMDR can be improved is the missing feature for deploying agents for over 1,000 assets, as we need to do it manually.
While you can check the vulnerability, and the system will tell you there is no vulnerability, usually, a human can change one, two, or three parameters and using the same technique and the same scripts can break the system.
The database is not always updated with the latest vulnerabilities or zero-day exploits.
The time taken to fetch reports based on the number of events can be extensive.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
The product's pricing has roughly tripled within the last couple of years, making us reconsider renewing the license for the scanner.
I would rate the pricing between seven to eight out of ten.
I have a notion that Qualys might be more expensive than Rapid7.
Qualys offers better pricing and is feature-packed compared to other tools.
The cost is approximately $15 per device.
Metasploit is cheaper than Nessus and offers a more robust community edition that provides a good experience for studying Metasploit.
After that, they usually purchase the commercial part of the solution due to its deep integration with InsightVM.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
My experience with the pricing, setup cost, and licensing of Tenable Nessus is that the installation is somewhat easier, but preparing the product, such as the SKU and license options, is quite tricky.
The prioritization of vulnerabilities has improved our remediation efforts by around thirty to thirty-five percent.
It impacts my workflow overall, with the patch management features as it has the missing patches listed in detail, making it easier to get a comprehensive report and providing some dashboards that offer visual representation.
Qualys VMDR's continuous monitoring capabilities help us respond to emergent threats by enabling my team to reach out to the security engineers whenever there is any detection of a vulnerability, informing them about it, and creating an incident.
Rapid7 offers comprehensive features within one platform, eliminating the need to integrate multiple tools to see all alerts in one place.
InsightVM searches for potential threats and vulnerabilities of the infrastructure, and after that, Rapid7 Metasploit validates whether we can break the system using this vulnerability or threat, serving as a validator component of the InsightVM solution.
The most valuable features of Metasploit include its powerful capabilities for exploitation and scanning.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
| Product | Market Share (%) |
|---|---|
| Tenable Nessus | 5.1% |
| Qualys VMDR | 5.0% |
| Rapid7 Metasploit | 1.5% |
| Other | 88.4% |


| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 12 |
| Large Enterprise | 70 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 39 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time.
Qualys VMDR offers an all-inclusive risk-based vulnerability management solution to prioritize vulnerabilities and assets based on risk and business criticality. VMDR seamlessly integrates with configuration management databases (CMDB), Qualys Patch Management, Custom Assessment and Remediation (CAR), Qualys TotalCloud and other Qualys and non-Qualys solutions to facilitate vulnerability detection and remediation across the entire enterprise.
With VMDR, users are empowered with actionable risk insights that translate vulnerabilities and exploits into optimized remediation actions based on business impact. Qualys customers can now aggregate and orchestrate data from the Qualys Threat Library, 25+ threat intelligence feeds, and third-party security and IT solutions, empowering organizations to measure, communicate, and eliminate risk across on-premises, hybrid, and cloud environments.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Tenable Nessus provides an efficient vulnerability management system with swift deployment and comprehensive scanning capabilities, making it an ideal choice for organizations seeking to enhance their security posture through effective threat detection and mitigation strategies.
Renowned for its top-tier vulnerability detection, Tenable Nessus offers a robust platform that integrates effortlessly across systems, enhancing threat management through automation, real-time monitoring, and customizable scanning options. Its broad asset coverage, including network devices and applications, coupled with ease of deployment, positions it as a go-to option for risk assessment and compliance. Organizations value its extensive reporting features and database, although they suggest enhancements in reporting formats and false positive detection. A more intuitive interface, improved cloud support, and competitive pricing models are sought after to cater to evolving enterprise needs.
What are the key features of Tenable Nessus?In industries such as finance, healthcare, and tech, Tenable Nessus is implemented for scanning internal and external networks, identifying risks, and ensuring data protection compliance. Organizations conduct regular scans to detect security vulnerabilities in servers and databases, leveraging its capabilities to strengthen their security frameworks while managing cloud infrastructures and enterprise networks efficiently.