


Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management.
We saw a return on investment through significant savings in time, money, and resources.
Metasploit has helped save time, especially with testing websites or VIPD projects.
The ROI can be very rapid for organizations using vulnerability assessment for the first time.
We usually get on calls with tech support, and they are very helpful.
The response time takes a while.
The technical support provided by Qualys is pretty good.
Rapid7 sometimes struggles with queries from non-security people, whereas Tenable is more patient.
The customer support is excellent
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
Scalability depends on the license and the number of assets being monitored.
Qualys VMDR can handle scalability, although increasing the inventory can raise the licensing costs.
Qualys VMDR's scalability is good, and the customer support is good.
Metasploit can handle big projects and is already prepared for them.
Rapid7 Metasploit is highly scalable.
Rapid7 Metasploit has limited scalability based on my experience, as the customer receives the full functionality of the product with the license.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
Qualys VMDR is stable.
I have never faced any technical issues or downtimes.
I find Metasploit to be very stable, and I would rate its stability as a nine out of ten.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
It does not automate patching unless the patch management module is purchased separately.
If AI features were integrated, it could enhance the capabilities significantly.
One area where Qualys VMDR can be improved is the missing feature for deploying agents for over 1,000 assets, as we need to do it manually.
While you can check the vulnerability, and the system will tell you there is no vulnerability, usually, a human can change one, two, or three parameters and using the same technique and the same scripts can break the system.
The database is not always updated with the latest vulnerabilities or zero-day exploits.
The time taken to fetch reports based on the number of events can be extensive.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
An AI feature that helps them discover options without requiring them to deep dive into all features or guides them through advisory functions would be beneficial.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
I would rate the pricing between seven to eight out of ten.
I have a notion that Qualys might be more expensive than Rapid7.
Qualys offers better pricing and is feature-packed compared to other tools.
The cost is approximately $15 per device.
Metasploit is cheaper than Nessus and offers a more robust community edition that provides a good experience for studying Metasploit.
After that, they usually purchase the commercial part of the solution due to its deep integration with InsightVM.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
When we compare it to other solutions, it is more difficult for us to negotiate the price for Tenable Nessus than to negotiate the price with Rapid7.
The prioritization of vulnerabilities has improved our remediation efforts by around thirty to thirty-five percent.
It impacts my workflow overall, with the patch management features as it has the missing patches listed in detail, making it easier to get a comprehensive report and providing some dashboards that offer visual representation.
Qualys VMDR's continuous monitoring capabilities help us respond to emergent threats by enabling my team to reach out to the security engineers whenever there is any detection of a vulnerability, informing them about it, and creating an incident.
Rapid7 offers comprehensive features within one platform, eliminating the need to integrate multiple tools to see all alerts in one place.
InsightVM searches for potential threats and vulnerabilities of the infrastructure, and after that, Rapid7 Metasploit validates whether we can break the system using this vulnerability or threat, serving as a validator component of the InsightVM solution.
The most valuable features of Metasploit include its powerful capabilities for exploitation and scanning.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
| Product | Mindshare (%) |
|---|---|
| Tenable Nessus | 4.1% |
| Qualys VMDR | 4.2% |
| Rapid7 Metasploit | 1.9% |
| Other | 89.8% |


| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 12 |
| Large Enterprise | 70 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Qualys VMDR is a comprehensive cybersecurity tool offering vulnerability management, patch management, and continuous monitoring with real-time asset discovery. It delivers scalable, cloud-based solutions that enhance security operations without additional infrastructure.
Qualys VMDR provides a robust platform for enterprise security, integrating vulnerability management, compliance, and asset inventory for full visibility across cloud and on-premises environments. It features a comprehensive dashboard with threat intelligence-driven prioritization and remediation capabilities. Users benefit from accurate assessments via agent-based scanning and appreciate the intuitive, customizable scanning and reporting interface. However, there's room for improvement in false positive reduction, UI simplification, and integration capabilities, along with enhancements in asset management for large-scale deployments and the vulnerability database. Enhancing technical support speed, patch management, compliance standards, and inter-module navigation would further enrich user experience.
What are the key features of Qualys VMDR?Qualys VMDR is widely used in industries needing stringent security and compliance measures, offering comprehensive vulnerability and compliance management. It is deployed to secure web applications, servers, and crucial assets, supporting a wide range of sectors by ensuring policy adherence and vulnerability tracking through its powerful cloud platform.
Rapid7 Metasploit provides robust exploitation capabilities, vulnerability assessment, and seamless integration with InsightVM, enhancing penetration testing and security awareness.
Rapid7 Metasploit stands out in the cybersecurity sphere for its extensive exploit modules and automated testing processes. It supports multiple interfaces and databases, simplifying exploit development and facilitating network scanning through integration with Nmap. Its emphasis on vulnerability discovery and incident detection positions it as a key tool in various IT environments, despite limitations in GUI effectiveness and exploit update speeds.
What are the key features of Rapid7 Metasploit?In industries such as government and education, Rapid7 Metasploit integrates into security protocols and training programs. Its deployment on platforms like Kali Linux aligns with IP assets for effective scanning and phishing detection. Organizations benefit from its ability to track processes and collaborate securely with entities, enhancing overall cybersecurity readiness.
Tenable Nessus enhances cybersecurity by detecting vulnerabilities with comprehensive scanning, user-friendly dashboards, and automated reporting, providing value in asset management, configuration audits, and compliance.
Providing real-time monitoring and ease of use, Nessus stands out with its integration capabilities, predictive prioritization, extensive plugin system, and cost-effectiveness. It supports vulnerability assessments for networks, applications, and devices, offering detailed reports for continuous security improvement. Nessus' capabilities extend across on-premise and cloud deployments, aiding compliance and remediation processes while aligning with security standards. While robust, it could benefit from enhanced cloud capabilities, improved scanning accuracy, and more flexible licensing options.
What are the standout features of Tenable Nessus?Tenable Nessus is implemented widely across industries for internal and external vulnerability assessments and management, aiding organizations in scanning servers, workstations, and network devices. Benefiting sectors prioritize security within their unique environments, leveraging Nessus for its thorough reports and compliance assurance.