


Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management.
We saw a return on investment through significant savings in time, money, and resources.
Metasploit has helped save time, especially with testing websites or VIPD projects.
The ROI can be very rapid for organizations using vulnerability assessment for the first time.
We usually get on calls with tech support, and they are very helpful.
The response time takes a while.
The technical support provided by Qualys is pretty good.
Rapid7 sometimes struggles with queries from non-security people, whereas Tenable is more patient.
The customer support is excellent
We received support within one to three hours.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
Scalability depends on the license and the number of assets being monitored.
Qualys VMDR can handle scalability, although increasing the inventory can raise the licensing costs.
Qualys VMDR's scalability is good, and the customer support is good.
Metasploit can handle big projects and is already prepared for them.
Rapid7 Metasploit is highly scalable.
Rapid7 Metasploit has limited scalability based on my experience, as the customer receives the full functionality of the product with the license.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
Tenable Nessus is definitely scalable, especially for license formats designed for scalability.
Qualys VMDR is stable.
I have never faced any technical issues or downtimes.
I find Metasploit to be very stable, and I would rate its stability as a nine out of ten.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
The stability of Tenable Nessus is extraordinary.
It does not automate patching unless the patch management module is purchased separately.
If AI features were integrated, it could enhance the capabilities significantly.
One area where Qualys VMDR can be improved is the missing feature for deploying agents for over 1,000 assets, as we need to do it manually.
While you can check the vulnerability, and the system will tell you there is no vulnerability, usually, a human can change one, two, or three parameters and using the same technique and the same scripts can break the system.
The database is not always updated with the latest vulnerabilities or zero-day exploits.
The time taken to fetch reports based on the number of events can be extensive.
This is Tenable's property. They want to sell Tenable Security Center, and they closed all the API capability for Tenable Nessus Professional.
An AI feature that helps them discover options without requiring them to deep dive into all features or guides them through advisory functions would be beneficial.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
I would rate the pricing between seven to eight out of ten.
I have a notion that Qualys might be more expensive than Rapid7.
Qualys offers better pricing and is feature-packed compared to other tools.
The cost is approximately $15 per device.
Metasploit is cheaper than Nessus and offers a more robust community edition that provides a good experience for studying Metasploit.
After that, they usually purchase the commercial part of the solution due to its deep integration with InsightVM.
The pricing for Tenable Nessus has increased significantly, tripling over the last few years.
Tenable Nessus's pricing is adequate if it is fully utilized.
When we compare it to other solutions, it is more difficult for us to negotiate the price for Tenable Nessus than to negotiate the price with Rapid7.
The prioritization of vulnerabilities has improved our remediation efforts by around thirty to thirty-five percent.
It impacts my workflow overall, with the patch management features as it has the missing patches listed in detail, making it easier to get a comprehensive report and providing some dashboards that offer visual representation.
Qualys VMDR's continuous monitoring capabilities help us respond to emergent threats by enabling my team to reach out to the security engineers whenever there is any detection of a vulnerability, informing them about it, and creating an incident.
Rapid7 offers comprehensive features within one platform, eliminating the need to integrate multiple tools to see all alerts in one place.
InsightVM searches for potential threats and vulnerabilities of the infrastructure, and after that, Rapid7 Metasploit validates whether we can break the system using this vulnerability or threat, serving as a validator component of the InsightVM solution.
The most valuable features of Metasploit include its powerful capabilities for exploitation and scanning.
I mostly use the configuration audit feature for the audit configuration as a scan policy, and I will use it for credential audit, which helps me scan credentials access such as local administrator or root access, performing a deeper and more accurate check of local configuration settings and file systems, making it a highly recommended feature.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The most valuable features of Tenable Nessus include its ease of access and quick usability.
| Product | Mindshare (%) |
|---|---|
| Tenable Nessus | 4.9% |
| Qualys VMDR | 4.9% |
| Rapid7 Metasploit | 1.7% |
| Other | 88.5% |


| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 12 |
| Large Enterprise | 70 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 19 |
| Large Enterprise | 35 |
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time.
Qualys VMDR offers an all-inclusive risk-based vulnerability management solution to prioritize vulnerabilities and assets based on risk and business criticality. VMDR seamlessly integrates with configuration management databases (CMDB), Qualys Patch Management, Custom Assessment and Remediation (CAR), Qualys TotalCloud and other Qualys and non-Qualys solutions to facilitate vulnerability detection and remediation across the entire enterprise.
With VMDR, users are empowered with actionable risk insights that translate vulnerabilities and exploits into optimized remediation actions based on business impact. Qualys customers can now aggregate and orchestrate data from the Qualys Threat Library, 25+ threat intelligence feeds, and third-party security and IT solutions, empowering organizations to measure, communicate, and eliminate risk across on-premises, hybrid, and cloud environments.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Tenable Nessus enhances cybersecurity by detecting vulnerabilities with comprehensive scanning, user-friendly dashboards, and automated reporting, providing value in asset management, configuration audits, and compliance.
Providing real-time monitoring and ease of use, Nessus stands out with its integration capabilities, predictive prioritization, extensive plugin system, and cost-effectiveness. It supports vulnerability assessments for networks, applications, and devices, offering detailed reports for continuous security improvement. Nessus' capabilities extend across on-premise and cloud deployments, aiding compliance and remediation processes while aligning with security standards. While robust, it could benefit from enhanced cloud capabilities, improved scanning accuracy, and more flexible licensing options.
What are the standout features of Tenable Nessus?Tenable Nessus is implemented widely across industries for internal and external vulnerability assessments and management, aiding organizations in scanning servers, workstations, and network devices. Benefiting sectors prioritize security within their unique environments, leveraging Nessus for its thorough reports and compliance assurance.