We are using InsightVM for vulnerability management services. We use it for providing professional services to our customers, and we also use it for our internal use.
We do on-premises and cloud deployments.
We are using InsightVM for vulnerability management services. We use it for providing professional services to our customers, and we also use it for our internal use.
We do on-premises and cloud deployments.
I really love the new platform. It is really easy to understand, use, and deploy.
Their support is very professional and good at troubleshooting issues.
It would be great to have a mobile application client. Currently, you have to use a mobile web browser on a device, but it is not similar to the desktop web browser in terms of user experience. It would be nice to have a mobile application to access the platform.
It would be nice to have someone in the technical support team who speaks Italian.
We have been in a partnership with Rapid7 for five years.
It is absolutely stable.
It is scalable. We have 40 customers who are using this solution.
Their technical support is great, but it would be nice to have someone in the technical support team who speaks Italian.
We speak Italian with Safeguy. So, sometimes, Safeguy's technical teams also help us.
Its initial setup is easy and quick. We are typically able to deploy it in a couple of hours.
We have 15 certified and dedicated engineers to handle its deployment and maintenance.
In some cases, we procure the licenses. In some cases, the customers directly buy the license from Rapid7.
I would rate Rapid7 InsightVM a nine out of 10.
Our primary use case is looking for people who are using Tor, or VPNs generally, and the only way we can see that is if they log in and then they log in in a foreign country right away, which means they're jumping on to the "escalator".
We really didn't have any visibility at all and now we do. It's like night and day.
NeXpose is a pretty good vulnerability scanner, good enough. There's a nice dashboard and it's a pretty cool SIEM.
We could always have a cheaper price, but other than that it's pretty good stuff.
Also, if they’d expand their product line, that would be good, and they are doing so, but they're not done yet.
Stability is rock solid.
We're at a pretty big scale already. I don't expect us to get any bigger and it's handling our scale now. If anything, we’ll probably shrink.
We're a school district and, in this area, there are three big districts, and they have open enrollment. We're not on the marketing end of our school district. If the marketing doesn't do well, we’ll shrink.
Tech support is satisfactory.
Last year got a new person in the position of information security officer, and he brought the news with him.
We went with NeXpose because we wanted to get as many products as we could from the same vendor. A full suite would have been fantastic, but that doesn't exist yet. Rapid7 had the vulnerability scanner, the penetration testing, and the SIEM, and the web app evaluator. They're adding other things. They acquired another company recently that will benefit us if we get that product. It's the all-in-one works we like.
My most important criterion when selecting a vendor is that they have to have a purchasing vehicle that is approved for school districts. It's harder than it sounds. We can't just say, "We want that, send us a bill."
It's easy to install.
We started with SentinelOne, we looked at CrowdStrike, we looked at Red Canary. The funny thing was, Red Canary was just remarketing CrowdStrike, or something like that. It got to a point where I realized these weren’t additional vendors. They were just additional packagers of the same solution.
Take a test drive. If you don't test drive it, how do you know you're going to like it or if it even works. Would you buy a car without test driving it? Absolutely not. In this case, it’s a sales contract. It's a service for one to three years. Backing out of it is pretty much impossible.
I rate it at eight out of 10. It just works. We haven't had any trouble with it. We've had good support. What's not to like? But it's an eight because the software that can be purchased is not the ultimate software. It's hard to give anybody a 10.
We are using Rapid7 InsightVM to have a vulnerability assessment solution in our organization to overcome the audit points.
We are at the stage where we are deciding if the solution will be useful for us or not.
We generate the reports for our IT sessions and try to take the recommended actions. After the action is made, we generate another report to check if this action covers the vulnerability points or not.
The reports in Rapid7 InsightVM are useful when compared to competitors.
Rapid7 InsightVM could be easier to use for those who are using it for the first time.
The updates should be fixed in the next release.
I have been using Rapid7 InsightVM for a few months.
The stability of Rapid7 InsightVM has been fine in the three months we have used it.
We are using a virtual environment with Rapid7 InsightVM and we can expand it if we want.
We have approximately three people using this solution in my company. We use the solution weekly or monthly. We would increase the use of the solution if our tests go well.
The support that we are receiving at this time is from our partner who handles the issue with the vendor if needed.
The initial setup was not straightforward because it was our first time doing it.
We did a POC first and this took us two months to make the environment. After we received the license we went into production.
We had a partner help us with the implementation of Rapid7 InsightVM.
We have an IT department that does the maintenance and support of Rapid7 InsightVM.
We have an annual license to use Rapid7 InsightVM and if we want to extend it, we will possibly choose more than one year.
I recommend this solution to others and for them to use a partner for the implementation. It can be difficult for the first time.
I rate Rapid7 InsightVM an eight out of ten.
I primarily using Rapid7 for vulnerability assessment and reporting.
At this point, we are not happy with Rapid7.
The reporting is very bad when you compare it with other vulnerability assessment tools.
This product is for basic vulnerability assessments, only, and is lacking in features such as compliance, assessment, assets, inventory, and batch management.
I have been using Rapid7 InsightVM for five years.
I would say that the scalability is 50-50. It does not offer much in terms of being able to scale. We have approximately 3,000 users.
I have been in contact with technical support and they are not bad.
Comparing the price with the value that we receive, I am not happy with it.
We are currently looking to replace Rapid7 with another product.
Currently, we are working with Tenable Nessus and Qualys.
I would rate this solution a five out of ten.
We primarily use the solution for scanning. It will support the agent and collect scanning information on particular hotspots.
We like that you can create your own inputs using the chat.
The integration capabilities are good.
It has good reporting.
We can create our own templates.
The dashboard is very easy to use for customers.
The firewall could be better.
We've had struggles with new scanning on Cisco routers. We have to do a lot of troubleshooting. The authentication scan is not working.
We'd like better risk levels for assets in terms of reporting.
I've been using the solution since 2019. I've only used it for a few years at this point.
The solution is quite stable. It's reliable. There are no bugs or glitches. It doesn't crash or freeze. I'd rate the stability eight out of ten.
The solution is scalable. It offers pretty high scalability. I'd rate it nine out of ten.
Our clients are medium to large-scale businesses.
The initial setup is very easy. It is very customizable and easy to understand.
I'm not sure how long the deployment took. The POC took about 30 days to allow the clients to try it out. We requested a POC to test out some use cases.
I'm a reseller.
I'm not sure which version of the solution I'm using. It might be version six or seven.
I'd recommend the solution to others.
I would rate the solution eight out of ten.
We used InsightVM mainly for vulnerability management. I thought it was a pretty interesting application. I'm a fan of Rapid7's Metasploit, so when I saw InsightVM I was like, "Let's see what else they have." I liked it up until we experienced some issues relating to scans. If I wanted to do mitigation, I needed to wait until the next scan was available or ran so that I could get to see if any indentations were made.
While I was in there, if I was searching for a specific vulnerability, sometimes it was hard to find the specific ones. In the dashboard, it'll tell you the results from the scans, and it will also tell you the vulnerabilities and it will rank them for risk. I would have liked to have been able to click on the vulnerability and it would take me to another area that just has the vulnerability with all the hosts. It wouldn't let you do that. You had to come back out of that window and go into another window and search for it. Well, you wouldn't get the same results as the number of hosts. I had to work a little bit harder to find exactly what I needed.
Within our organization, there were two of us using it. Both of us were IT analysts. One was an IT analyst III (which was me), and the other one was the IT analyst manager.
I would say that it improved our visibility, but it left things open.
I liked the dashboard on it. I could customize my dashboard with different widgets and different heat maps. I liked that. That was a feature I liked. If your manager had a different dashboard that they liked, and you tried to go into a meeting and they say, "Well, I think your numbers are wrong because my dashboard says this" Well, you couldn't rapidly say, "Here's the default dashboard for this for risk." Whereas, with Tenable, you could go through a dashboard just for risks, and say, "Hey, let's switch to this dashboard so we're seeing the same numbers without customization."
They just need to fix it to make it more fluid. If it shows you vulnerabilities, I want to be able to click on the vulnerability and drill down into the vulnerability. If it's rating it as a 10 and it says it's got 30 hosts in it for this vulnerability, I want to click on that vulnerability and get a separate report that says, "Here's the vulnerability specific and here's the host involved." That way I could export it and say, "Hey, this vulnerability's out there, it matches a CVE number that is critical, that Microsoft, Cisco, whatever, has put a patch out there, and here guys, here's what it is and here's the proof. Here's your host that's vulnerable. Here's a change request, fix it, send me back the proof that you fixed it, then allow me to rerun a scan specific to that, on-demand, to say 'Yes, boss, we have mitigated it.'"
I want to be able to just drill down on the reports. If it showing me there's a vulnerability and there's a said number of nodes that's vulnerable to it, I want to be able to drill down and export that list without having to come back out of it, going into my assets, trying to find the name of the vulnerability, which doesn't match what the dashboard says. To me, that was backward.
I have used this solution for one year.
It was pretty stable. We didn't have any real hiccups, but it was stable. We didn't have any real hiccups there.
As far as I know, it says it's scalable. I'm not sure if that company I used to work for had to scale it up or down.
The tech support was very helpful. Actually, I knew a couple of them so it was very helpful.
I would give their tech support a rating of 10 — I knew them from using Metasploit and some other products. It was more of a, "Hey, I got this issue, how can you help me with it?" They'd point me and say, "Hey, check this out."
I wasn't involved in the initial setup, so I can't comment on that.
Do your proof of concepts if you can. Make sure you develop your risk strategy. That's important, because it's going to give you a risk number, it's going to give you critical: highs, mediums, but you need to understand what is the risk methodology that you're going to follow. Just because it says it's critical because of how many vulnerabilities you have, doesn't mean that you need to work on it right away.
For example, there was a vulnerability that had 2,000 nodes affected. It put it as a high-risk, whereby there was another vulnerability where there were only about 10 hosts affected — it put it at medium-risk. However, the high-risk one, because it had more nodes affected, did not have a POC associated with it. A novice person looking at it would say, "I need to work on these 1,000 vulnerabilities because it's a high-risk, and ignore the medium." Well, the medium one had an active POC on it. If you didn't have a person who understood how to read the report and what it's actually telling you, then you would say, "Hey, you know what, I'm going to use these, I'm going to cut my risk down because I got 1,000 nodes with this vulnerability and I'm going to put this chain out real quick and I'm going to reduce my risk real quick because of the numbers." Well, in my opinion, you didn't reduce your risk because you have 10 nodes out there with a vulnerability that's rated medium and it has a POC on it.
Overall, on a scale from one to ten, I would give this solution a rating of eight. I'm going to say that is because shame on Rapid7 for having such great applications, but then that little piece there that they know about hasn't been fixed. If I remember, if I go probably log back into the community, it's probably been asked a couple of times.
Our primary use case for this solution is to gain insight into internal systems vulnerabilities and remediation tasks.
Rapid7 InsightVM has given us a practical view of the vulnerabilities present in our organization. Not only does it verify the vulnerability, but scores it against the skill level of an attacker.
The feature that we find most valuable is the granularity. You can view your assets however makes the most sense to your business. We found that we could isolate systems easily via tagging and site setup.
A definite improvement would be to make it easier to run ad-hoc scans without needing to assign the asset to a site or group.
We use Rapid7 InsightVM mostly for VM management.
The solution is good because it has a lot of options.
The solution could improve by being more secure.
I have been using Rapid7 InsightVM for approximately one month.
The solution has been stable.
Rapid7 InsightVM is scalable.
I have not needed to contact the support at this time.
The installation is simple, it took us approximately six hours.
I did the implementation myself.
I would recommend this solution to others.
I rate Rapid7 InsightVM a nine out of ten.