Rapid7 InsightVM Questions
Oct 18 2022
We all know it's really hard to get good pricing and cost information.
Please share what you can so you can help your peers.
Oct 18 2022
Please share with the community what you think needs improvement with Rapid7 InsightVM.
What are its weaknesses? What would you like to see changed in a future version?
Oct 18 2022
If you were talking to someone whose organization is considering Rapid7 InsightVM, what would you say?
How would you rate it and why? Any other tips or advice?
I work for an IT integration company and we work with our customers to help them choose the best solutions for their needs. I am researching Imperva SecureSphere Database, Qualys, and Rapid7. What are the biggest differences between the three? Which do you recommend and why? Thanks! I appreci... Read More »
Oct 18 2022
What do you like most about Rapid7 InsightVM?
Thanks for sharing your thoughts with the community!
Oct 18 2022
How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Vulnerability Management Questions
Nov 25 2022
Hello community, I am a Senior Engineer at a large financial services firm. I am currently researching vulnerability management tools. Which tool would you recommend for vulnerability management in your infrastructure? We are particularly concerned post the Apache log4j vulnerability that was... Read More »
Hi security professionals,
Companies like Fuzzbuzz, Forallsecure are introducing fuzzing platforms to the public. Have you ever used this or an alternative tool in your company?
How has your experience been with that fuzzing tool?
Thanks for the help!
Hi infosec professionals.
What are your top choices of tools to use for mobile penetration testing this year?
Thanks for sharing your knowledge!
A developer sabotaged his own open-source libraries, breaking thousands of apps as a protest for commercial companies which make millions from his code and contribute back nothing. What do you think about his act? Is it legitimate since the license of open source is given "as is"? Should he have... Read More »
Hi security professionals, As the majority of you have probably heard, GoDaddy has been hacked again a few days ago. Based on what is already known, what has been done wrong and what can be done better? Share your thoughts! Read More »
Aug 11 2022
What are the MITRE ATT&CK framework use cases?
How can it be used in an enterprise security strategy?
What to include into Service Level Agreement (SLA) when purchasing cloud penetration testing services?
What should one include (essential items) into a Service Level Agreement (SLA) when purchasing cloud penetration testing services?
Which tool can you recommend for Vulnerability Assessment and Penetration Testing for an application built on the Microsoft Stack?
Hi peers, We have developed an eCommerce system using the Microsoft Technology Stack. Now, we would like to perform Vulnerability Assessment and Penetration Testing (VAPT) of this system using a comprehensive tool. Can anyone recommend a tool that (preferably, an open-source one) to perform ... Read More »
Hi cybersecurity professionals,
I'm looking for your recommendations about penetration testing tools for SMB/SME.
What would be your choice? Please share a technical description of why would you choose this tool over others.
Thanks in advance.
Hi, I'm doing integration between Tenable and ServiceNow and I'm looking for an API for Tenable Connector into ServiceNow. Does anyone have good recommendations? Thank you! Read More »
Hi community, Which automated tools for penetration testing would you recommend to your colleagues working for enterprises? Please share a couple of reasons why you recommend those tools. Read More »
Does anyone have recommendations about methodologies (e.g. use of FAIR framework), plug-ins (ETL schemas, FOSS add-ons) or commercial/free solutions (like Kenna) that can help us during "integration, transformation and consolidation" of vulnerability into risks (from Tenable.IO to Archer)? Read More »
Jul 11 2022
I'm a VP of Innovation and Development at a small tech. services company.
Is it possible that a single vulnerability analysis software does not detect the entire spectrum of threats?
Is continuous vulnerability scanning essential?
Are there other approaches to vulnerability management that do not involve continuous scanning?
I'm a Senior System Engineer at a mid-sized enterprise. I am comparing Qualys VM and Tenable Nessus:
- What are their exact differences?
- Which is good for IT industries?
- What are their pros & cons?
What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
In the past vulnerability assessment has been the primary approach used to detect cyber threats.
Risk-based vulnerability management has become increasingly popular.
How do each of these approaches work, and which do you think is more effective?
When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
Let the community know what you think. Share your opinions now!
Download our free Rapid7 InsightVM Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2022
Product CategoriesVulnerability Management
- How would you choose between Rapid7 InsightVM and Tenable Nessus?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What are your recommended automated penetration testing tools?
- What penetration testing tool (or tools) do you recommend for SMB/SME?
- Can you recommend API for Tenable Connector into ServiceNow
- Vulnerability Management and Risk Management Integration
- Qualys VM vs Tenable Nessus: Comparison