We changed our name from IT Central Station: Here's why

Rapid7 Metasploit Primary Use Case

AS
Principal security consultant at a computer software company with 201-500 employees

We are a solution provider and we offer a variety of services that include security and vulnerability management. Rapid7 Metasploit is one of the products that we use to identify vulnerabilities.

Specifically, Metasploit is for penetration testing. It uses models to check for exploitable vulnerabilities, and if one is detected then we would raise the importance of solving the problem. We normally operate Metasploit at the client site, which helps us to explore and assess the vulnerabilities directly in the environment.

View full review »
MM
Project Director at a tech services company with 1,001-5,000 employees

I used the community edition. It's a very handy and powerful product. For a free product, the capabilities are absolutely astonishing.

I used Rapid7 Metasploit as a marketing solution. I was working as a security expert and whenever I would meet a client as a consultant or a freelancer, I would open my laptop and start using the software.

Rapid7 Metasploit is a standalone solution, intended to be used by one person, but it can be used by a few people in a team — maybe 10 people or less.

View full review »
EG
Senior Information Technology Security Officer at a financial services firm with 501-1,000 employees

We're using the solution in conjunction with some governmental agencies.

View full review »
Find out what your peers are saying about Rapid7, Tenable Network Security, Qualys and others in Vulnerability Management. Updated: January 2022.
566,121 professionals have used our research since 2012.
ME
Senior Cyber Security Specialist at a tech services company with 1,001-5,000 employees

We mainly use Rapid7 Metasploit for the network penetration testing activities.

We have used the payload during our penetration testing activities.

View full review »
CEO at Virtual Security International

We have Rapid7 Metasploit installed on our Kali Linux system and we use it for penetration testing.

View full review »
Find out what your peers are saying about Rapid7, Tenable Network Security, Qualys and others in Vulnerability Management. Updated: January 2022.
566,121 professionals have used our research since 2012.