JMeter, from Apache, is a load and performance testing tool.
$0
Vulcan Cyber (discontinued)
Score 7.7 out of 10
Mid-Size Companies (51-1,000 employees)
Vulcan Cyber was an exposure and vulnerability risk mitigation platform, acquired by Tenable in early 2025. The product is no longer available for sale, and functionality has been integrated into the Tenable One Exposure Management platform's vulnerability solution.
N/A
Pricing
Apache JMeter
Vulcan Cyber (discontinued)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
JMeter
Vulcan Cyber (discontinued)
Free Trial
No
No
Free/Freemium Version
Yes
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Apache JMeter
Vulcan Cyber (discontinued)
Features
Apache JMeter
Vulcan Cyber (discontinued)
Load Testing
Comparison of Load Testing features of Product A and Product B
Apache JMeter
7.2
24 Ratings
17% below category average
Vulcan Cyber (discontinued)
-
Ratings
End to end performance management
9.021 Ratings
00 Ratings
Integrated performance data
8.522 Ratings
00 Ratings
Deployment model flexibility
7.521 Ratings
00 Ratings
Real time monitoring
6.521 Ratings
00 Ratings
Automated anomaly detection
4.417 Ratings
00 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Apache JMeter
-
Ratings
Vulcan Cyber (discontinued)
7.8
11 Ratings
3% below category average
Network Analytics
00 Ratings
7.77 Ratings
Vulnerability Classification
00 Ratings
8.210 Ratings
Automated Alerts and Reporting
00 Ratings
7.311 Ratings
Threat Analysis
00 Ratings
8.05 Ratings
Automated Threat Identification
00 Ratings
7.911 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
JMeter is well suited for Java applications where the user can script the scenario once and make changes to accommodate for as many numbers of users for load test execution. The image and selection of any files or exporting files scenario is handled well.
It is less appropriate to test Ajax applications where it is required to script click per use.
It's really challenging at times to contend with multiple vulnerabilities on a daily basis, and having a way to make sense of what actually needs to be prioritized and what can be shifted further down the task list is extremely helpful. Because the solution suggests what your next step should be in mitigating a specific vulnerability, it helps us save time and research by enabling us to immediately take action after being informed about an issue.
Easy of use - in generate load like HTTP requests, and processing/analyzing the responses. No coding is necessary at the basic level, just need to understand load testing and the infrastructure being tested.
Automatic management of things like cookies to help with session state support - so you don't specifically have to worry about it or handle it
Lots of testing/configuration options to suit your needs in making the right load generation (sampling requests), and analyzing the results, including any pre and post processing of the results first. Things like the Beanshell/BSF pre/post processors, response assertion, regular expression extractor, XPath extractor, CSV data set config
There is a JMeter cloud service called BlazeMeter that I think would be useful for those that need to scale up high load without provisioning their own systems. I've not personally tried it though, but I recently attended a meetup presentation that highlighted nice useful features that BlazeMeter provides. One should evaluate the service if they are considering JMeter and need to expand beyond existing hardware resources.
Jmeter requires many tweaks with respect to its configuration file and thread properties. users need to edit theses files themselves. There could be some interface where we can edit this fields.
Jmeter cannot handle more threads and hangs up when we increase the number of threads. This causes lot of inconvenience. In these situations, user can be notified that such change would be lead to slow performance so that user can do as required. The same appears when we try to view huge files on graph listener.
Jmeter should optimize the read and write access to output csv since it acts as overhead to the I/O performance. This affects our test results for the application which we are testing.
Price, Wiki and user sharing. Having access to the information provided by the developers and other open source providers is key for me. The ability to share information and get answers directly is very important to success in software testing. And the price of this product currently is amazing. Too many companies charge way too much money for products that are far behind in their value and pertinence
The purpose related to performance and load testing through Apache JMeter works fine but the usability of the tool should be improved quite a lot. If someone starts with the Jmeter fresh without prior experience, they need to put more efforts in understanding the tool. The UI is not that great which is the main reason not to give high rating on usability.
I have been using JMeter for the last year. By using this tool, you can make sure the system will work under varied loads. It helps us to simulate real time scenarios by creating required virtual users and make sure the application will work under load. Perform load, stress, and stability testing using JMeter.
I have used LoadRunner and Silkperformer, and so far Jmeter turns out be the easiest to use of all these. While each of them have their own ROI, Jmeter can be picked by anyone in hours and start testing within a day. While with other tools, we need to get license, install them (takes a while) and setup tests and firewalls, etc.
I wasn't here at the time when the company compared different vulnerability management platforms so I'm not sure on the reasoning and difference between the 2. It could be that the team went through different choices and found Vulcan to be the best fit. It's hard for me to say why Vulcan was specifically chosen
Allows much better prioritizing of which assets are most vulnerable
Allow a better understanding of what assets are actually under real threat vs. what is assumed to be vulnerable, but the real world fact is the system would be hard to reach internally, so it's not as vulnerable.