What users are saying about
Top Rated
31 Ratings
Top Rated
31 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 9.5 out of 100
3 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 6.8 out of 100

Likelihood to Recommend

Nmap

NMap is well suited to just about any situation, network size, or complexity. Some have brought up the point that NMap's proxy settings need work. I haven't used NMap with a proxy. NMap is my "go to" tool for a cursory security sweep. Once a problem is found, I can perform a deeper dive scan on a system or a network. I wouldn't, and don't, use NMap as my only security tool. No single tool has all the answers. For example, it is not a Wireshark in that it does not capture packets or analyze them. It is basically a port scanner, host discovery, OS detection tool.
Kenneth Hess | TrustRadius Reviewer

SolarWinds Threat Monitor

We use this among all our clients. When we first start working with a new client we run scans on their networks and then try to show them where they are vulnerable, and where they should shore up their security. Then we use those reports to road map how we want to fix their infrastructure.
chris maddox | TrustRadius Reviewer

Feature Rating Comparison

Network Performance Monitoring

Nmap
8.4
SolarWinds Threat Monitor
Automated network device discovery
Nmap
8.6
SolarWinds Threat Monitor
Network monitoring
Nmap
8.8
SolarWinds Threat Monitor
Baseline threshold calculation
Nmap
8.5
SolarWinds Threat Monitor
Alerts
Nmap
8.8
SolarWinds Threat Monitor
Network capacity planning
Nmap
8.1
SolarWinds Threat Monitor
Packet capture analysis
Nmap
7.4
SolarWinds Threat Monitor
Network mapping
Nmap
9.3
SolarWinds Threat Monitor
Customizable reports
Nmap
8.0
SolarWinds Threat Monitor
Wireless infrastructure monitoring
Nmap
8.3
SolarWinds Threat Monitor
Hardware health monitoring
Nmap
8.0
SolarWinds Threat Monitor

Pros

Nmap

  • Nmap has a unique process of fingerprinting applications/devices to help us identify their communications patterns quicker.
  • Nmap can be used for network auditing by specifying whole subnets that you would like to scan for open/closed ports.
  • Nmap has a diverse presence and can be used from most operating systems.
Roger Mialkowski | TrustRadius Reviewer

SolarWinds Threat Monitor

  • Cloud based so no footprint
  • Log collection and correlation allowing analysis
  • Log archiving
  • Very scalable with a low cost
Rob Bates | TrustRadius Reviewer

Cons

Nmap

  • Maybe take some of the features of Zenmap and bake them in?
  • Include fancy extra graphical results charts or graphs or something to show people who you want to convey info too but have no idea what Nmap is actually doing.
  • I don't really think I'd change a lot actually.
Anonymous | TrustRadius Reviewer

SolarWinds Threat Monitor

  • Steep learning curve.
  • Usually takes a bit to get the scans to run easily in a new environment.
  • Could have more reporting options.
chris maddox | TrustRadius Reviewer

Support Rating

Nmap

Nmap 7.9
Based on 18 answers
There is a very large support community and a robust selection of add-ons and scripts. Once you get the use down this is one of the most powerful tools and you can find anything you are looking for as far as examples on the web. While not having official support its not lacking by any means.
Alan Matson, CCNA:S, MCP | TrustRadius Reviewer

SolarWinds Threat Monitor

SolarWinds Threat Monitor 8.0
Based on 2 answers
SolarWinds offers live chat support for all its products built-in. So if you are working on something you can just reach out to someone at that time, and usually get an answer pretty quick. If you are trying to get something done it's a lot better than submitting a ticket and waiting for the email response.
chris maddox | TrustRadius Reviewer

Alternatives Considered

Nmap

NMap usually lacks the features of the other network scanners, but for a good reason: most of the other network scanners out there are using NMap as part of their system. The nature of NMap (being open-source) is that it is available for use in other applications; as a result, these other applications make use of the NMap source code.
Anonymous | TrustRadius Reviewer

SolarWinds Threat Monitor

Threat Monitor is very new on the scene. Its obviously not at the same level as some of the established vendors yet. We also deploy Alienvault for example and its nowhere near the same level as this, however the cost model between these two products reflects that. Alienvault however does have a physical footprint on the environment, whereas Threat Monitor doesnt. If you have the paitence to wait, Threat Monitor will surely only improve over time.
Rob Bates | TrustRadius Reviewer

Return on Investment

Nmap

  • Positive return as it's open-source (free) on all OS's.
  • If a person is not used of the command line there are a ton of front ends that make it point-and-click so the learning curve is good. That cuts down on time and manpower.
Anonymous | TrustRadius Reviewer

SolarWinds Threat Monitor

  • We're now able to archive our logs, in the cloud and search through events with relative ease. Previously we would have to trawl through servers.
  • Alarm intrusion allows us to respond to threats before, rather than after they have occurred.
Rob Bates | TrustRadius Reviewer

Screenshots

Pricing Details

Nmap

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

SolarWinds Threat Monitor

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Rating Summary

Likelihood to Recommend

Nmap
9.7
SolarWinds Threat Monitor
6.5

Support Rating

Nmap
7.9
SolarWinds Threat Monitor
8.0

Add comparison