You should already be using Nmap
October 08, 2019
You should already be using Nmap
Score 10 out of 10
Vetted Review
Verified User
Overall Satisfaction with Nmap
NMap is used both by my department and other departments within our IT section. In particular, the network engineering department uses it to identify end-hosts that may be unauthorized to be on our network, while the security department uses it to assess the threats of different hosts within the enterprise network.
- Highly accurate endpoint identification
- Vulnerability scanning is detailed and clear.
- Easily scripted and analyzed
- CLI only; there is an unofficial graphical interface (but it isn't too great)
- Not supported by a vendor
- Somewhat steep learning curve
- Increased Security (able to find and remove threats, obsolete devices, etc)
- Improved knowledge of existing network devices
- Improved mean-time-to-resolution of security incidents
- BeyondTrust Network Security Scanner and powered by Retina
NMap usually lacks the features of the other network scanners, but for a good reason: most of the other network scanners out there are using NMap as part of their system. The nature of NMap (being open-source) is that it is available for use in other applications; as a result, these other applications make use of the NMap source code.
Do you think Nmap delivers good value for the price?
Yes
Are you happy with Nmap's feature set?
Yes
Did Nmap live up to sales and marketing promises?
Yes
Did implementation of Nmap go as expected?
Yes
Would you buy Nmap again?
Yes