Nmap is the basis for all other scanners
April 14, 2021

Nmap is the basis for all other scanners

Greg Madden, CISSP | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Nmap

We use Nmap to do internal vulnerability testing and identifying holes in network security. The most common use case for me is to use Nmap to identify running services on devices to spot potential weaknesses in firewall rules or router rules. Many employees are familiar with Nmap and use it as well. It helps us identify problems quickly in new environments before we move to vulnerability scanning.
  • Nmap is great at finding live hosts on the network
  • Nmap is great for teaching new cyber specialist how network reconnaissance works
  • Nmap is built into every major recon tool on the market, it just works when it comes to scanning
  • There could be more built in tools for further vulnerability scanning
  • command line Nmap should store recent scans automatically
  • More detail in the help menu for what some of the triggers actually do
  • Subnet scans
  • Zenmaps GUI
  • Simplicity of command structure
  • Drastically sped up network discovery
  • Decreased initial target acquisition time in pen testing
  • Identified issues within our own environment with open ports
Nmap is the basis for all of its competitors. They all have Nmap built in and before you ever move beyond it, you have to understand it

Do you think Nmap delivers good value for the price?


Are you happy with Nmap's feature set?


Did Nmap live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Nmap go as expected?


Would you buy Nmap again?


One of Nmaps strongest skills is the ability to gather initial evidence about networks to begin narrowing down target windows. Nmap can scan entire subnets and find only live hosts and then more intensively scan the live hosts to help identify which ones have the most vulnerable services or open ports. It is not suited for actual exploitation, just the initial steps

Nmap Feature Ratings

Automated network device discovery
Network monitoring
Baseline threshold calculation
Network mapping
Customizable reports
Wireless infrastructure monitoring
Hardware health monitoring