Overall Satisfaction with Nmap
We use Nmap to do internal vulnerability testing and identifying holes in network security. The most common use case for me is to use Nmap to identify running services on devices to spot potential weaknesses in firewall rules or router rules. Many employees are familiar with Nmap and use it as well. It helps us identify problems quickly in new environments before we move to vulnerability scanning.
- Nmap is great at finding live hosts on the network
- Nmap is great for teaching new cyber specialist how network reconnaissance works
- Nmap is built into every major recon tool on the market, it just works when it comes to scanning
- There could be more built in tools for further vulnerability scanning
- command line Nmap should store recent scans automatically
- More detail in the help menu for what some of the triggers actually do
- Subnet scans
- Zenmaps GUI
- Simplicity of command structure
- Drastically sped up network discovery
- Decreased initial target acquisition time in pen testing
- Identified issues within our own environment with open ports
Nmap is the basis for all of its competitors. They all have Nmap built in and before you ever move beyond it, you have to understand it
Do you think Nmap delivers good value for the price?
Yes
Are you happy with Nmap's feature set?
Yes
Did Nmap live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Nmap go as expected?
Yes
Would you buy Nmap again?
Yes