A leader tool for pentesting
January 09, 2023

A leader tool for pentesting

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Rapid7 InsightVM

I used to use Rapid7 InsightVM as a pentesting tool. I implemented the solution on servers to test the client environment by scanning sensitive servers. The main goal is to find weaknesses and vulnerabilities in the systems that could be exploited by hackers. And then generate a report that could be used as a reference for patching the system.
  • vulnerability managment
  • applicative security
  • orchestration
  • produt implementation
  • report clearness
  • time to execute scans can be improved
  • progress tracking
  • full network scan capability
  • patch managment
  • less attackes good be succefull
  • less investment on audit and external pentesting resources
  • fully automated solution with few human interaction needed
Rapid7 InsightVM is a more professional tool than Nessus because historically, it was based on metasploit which is a powerful pentesting and exploiting tool. InsightVM covers more attacking scenarios and vulnerabilities than competitors and still a leader in this domain.cloud capability is also not available forNesuus and some other products. Rapid7 InsightVM is a way better as a pentesting tool in my opinion

Do you think Rapid7 InsightVM delivers good value for the price?

Yes

Are you happy with Rapid7 InsightVM's feature set?

Yes

Did Rapid7 InsightVM live up to sales and marketing promises?

Yes

Did implementation of Rapid7 InsightVM go as expected?

Yes

Would you buy Rapid7 InsightVM again?

Yes

Rapid7 InsightVM is perfect for a scenario where IT admin or CISO wants to scan its infrastructure to be sure that there is no vulnerability that could be exploited from outside or inside the company. It also could be used to automate patching and dealing with vulnerabilities. It's also adapted for users that need cloud security management

Rapid7 InsightVM Feature Ratings

IT Asset Realization
6
Authentication
7
Configuration Monitoring
8
Web Scanning
9
Vulnerability Intelligence
8
Network Analytics
8
Vulnerability Classification
8
Automated Alerts and Reporting
9
Threat Analysis
9
Threat Intelligence Reporting
Not Rated
Automated Threat Identification
7
Threat Recognition
8