Rapid7 InsightVM Review !
January 13, 2023

Rapid7 InsightVM Review !

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Rapid7 InsightVM

Rapid7 InsightVM is very much useful in using as a Centralized tool or console for Compliance and vulnerability management. It scans the services or devices in your network and generates reports based on its own database. This report include all the running vulnerabilities and also it gives details on remediation of it. So it becomes very much useful for handling vulnerability management and compliance requirement.
  • Automatic Scanning of devices
  • Good reporting
  • Easy to manage
  • Costing
  • False positive findings
  • Automatic device addition or removal
  • User Friendly console
  • Easy to manage
  • Good reporting
  • It is helpful for achieving our vulnerability and compliance requirement
  • Its dashboard gives very good graphical view of report
  • As a admin, it is very much easy to manage
  • Only concern with the tool I have is its costing

Do you think Rapid7 InsightVM delivers good value for the price?

Yes

Are you happy with Rapid7 InsightVM's feature set?

Yes

Did Rapid7 InsightVM live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Rapid7 InsightVM go as expected?

Yes

Would you buy Rapid7 InsightVM again?

Yes

Rapid7 InsightVM is well suited for large enterprises where it automatically detects new devices and start scanning it. So it completely eliminates the dependency of manually adding newly added services / devices for the scanning. Even same goes for the devices which are decommissioned. No need of manually removing it. So this way, it works very well with large enterprises as a Centralized tool for vulnerability and compliance management.

Rapid7 InsightVM Feature Ratings

IT Asset Realization
9
Authentication
9
Configuration Monitoring
9
Web Scanning
9
Vulnerability Intelligence
9
Network Analytics
9
Vulnerability Classification
8
Automated Alerts and Reporting
10
Threat Analysis
8
Threat Intelligence Reporting
9
Automated Threat Identification
9
Threat Recognition
8