Check Point CloudGuard CNAPP vs Rapid7 Metasploit comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
1,461 views|877 comparisons
95% willing to recommend
Rapid7 Logo
2,672 views|1,553 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point CloudGuard CNAPP and Rapid7 Metasploit based on real PeerSpot user reviews.

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point CloudGuard CNAPP vs. Rapid7 Metasploit Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The reporting is quite good. It is the most powerful aspect of this solution.""It helps us to analyze vulnerabilities way before they get installed in production and the web. It gives us more security in the production environment.""The most valuable features of CloudGuard CNAPP are its compliance engine and auto-remediation features.""We like the ability to investigate, analyze, and generate reports.""It presents a real-time database that is always updated.""On Dome9, you can have reports on compliance, users created, and EAM access to the cloud infrastructure. For example, if some machine is exposed to the Internet, importing and exporting to the Internet when it shouldn't, we get immediate alerts if someone does this type of configuration by mistake. Dome9 is very important because AWS doesn't protect us for this. It is the client's responsibility to make sure that we don't export things to the Internet. This solution helps us ensure that we comply with our security measures.""The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring.""This platform has allowed us to collect data from multiple sources, centralizing everything under a single source."

More Check Point CloudGuard CNAPP Pros →

"The most valuable features of the solution are the scripts, the modules, and the tools that the Rapid7 Metasploit framework has.""The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers.""It allows us to concentrate solely on identified vulnerabilities without the hassle of additional setup.""The greatest advantage of Rapid7 Metasploit is that it is the only system that can directly exploit vulnerabilities on the Metasploit platform.""Stability-wise, I rate the solution a nine out of ten...Scalability-wise, I rate the solution a nine out of ten.""Technical support has been helpful and responsive.""The option to generate phishing emails has proven to be very valuable in understanding the behavior of users.""It's not possible to do penetration testing without being very proficient in Metasploit."

More Rapid7 Metasploit Pros →

Cons
"The impact analysis that they perform can be improved. It is currently lacking. It should be more detailed.""It should capture more information in metadata including communication detail. Also, Internal IP addresses should not be tracked as this might be having some compliance issues.""Their service needs improvement.""There are opportunities for improvement that can be addressed through a roadmap.""The false positives can be annoying at times.""The tool has a lot of potential, but today, it lacks a lot of Scripts/Bots for Azure.""I strongly advise that the multi-layered security system of Check Point often undergoes updates and new versions keep coming.""I’d like to see more integration with third-party tools. For example, it would be helpful to have an integration between Dome9 and ServiceNow to manage security incidents and security changes."

More Check Point CloudGuard CNAPP Cons →

"I would like to see more capabilities, more functions, and more features. More types of attack vectors.""Rapid7 Metasploit can add a GUI feature because it is only available online.""The initial setup was a bit "tweaky" for the open-source version.""The open-source version has reporting limitations. You need to develop these capabilities yourself. Built-in reporting is an excellent feature for penetration testing, but it isn't a must-have. The solution could also cover more vulnerabilities. Metasploit has around 10,000 exploits in its library, but more is always better.""There are numerous outdated exploits in their database that should be updated.""It is necessary to add some training materials and a tutorial for beginners.""Rapid7 Metasploit could be made easier for new users to learn.""The solution is not very scalable, it does not provide any automation to be able to scale it."

More Rapid7 Metasploit Cons →

Pricing and Cost Advice
  • "​They support either annual licensing or hourly. At the time of our last negotiation, it was either one or the other, you could not mix or match. I would have liked to mix/match. ​"
  • "I would advise taking into account the existing number of devices and add a forecast of the number of devices to be added in the coming year or two, to obtain better pricing."
  • "It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution."
  • "The licensing and costs are straightforward, as they have a baseline of 100 workloads (number of instances) within one license with no additional nor hidden charges. If you want to have 200 workloads under Dome9, then you need to take out two licenses for that. Also, it does not have any impact on cloud billing, as data is shared using the API call. This is well within the limit of free API calls provided by the cloud provider."
  • "I suggest that you pay attention to the product pricing because while there are no tricks, and the licensing model is transparent, the final numbers may surprise you."
  • "Right now, we have licenses on 500 machines, and they are not cheap."
  • "The pricing is tremendous and super cheap. It is shockingly cheap for what you get out of it. I am happy with that. I hope that doesn't get reported back and they increase the prices. I love the pricing and the licensing makes sense. It is just assets: The more stuff that you have, the more you pay."
  • "Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
  • More Check Point CloudGuard CNAPP Pricing and Cost Advice →

  • "I use the open-source version of this product. Pricing is not relevant."
  • "It is expensive. Our license expired, and our company is not thinking to renew because of our budget."
  • "The great advantage with Rapid7 Metasploit, of course, is that it's free."
  • "There are two versions available, one of which is the Pro version, and the other is the free version."
  • "Rapid7 Metasploit is cheaper than Tenable.io Vulnerability Management."
  • "On a scale of one to ten, where one is cheap and ten is expensive, I rate the product's pricing a six. So it's fairly priced."
  • "The pricing structure involves a one-time purchase cost of approximately twenty thousand dollars or euros for all customers."
  • "We pay monthly. The pricing is reasonable."
  • More Rapid7 Metasploit Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The visibility in our cloud environment is the most valuable feature.
    Top Answer:We have concerns regarding the pricing and would appreciate seeing some improvements.
    Top Answer:I use Rapid7 Metasploit for payload generation and Post-Exploitation.
    Top Answer:Rapid7 Metasploit could be made easier for new users to learn.
    Ranking
    6th
    Views
    1,461
    Comparisons
    877
    Reviews
    55
    Average Words per Review
    672
    Rating
    8.6
    12th
    Views
    2,672
    Comparisons
    1,553
    Reviews
    7
    Average Words per Review
    402
    Rating
    7.9
    Comparisons
    Also Known As
    Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
    Metasploit
    Learn More
    Overview

    Check Point CloudGuard CNAPP is a robust cloud security solution, offering comprehensive protection for cloud workloads and applications against cyberattacks. This platform encompasses cloud security posture management, threat prevention, and efficient incident response, providing organizations with a unified defense against threats. Key features include continuous visibility and remediation of misconfigurations, threat prevention through various techniques like intrusion prevention and malware detection, and rapid, cost-effective incident response. With CloudGuard CNAPP, you can safeguard cloud-native applications, cloud infrastructure, and sensitive data, enhancing your overall cloud security posture. This solution is a powerful asset for organizations seeking to fortify their cloud environments against a range of cyber threats.

    Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

    Sample Customers
    Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
    City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University
    Top Industries
    REVIEWERS
    Security Firm22%
    Financial Services Firm18%
    Computer Software Company11%
    Cloud Solution Provider8%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company15%
    Security Firm8%
    Manufacturing Company8%
    REVIEWERS
    Comms Service Provider36%
    Financial Services Firm18%
    Computer Software Company9%
    Mining And Metals Company9%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm10%
    Manufacturing Company10%
    Government7%
    Company Size
    REVIEWERS
    Small Business43%
    Midsize Enterprise12%
    Large Enterprise45%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise11%
    Large Enterprise63%
    REVIEWERS
    Small Business26%
    Midsize Enterprise26%
    Large Enterprise47%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise18%
    Large Enterprise58%
    Buyer's Guide
    Check Point CloudGuard CNAPP vs. Rapid7 Metasploit
    May 2024
    Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Rapid7 Metasploit and other solutions. Updated: May 2024.
    772,649 professionals have used our research since 2012.

    Check Point CloudGuard CNAPP is ranked 6th in Vulnerability Management with 64 reviews while Rapid7 Metasploit is ranked 12th in Vulnerability Management with 18 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Rapid7 Metasploit is rated 7.6. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Darktrace, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Acunetix, Rapid7 InsightVM and Darktrace. See our Check Point CloudGuard CNAPP vs. Rapid7 Metasploit report.

    See our list of best Vulnerability Management vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.