vishnummv - PeerSpot reviewer
vCISO / GRC / Cybersecurity consultant at a tech services company with 1-10 employees
Real User
Top 10
Effective and strong in terms of its functionality but absence of cloud features
Pros and Cons
  • "From a functionality standpoint, it's robust and straightforward to comprehend."
  • "Nmap major operates through the CLI; there's no GUI component, and that's where the challenge is."

What is our primary use case?

One major use case is port scanning for open reduction. We examine the default open ports in an organization to assess exposure. 

Additionally, we use it to validate specific applications externally and assess the penetrability of a given environment. Various scripts and combinations help us understand configuration, uncover unrealistic ports, and determine appropriate actions.

We assess the potential for lateral movement and evaluate the extent of penetration from an attack surface perspective. Nmap is crucial for reconnaissance, helping us identify and act on vulnerabilities.

The solution is part of our cybersecurity arsenal. When it comes to financial security, these tools are fundamental to running the show.

What is most valuable?

My preference for Nmap is not solely based on the tool itself. t boils down to two main aspects. 

First, considering the expected outcomes, if the tool can deliver what we're seeking, it adds a layer of ease. 

Secondly, from an overall Nmap perspective, I find it advantageous as it can be seamlessly combined with other tools or scripts. This flexibility allows us to make informed decisions regarding cyber constraints and even facilitates lateral movement. 

Moreover, automation becomes feasible in certain scenarios. For instance, Nmap integrates components of vulnerability scanning tools like Nessus, OpenRAS, or AppID. This integration ensures a clear understanding of the details and required outcomes, making it an effective tool for reconnaissance.

What needs improvement?

Nmap major operates through the CLI; there's no GUI component, and that's where the challenge is. However, there's a gradual evolution in this aspect. 

I haven't observed the introduction of a graphical layer from a UI perspective, but if it does happen, it could handle tasks similar to Wireshark. But Nmap wouldn't replace Wireshark, as they serve distinct roles. 

The integration of these components becomes feasible, allowing for effective collaboration. Presently, Nmap lacks the capability for packet capturing or reading, but in real-time scenarios, combining it with other tools can yield efficient results. 

To enhance its capabilities, focusing on APIs would be a logical starting point, although the current options are somewhat limited. The digital space is evolving rapidly, so there's ample room for improvement.  

For how long have I used the solution?

We have been working with this solution for more than 12 years now.

Buyer's Guide
Nmap
May 2024
Learn what your peers think about Nmap. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
772,649 professionals have used our research since 2012.

What do I think about the stability of the solution?

I would rate the stability a nine out of ten. Patches will always be there, but everything produces results, and it's targeted. 

We don't face challenges in terms of revalidation, making it quite stable.

What do I think about the scalability of the solution?

I would rate the scalability an eight out of ten. 

Cloud features are absent, which is a significant drawback. However, the tool is highly effective and robust in mature aspects.

Size doesn't matter. Scanning and operation time may vary based on size, but Nmap can be adopted anywhere. It's not restricted by company size.

How are customer service and support?

It's an open-source product, and I haven't seen any premiums. Options are available for those who purchase, but for my use case, everything I need is available in the community and forums. 

In enterprise-level scenarios, if issues arise with embedding components or technical partnerships with vendors, support is available. 

However, common users and evangelists typically rely on the community for assistance.

Which solution did I use previously and why did I switch?

Nmap cannot be compared with any enterprise-level variants. However, SolarWinds is a candidate as they operate in the NMS space. 

Nagios is another tool, an open-source, one providing visualization. The basic data collection is from Nmap, and they have the Nmap library in their Nagios part. It's not directly comparable because they've taken some features or the library and developed a different tool on top of it. That's what I've observed in the market.

How was the initial setup?

From a usability perspective, the tool is a bit complex, but from a functionality standpoint, it's robust and straightforward to comprehend. 

Initial setup might pose a challenge for newcomers, but over time, it becomes more manageable.

It can be deployed as a hybrid model, provided the cloud used has backend connectivity to physical data centers. However, it's not SaaS-friendly like tools such as SolarWinds, as Nmap was developed in a time when cloud dominance and virtualization were not prevalent. Adaptability is somewhat limited, and that's what got missed.

Which other solutions did I evaluate?

As a consultant, I aim for a vendor-neutral approach. Whenever there's a need or requirement, we adapt accordingly. Our major focus is on understanding the customer's exact needs, especially when commercial convergence is involved. Based on that, we position ourselves.

What other advice do I have?

Overall, I would rate the solution a seven out of ten. The reason is that cloud and GUI scenarios are not well addressed, but it's a reliable component for various purposes.

It's a dependable and reliable tool for any reconnaissance activity. It's a good choice for basic tech service management recon.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
AdeelAgha - PeerSpot reviewer
Team Lead - Cyber Security & Compliance at Al Tuwairqi Group
Real User
Top 5Leaderboard
It's a user-friendly solution, but has static functionalities
Pros and Cons
  • "It is a very user-friendly product."
  • "They should deliver Playtech's username and password."

What is our primary use case?

We use Nmap for network monitoring and checking. It helps us establish network communication to get a clear text. If there is any network device on our premises, we can catch it for monitoring.

What is most valuable?

The solution's most valuable and evident feature is identifying the status of any specific network. That means finding out the configuration of the network or IP whether it is active or non-active, if the network modes are open or closed, etc.

What needs improvement?

The solution has been static concerning its functionality for the last ten years. It only gives out specific information about IPs, such as network, DNS address, and a class of IPs. They do not provide any additional features apart from these. They should give more efficient information, such as the activity status of the NET file. Unfortunately, I cannot find any update there.

They should deliver Playtech's username and password, similar to Wireshark. It's been user-friendly for a basic level of network expertise. In comparison, Wireshark offers expertise on a higher level. The solution should deliver advanced features for getting communication with clear text in terms of passwords and usernames.

For how long have I used the solution?

I have been using Nmap for the last ten years.

What do I think about the scalability of the solution?

Around 50+ users in our company, including the cyber-security and network team, use the solution.

Which solution did I use previously and why did I switch?

We used Wireshark as well. It provided advanced information, but the procedure and technique differed significantly from Nmap. Whereas Nmap is a legacy product. We get personalized information from the network with its help. We can quickly identify the information we require with some basic knowledge.

How was the initial setup?

The initial setup had moderate complexity. We have to scan a new system, download and install it in the workstation for the basic connectivity status of IPs and TCP hosts. It takes a maximum of 10-15 minutes for the process.

What's my experience with pricing, setup cost, and licensing?

The solution is free of cost, but there are specific services that we have to buy. We have purchased a license for a professional version. It's open source at some level, but not for all features.

What other advice do I have?

I advise others to decide for what purpose they want to use the solution. If they want to test the availability of the network code or the basic information about the network and domain, then I recommend the solution. But if they are looking for expert-level monitoring, they should ideally go for Parrot OS or Linux OS, or the Wireshark tool. As far as UI and stability, Nmap is a good application. Otherwise, it has a limited amount of expertise.

I rate the solution as a seven.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Nmap
May 2024
Learn what your peers think about Nmap. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
772,649 professionals have used our research since 2012.
Oussama Ben Taher - PeerSpot reviewer
Consultant at a tech vendor with 10,001+ employees
MSP
Top 20
Displays all the services that are exposed within a permission system

What is our primary use case?

We use the solution to add up the router on a network.

What is most valuable?

Nmap can display all the services that are exposed within a permission system. It offers an option to optimize the scanning process, ensuring that our scans remain undetected by other security tools integrated into the automation system. Additionally, Nmap provides features to adjust the nature of the scan, allowing it to bypass security tools such as EDP and base. Furthermore, it includes options to optimize scan response time and duration.

What needs improvement?

Sometimes, the solution doesn't provide the names of services. We find a solution, but we do not entirely know about it. It utilizes a database of services. When the solution scans, it matches the data obtained from the scan with the entries in the database to display the names of services at the target site. For example, we might have an exposed port but remain uncertain about the associated service. Nmap can identify what services are running and their associated products. It doesn't allow exploiting vulnerabilities automatically. However, having such capabilities could greatly enhance security, particularly for servers exposed to the internet. 

For how long have I used the solution?

I have been using Nmap for one and a half years.

What do I think about the stability of the solution?

The product is stable.

How was the initial setup?

The initial setup is simple.

What other advice do I have?

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Youssef EL AZZOUZI - PeerSpot reviewer
Intern Master in Cybersecurity and Cybercrime at Université Abdelmalek Essaâdi
Real User
Top 5Leaderboard
Efficiently scans and monitors network ports
Pros and Cons
  • "It helps us secure the network infrastructure."
  • "The solution's initial setup could be better."

What is our primary use case?

We use the solution to scan and monitor ports. We can get insights into operating systems, status, protocols, and services.

What is most valuable?

The solution's most valuable feature is scanning.

What needs improvement?

The solution's initial setup could be better. Also, they should provide more insights into the network infrastructure.

For how long have I used the solution?

I have been using the solution for two years.

How was the initial setup?

The solution's initial setup process is complicated. It requires specific skills to execute the implementation.

What's my experience with pricing, setup cost, and licensing?

It is a free source application.

What other advice do I have?

It is a beneficial tool for scanning. I rate it as an eight.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Venkatesh-K - PeerSpot reviewer
Technical Architect (Cyber Secrity) at HCL Technologies
Real User
Supports coding frameworks, scalable and has a simple setup
Pros and Cons
  • "The initial setup was simple."
  • "The price is high and could be cheaper."

What needs improvement?

The price is high and could be cheaper. The third-party library vulnerability assessment could be included in the next release.

For how long have I used the solution?

We have been using the solution for seven months.

What do I think about the stability of the solution?

The solution is stable. I rate the stability an eight out of ten.

What do I think about the scalability of the solution?

The solution is scalable. Approximately 100 people in our organization utilize it.

How are customer service and support?

We have not had experience with customer service and support.

How was the initial setup?

The initial setup was simple and took us approximately five days.

Which other solutions did I evaluate?

We chose this solution because it supports several frameworks, including coding frameworks.

What other advice do I have?

I rate the solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mehdi Mamaghani - PeerSpot reviewer
Network Security Specialist at Pars Khodro Company
Real User
Top 10
A powerful solution for troubleshooting and finding security holes in services
Pros and Cons
  • "The scanning procedure includes UDP ports which sets it apart from competitors."
  • "It takes a bit of time to get familiar with the solution and its options."

What is our primary use case?

Three technicians in our company use the solution extensively to scan our environment and find security holes. 

What is most valuable?

The solution is powerful for troubleshooting and finding security holes in services. 

The scanning procedure includes UDP ports which sets it apart from competitors. 

What needs improvement?

It takes a bit of time to get familiar with the solution and its options.

A scan to determine whether a service or application is lost would be a useful addition. For example, a scan that checks whether a service in layer seven is blocked by a server or host. 

A graphic interface for Windows would be helpful. 

For how long have I used the solution?

I have been using the solution for one year. 

What do I think about the stability of the solution?

The solution is really stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

I have not needed technical support. 

How was the initial setup?

The setup is quite simple. 

What's my experience with pricing, setup cost, and licensing?

The solution is open source so it is free. 

Which other solutions did I evaluate?

The solution really is not comparable to other products because of its many features. We looked at Wireshark but there's really no comparison. 

What other advice do I have?

I rate the solution a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Carlos Morell - PeerSpot reviewer
Security Specialist at A2secure
Real User
It's an easy-to-use security solution with a simple command-line interface
Pros and Cons
  • "Nmap is easy to use. It's a command-line interface, and the output is quite good."

    What is our primary use case?

    Nmap is a tool for analyzing perimeter security and application output.

    What is most valuable?

    Nmap is easy to use. It's a command-line interface, and the output is quite good. 

    For how long have I used the solution?

    Were a mid-sized company with about 50-plus employees, and we've been using Nmap for more than five years

    What do I think about the stability of the solution?

    Nmap is stable. 

    What do I think about the scalability of the solution?

    Nmap is easy to scale anytime.

    How are customer service and support?

    We've never had to contact support. The community on the forums answers our questions. 

    How was the initial setup?

    Setting up Nmap is effortless. 

    What's my experience with pricing, setup cost, and licensing?

    Nmap is an open-source solution.

    What other advice do I have?

    I rate Nmap nine out of 10. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Harish (Kumar) - PeerSpot reviewer
    Harish (Kumar)Cyber Security and IT Head at a outsourcing company with 51-200 employees
    Top 5LeaderboardReal User

    Industry basic Network scanner. We use it for vulnerability testing. It is the best open source tool. Simple to use with a quantified output. 


    Easy to learn and execute. 

    Chief Security Officer at a tech services company with 11-50 employees
    Real User
    Top 5Leaderboard
    Efficient command line tool and valuable diagnostic features
    Pros and Cons
    • "Nmap has a powerful command line tool and a set of diagnostic features."
    • "There could be a specific option to check non-pingable endpoints for the product."

    What is our primary use case?

    Nmap works as a basic diagnostic and security tool. It helps us discover open ports and check connectivity.

    What is most valuable?

    Nmap has a powerful command line tool and a set of diagnostic features. It enables us to check connectivity and discover open ports.

    What needs improvement?

    There could be a specific option to check non-pingable endpoints for the product.

    What do I think about the stability of the solution?

    We never encountered any system downtime.

    What do I think about the scalability of the solution?

    We have five Nmap users in our organization. We can scan large networks and control speed as well. Thus, it has good features for scalability.

    How are customer service and support?

    I referred to support documentation and forums to resolve the technical issues.

    How was the initial setup?

    It is a command line tool. Thus, we have to install and run it.

    Which other solutions did I evaluate?

    I am exploring a lot of products. However, I am still looking for an alternative for this particular tool.

    What other advice do I have?

    It is a great and simple tool. I rate it a nine out of ten.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Download our free Nmap Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2024
    Product Categories
    Network Monitoring Software
    Buyer's Guide
    Download our free Nmap Report and get advice and tips from experienced pros sharing their opinions.