Anonymous UserPrincipal security consultant at a computer software company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Takes reports from other vulnerabilities."
"The most valuable feature for us is the support for testing Linux-based web server components."
"The reporting on the solution is good."
"All of the features are great."
"No third-party applications or integrations with additional software solutions."
"Better automation capabilities would be an improvement."
"The solution should improve the responsiveness of its live technical support."
"At the time I was using it, the graphical user interface needed some improvements."
"The great advantage with Rapid7 Metasploit, of course, is that it's free."
Earn 20 points
Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
BMC TrueSight Vulnerability Management is ranked 14th in Vulnerability Management with 1 review while Rapid7 Metasploit is ranked 8th in Vulnerability Management with 3 reviews. BMC TrueSight Vulnerability Management is rated 7.0, while Rapid7 Metasploit is rated 7.6. The top reviewer of BMC TrueSight Vulnerability Management writes "Good features for infrastructure application; lacking in integrations with other software ". On the other hand, the top reviewer of Rapid7 Metasploit writes "Straightforward to set up, and helpful for moving from development to production". BMC TrueSight Vulnerability Management is most compared with Tenable SC, Qualys VM, Tenable Nessus, CyberGRX and Rapid7 InsightVM, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Rapid7 InsightVM, Wireshark, Darktrace and Qualys VM.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.