Check Point CloudGuard CNAPP vs Rapid7 Metasploit comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
1,472 views|862 comparisons
93% willing to recommend
Rapid7 Logo
2,660 views|1,560 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point CloudGuard CNAPP and Rapid7 Metasploit based on real PeerSpot user reviews.

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point CloudGuard CNAPP vs. Rapid7 Metasploit Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is able to bring visibility into that cloudy space where the security departments do not really see what is happening on the DevOps side. It brings visibility, security control, and standardization.""The most valuable feature is the ability to work with the APIs to integrate into our own backend systems.""It helps us to analyze vulnerabilities way before they get installed in production and the web. It gives us more security in the production environment.""Assets Management as it provide complete visibility of our workload inkling EC2 instance or Serverless""The most valuable feature is posture management, which gives you complete visibility of all your assets in the cloud and allows you to do governance and compliance.""The product allows us to enhance the security of the implementations we have.""We like the ability to investigate, analyze, and generate reports.""Cloud security posture management is the feature we've been using the longest."

More Check Point CloudGuard CNAPP Pros →

"The most valuable features of the solution are the scripts, the modules, and the tools that the Rapid7 Metasploit framework has.""I use Rapid7 Metasploit for payload generation and Post-Exploitation.""The Search Engineering feature is good.""It contains almost all the available exploits and payloads.""It's not possible to do penetration testing without being very proficient in Metasploit.""Stability-wise, I rate the solution a nine out of ten...Scalability-wise, I rate the solution a nine out of ten.""The option to generate phishing emails has proven to be very valuable in understanding the behavior of users.""The reporting on the solution is good."

More Rapid7 Metasploit Pros →

Cons
"In general, for the product to be successful, they need to improve security, and configuration detection.""The costs are really high if you want the entire capabilities of the platform.""Check Point tools need to improve the latency in the portal since they take a long time to load.""CloudGuard could be more customizable. It has built-in standards for things like GDPR compliance. But depending on your business lane, you might want to build your own controls based on your own standards.""The license cost is expensive and has room for improvement.""The software configurations theory is complicated, and without proper planning and a well-skilled technical team, it cannot perform its tasks properly.""We're looking for a solution that can incorporate legacy infrastructure for some of our business needs.""Automatic remediation requires read/write access. When providing read/write access to third-party applications, this can add risk. It should have some options of triggering API calls to the cloud platform, which in turn, can make the required changes."

More Check Point CloudGuard CNAPP Cons →

"If your company's patch is not up to date, but you have other detection or defense solutions such as endpoint detection and response and antivirus software, the product exploit may not work effectively. This is because its exploit database update process is slow and not real-time. For zero-day vulnerabilities or new security threats, relying on Rapid7 Metasploit alone may not be effective.""The solution is not very scalable, it does not provide any automation to be able to scale it.""The open-source version has reporting limitations. You need to develop these capabilities yourself. Built-in reporting is an excellent feature for penetration testing, but it isn't a must-have. The solution could also cover more vulnerabilities. Metasploit has around 10,000 exploits in its library, but more is always better.""We'd like them to offer better coverage of malware.""It is necessary to add some training materials and a tutorial for beginners.""The solution is not user-friendly and has room for improvement.""At the time I was using it, the graphical user interface needed some improvements.""There are numerous outdated exploits in their database that should be updated."

More Rapid7 Metasploit Cons →

Pricing and Cost Advice
  • "​They support either annual licensing or hourly. At the time of our last negotiation, it was either one or the other, you could not mix or match. I would have liked to mix/match. ​"
  • "I would advise taking into account the existing number of devices and add a forecast of the number of devices to be added in the coming year or two, to obtain better pricing."
  • "It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution."
  • "The licensing and costs are straightforward, as they have a baseline of 100 workloads (number of instances) within one license with no additional nor hidden charges. If you want to have 200 workloads under Dome9, then you need to take out two licenses for that. Also, it does not have any impact on cloud billing, as data is shared using the API call. This is well within the limit of free API calls provided by the cloud provider."
  • "I suggest that you pay attention to the product pricing because while there are no tricks, and the licensing model is transparent, the final numbers may surprise you."
  • "Right now, we have licenses on 500 machines, and they are not cheap."
  • "The pricing is tremendous and super cheap. It is shockingly cheap for what you get out of it. I am happy with that. I hope that doesn't get reported back and they increase the prices. I love the pricing and the licensing makes sense. It is just assets: The more stuff that you have, the more you pay."
  • "Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
  • More Check Point CloudGuard CNAPP Pricing and Cost Advice →

  • "I use the open-source version of this product. Pricing is not relevant."
  • "It is expensive. Our license expired, and our company is not thinking to renew because of our budget."
  • "The great advantage with Rapid7 Metasploit, of course, is that it's free."
  • "There are two versions available, one of which is the Pro version, and the other is the free version."
  • "Rapid7 Metasploit is cheaper than Tenable.io Vulnerability Management."
  • "On a scale of one to ten, where one is cheap and ten is expensive, I rate the product's pricing a six. So it's fairly priced."
  • "The pricing structure involves a one-time purchase cost of approximately twenty thousand dollars or euros for all customers."
  • "We pay monthly. The pricing is reasonable."
  • More Rapid7 Metasploit Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The visibility in our cloud environment is the most valuable feature.
    Top Answer:We have concerns regarding the pricing and would appreciate seeing some improvements.
    Top Answer:I use Rapid7 Metasploit for payload generation and Post-Exploitation.
    Top Answer:Rapid7 Metasploit could be made easier for new users to learn.
    Ranking
    5th
    Views
    1,472
    Comparisons
    862
    Reviews
    48
    Average Words per Review
    651
    Rating
    8.5
    11th
    Views
    2,660
    Comparisons
    1,560
    Reviews
    7
    Average Words per Review
    402
    Rating
    7.9
    Comparisons
    Also Known As
    Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
    Metasploit
    Learn More
    Overview

    Check Point CloudGuard CNAPP is a robust cloud security solution, offering comprehensive protection for cloud workloads and applications against cyberattacks. This platform encompasses cloud security posture management, threat prevention, and efficient incident response, providing organizations with a unified defense against threats. Key features include continuous visibility and remediation of misconfigurations, threat prevention through various techniques like intrusion prevention and malware detection, and rapid, cost-effective incident response. With CloudGuard CNAPP, you can safeguard cloud-native applications, cloud infrastructure, and sensitive data, enhancing your overall cloud security posture. This solution is a powerful asset for organizations seeking to fortify their cloud environments against a range of cyber threats.

    Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

    Sample Customers
    Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
    City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University
    Top Industries
    REVIEWERS
    Security Firm23%
    Financial Services Firm19%
    Computer Software Company10%
    Cloud Provider8%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company15%
    Security Firm8%
    Manufacturing Company7%
    REVIEWERS
    Comms Service Provider36%
    Financial Services Firm18%
    Computer Software Company9%
    Mining And Metals Company9%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm9%
    Manufacturing Company9%
    Government8%
    Company Size
    REVIEWERS
    Small Business45%
    Midsize Enterprise12%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise11%
    Large Enterprise62%
    REVIEWERS
    Small Business26%
    Midsize Enterprise26%
    Large Enterprise47%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise18%
    Large Enterprise57%
    Buyer's Guide
    Check Point CloudGuard CNAPP vs. Rapid7 Metasploit
    March 2024
    Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Rapid7 Metasploit and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Check Point CloudGuard CNAPP is ranked 5th in Vulnerability Management with 60 reviews while Rapid7 Metasploit is ranked 11th in Vulnerability Management with 18 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Rapid7 Metasploit is rated 7.6. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Rapid7 Metasploit writes "Helps find vulnerabilities in a system to determine whether the system needs to be upgraded". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Microsoft Defender for Cloud and CrowdStrike Falcon Cloud Security, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Pentera, Rapid7 InsightVM, Acunetix and Havoc Shield. See our Check Point CloudGuard CNAPP vs. Rapid7 Metasploit report.

    See our list of best Vulnerability Management vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.