Compare Qualys VM vs. Rapid7 Metasploit

Qualys VM is ranked 2nd in Vulnerability Management with 8 reviews while Rapid7 Metasploit is ranked 6th in Vulnerability Management with 2 reviews. Qualys VM is rated 8.6, while Rapid7 Metasploit is rated 7.0. The top reviewer of Qualys VM writes "The main purpose was to remove the granularity. It really helped us manage the security of our organization". On the other hand, the top reviewer of Rapid7 Metasploit writes "The integration between Nmap, the database and Metasploit saves a lot of time. The initial setup was a bit tricky". Qualys VM is most compared with Tenable Nessus, Rapid7 InsightVM and Tenable SecurityCenter, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Wireshark and Rapid7 InsightVM. See our Qualys VM vs. Rapid7 Metasploit report.
Cancel
You must select at least 2 products to compare!
Qualys VM Logo
11,594 views|7,522 comparisons
Rapid7 Metasploit Logo
5,107 views|3,528 comparisons
Most Helpful Review
Find out what your peers are saying about Qualys VM vs. Rapid7 Metasploit and other solutions. Updated: January 2020.
391,932 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The most valuable features are vulnerability detection and the scanning capability to enable identification of vulnerabilities across our network.Technical support is fantastic.There are fewer false positives when using this solution.Tech support is helpful.It is quite easy to implement.It is a simple solution that makes scanning easy. You just give it a scheduled task, and it will do everything for you.The reporting is fine.I find the most valuable features are the continuous monitoring. Even on premises, there is constant monitoring.

Read more »

The option to generate phishing emails has proven to be very valuable in understanding the behavior of users.It contains almost all the available exploits and payloads.It's not possible to do penetration testing without being very proficient in Metasploit.

Read more »

Cons
I would like to see this solution more developed and competitive in the Cloud space.It's quite complex on the way it is set up, so it takes a fair bit of time in order to get your head around it in order to deploy it. Once you've deployed it, then you're never confident on the versions of the browsers and the SSL certificates, etc. You have to always go back into Qualys and check.I do not like that all of the data is stored on the cloud.When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.It is more expensive vs. other products on the market.The only improvement I can think of is on the implementation side. At times it is a bit slow.They have integrated with other third parties, but it is still not viable.When tested on Zero day, there were errors.

Read more »

Metasploit cannot be installed on a machine with an antivirus.It is necessary to add some training materials and a tutorial for beginners.The initial setup was a bit "tweaky" for the open-source version.

Read more »

Pricing and Cost Advice
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.It is more expensive than other products on the market.

Read more »

It is expensive. Our license expired, and our company is not thinking to renew because of our budget.I use the open-source version of this product. Pricing is not relevant.

Read more »

report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
391,932 professionals have used our research since 2012.
Ranking
2nd
Views
11,594
Comparisons
7,522
Reviews
8
Average Words per Review
280
Avg. Rating
8.6
6th
Views
5,107
Comparisons
3,528
Reviews
2
Average Words per Review
314
Avg. Rating
7.0
Top Comparisons
Compared 40% of the time.
Compared 15% of the time.
Compared 6% of the time.
Compared 62% of the time.
Compared 11% of the time.
Also Known As
QualysGuard VMMetasploit
Learn
Qualys
Rapid7
Overview

Qualys Vulnerability Management (VM) is a cloud-based service that gives you immediate, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps you to continuously identify threats and monitor unexpected changes in your network before they turn into breaches.

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

Offer
Learn more about Qualys VM
Learn more about Rapid7 Metasploit
Sample Customers
Agrokor Group, American Specialty Health, American State Bank, Arval, Life:), Axway, Bank of the West, Blueport Commerce, BSkyB, Brinks, CaixaBank, Cartagena, Catholic Health System, CEC Bank, Cegedim, CIGNA, Clickability, Colby-Sawyer College, Commercial Bank of Dubai, University of Utah, eBay Inc., ING Singapore, National Theatre, OTP Bank, Sodexo, WebExCity of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University
Top Industries
REVIEWERS
Comms Service Provider27%
Healthcare Company20%
Financial Services Firm13%
Manufacturing Company13%
VISITORS READING REVIEWS
Software R&D Company27%
Comms Service Provider16%
Financial Services Firm9%
Healthcare Company6%
VISITORS READING REVIEWS
Software R&D Company28%
Comms Service Provider26%
Media Company8%
Non Profit7%
Find out what your peers are saying about Qualys VM vs. Rapid7 Metasploit and other solutions. Updated: January 2020.
391,932 professionals have used our research since 2012.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.