Try our new research platform with insights from 80,000+ expert users

Cato SASE Cloud Platform vs Rapid7 Metasploit comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (7th), Secure Access Service Edge (SASE) (8th)
Cato SASE Cloud Platform
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
30
Ranking in other categories
WAN Optimization (1st), Intrusion Detection and Prevention Software (IDPS) (12th), Cloud Access Security Brokers (CASB) (6th), Software Defined WAN (SD-WAN) Solutions (6th), WAN Edge (6th), ZTNA as a Service (6th), Secure Access Service Edge (SASE) (3rd), Remote Browser Isolation (RBI) (2nd)
Rapid7 Metasploit
Average Rating
8.0
Reviews Sentiment
6.1
Number of Reviews
22
Ranking in other categories
Vulnerability Management (24th)
 

Mindshare comparison

Secure Access Service Edge (SASE) Market Share Distribution
ProductMarket Share (%)
Cato SASE Cloud Platform10.2%
Prisma Access by Palo Alto Networks12.3%
Zscaler Zero Trust Exchange Platform9.7%
Other67.8%
Secure Access Service Edge (SASE)
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Rapid7 Metasploit1.5%
Wiz6.6%
Tenable Nessus5.1%
Other86.8%
Vulnerability Management
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
AK
Product Lifecycle manager at Air Spring
Integrated platform optimizes network and security management through seamless AI system integration and user-friendly toggles
The platform lacks strong security features on the edge. All security features are on the cloud. For someone who wants to break out traffic locally from the LAN, there are only basic firewalls included. I would like to see more robust edge security features to replace existing customer on-premises firewalls.
reviewer1247523 - PeerSpot reviewer
Head of Sales Services Department at a comms service provider with 51-200 employees
Extensive exploit database and seamless integration enhance penetration testing capabilities
The automated approach in the audits or in the hacking testing with Rapid7 Metasploit could be improved because even the same attack you provide today will go in different ways another day. I prefer when the auditor or pen-tester provides the attack in a non-automated mode. For some, it might be a valuable option, but I'm not sure it's valuable for us, as after the attack has been provided, we should release a report detailing how it transpired and what the customer should improve to block this way of attack. If the attack was provided in an automated mode, you cannot receive sufficient information that helps with this final report for the customer. While you can check the vulnerability, and the system will tell you there is no vulnerability, usually, a human can change one, two, or three parameters and using the same technique and the same scripts can break the system. Rapid7 Metasploit could be improved in areas concerning the experience with finding particular scripts pre-installed in the solution. Customers, administrators, and pen-testers spend considerable time trying to locate the specific component they need by the name of the technique or the name of the attack, so any improvements in making it easier to find those predefined components by name or timeframe would be beneficial. Search filters could be a correct improvement.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"It was a very easy product to install. It can be deployed very fast."
"Cato offers all the functionality found in other solution. The life cycle management is always very stable."
"The scalability is quite good."
"The feature that I find to be the most valuable is the bandwidth aggregation."
"I haven't had any trouble, and practically forget that I'm using it."
"The product is very simple, and everything can be done very quickly."
"The main features we use are the firewall and secure web gateway."
"It is quite simple and easy to use."
"The tool's advantage is that it provides a hassle-free solution that is easy to manage across all customers. For instance, we have a few customers with as few as 50 users, including one with a branch in Vietnam and others with thousands of users."
"I use Rapid7 Metasploit for payload generation and Post-Exploitation."
"Rapid7 has a significant advantage in providing a clear picture of my environment."
"It's not possible to do penetration testing without being very proficient in Metasploit."
"The most valuable features and capabilities of Rapid7 Metasploit are its tight connection with InsightVM, which searches for potential threats and vulnerabilities and then validates whether we can break the system using those vulnerabilities, serving as a validator component of the InsightVM solution."
"The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers."
"It contains almost all the available exploits and payloads."
"All of the features are great."
"The most valuable features of Metasploit include its powerful capabilities for exploitation and scanning."
 

Cons

"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Sometimes, obviously, there are bugs."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"Its pricing could be better."
"For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company ExxonMobil."
"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"However, Cato's solution is modular. You don't have to buy the whole package; instead, you can start with some of the functionality and then expand it as you see fit, based on its value and as your other contracts expire."
"The product must evolve into the endpoint domain."
"They can't do one-to-one NAT (Network Address Translation) in AP (their access point), and that is something that Palo Alto can do."
"There should be a Web Application Firewall feature in the product nodes."
"They should add more sophisticated security features. It should also be integrated into the cloud."
"There's no principal in Malaysia, only a distributor."
"The solution could be made more user friendly for the administrator to use the portal. It is difficult to use it for people who are not experienced with Cato Networks."
"Its functionality is a bit limited in some areas as compared to a Cisco solution. It is not as granular. It doesn't have the manageability, feature set, and capabilities of a larger or an enterprise-level solution. It just needs a more robust feature set and granularity."
"Advanced Infrastructure should be implemented in the next release for better orchestration."
"Better automation capabilities would be an improvement."
"While Metasploit excels in vulnerability assessment, it could improve in vulnerability management."
"The reporting feature needs improvement."
"The open-source version has reporting limitations. You need to develop these capabilities yourself. Built-in reporting is an excellent feature for penetration testing, but it isn't a must-have. The solution could also cover more vulnerabilities. Metasploit has around 10,000 exploits in its library, but more is always better."
"The initial setup was a bit "tweaky" for the open-source version."
"The solution is not user-friendly and has room for improvement."
"At the time I was using it, the graphical user interface needed some improvements."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The pricing is on the higher side, almost an eight out of ten."
"The price of Cato Networks is in the middle range compared to other solutions. NetFoundry is a less expensive solution than Cato Networks."
"You pay yearly based on the speed of your network. If you increase the speed of your network, you increase the cost for your throughput. It is by bandwidth for the most part and then licenses for VPN. There is some per-seat licensing for VPN access, but the majority of it is minimal. It is like $30 a year per client. The rest is based on how much bandwidth you'll use. You pay for that upfront for the year, and if you have to increase it, you increase it, and then they let you send more data through. There are no additional costs in addition to the standard licensing fees."
"The solution's pricing is flexible."
"The solution has reasonable pricing. It has a yearly subscription. The pricing depends on the permit to code. Sometimes, we need to increase the permit, and the cost will automatically change. There's no fixed cost. Unless we request additional modules such as DNS security, ELP, and decent features, there will be no additional cost."
"The price is not an issue for us, as it is priced more competitively than some other vendors."
"I rate the price of Cato Networks a four out of five."
"Cato Networks seems more expensive than Cisco Meraki."
"The great advantage with Rapid7 Metasploit, of course, is that it's free."
"Rapid7 Metasploit is cheaper than Tenable.io Vulnerability Management."
"The cost is approximately $15 per device."
"The pricing structure involves a one-time purchase cost of approximately twenty thousand dollars or euros for all customers."
"On a scale of one to ten, where one is cheap and ten is expensive, I rate the product's pricing a six. So it's fairly priced."
"I use the open-source version of this product. Pricing is not relevant."
"Rapid7 Metasploit is an open-source solution."
"It is a reasonably priced solution. I would rate it from five out of ten."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
881,360 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
9%
Comms Service Provider
6%
Computer Software Company
14%
Manufacturing Company
14%
Financial Services Firm
9%
Comms Service Provider
8%
Computer Software Company
12%
Manufacturing Company
10%
Comms Service Provider
8%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise7
Large Enterprise10
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What do you like most about Cato Networks?
The solution is a simple WAN solution. We've onboarded the socket on the Cato platform, and it provides connectivity....
What is your primary use case for Cato Networks?
Actually, we propose Moogsoft as a solution. Previously we were using the solution for our customer, and we were basi...
What advice do you have for others considering Cato Networks?
My experience would be four out of five. I personally need to understand it more deeply. But it appears good at this ...
What do you like most about Rapid7 Metasploit?
I use Rapid7 Metasploit for payload generation and Post-Exploitation.
What is your experience regarding pricing and costs for Rapid7 Metasploit?
The pricing of Rapid7 Metasploit is quite affordable. It has a free version that many customers start with, and after...
What needs improvement with Rapid7 Metasploit?
The automated approach in the audits or in the hacking testing with Rapid7 Metasploit could be improved because even ...
 

Also Known As

iBoss Cloud Platform
Cato Networks
Metasploit
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Paysafe, AdRoll, Pet Lovers Centre, Arlington Orthopedics, Humphreys & Partners Architects
City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University
Find out what your peers are saying about Palo Alto Networks, Netskope, Cato Networks and others in Secure Access Service Edge (SASE). Updated: January 2026.
881,360 professionals have used our research since 2012.