Try our new research platform with insights from 80,000+ expert users

Check Point CloudGuard CNAPP vs Rapid7 Metasploit comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024
 

Categories and Ranking

Check Point CloudGuard CNAPP
Ranking in Vulnerability Management
8th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
67
Ranking in other categories
Cloud and Data Center Security (9th), Container Security (6th), Cloud Workload Protection Platforms (CWPP) (6th), Cloud Security Posture Management (CSPM) (5th), Cloud-Native Application Protection Platforms (CNAPP) (5th), Data Security Posture Management (DSPM) (4th), Compliance Management (5th)
Rapid7 Metasploit
Ranking in Vulnerability Management
21st
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
19
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the Vulnerability Management category, the mindshare of Check Point CloudGuard CNAPP is 1.4%, up from 1.2% compared to the previous year. The mindshare of Rapid7 Metasploit is 1.9%, up from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management
 

Featured Reviews

Yokesh Mani - PeerSpot reviewer
Easy to write custom rules and policies in the UI with limited coding knowledge
The user interface could be improved. Sometimes, the visibility is not immediately available for the environment. We have the native servers that come with the solutions, but we cannot see them in the Check Point log. Another issue is with the integrated file monitoring. It would make sense to have stuff like file integrity monitoring and malware scanning available within this module because we don't want to integrate another product. For example, let's say it's showing a process violation. It should be able to do some additional malware scanning in that particular bucket to get some additional information. I don't want to integrate with another third-party tool or go to the native server to check something. It would be helpful to have integrated monitoring and malware scanning for the file types. There are a few flaws with the security management portal where I have limited visibility into the workload protection features. There is no error visibility where I can see the communication and workflow between services. Some of the dashboards need to be fine-tuned if they are not customized. For example, I cannot customize anything on the effective risk management dashboard. Some of the information is not correct for my tenant. With respect to passwords and user management, there are no policies I can measure at the user level. If the user was created more than six months ago, you don't need to worry about that password or do anything like two-factor authentication associated with that user. They can still log in after six months or one year. It's also a challenge to use CloudGuard's agentless workload posture with AWS. An Azure storage is summed up with a CNAPP encryption by default. We tried onboarding this data, but the problem is the attachment is not done. After a few days, we identified that it was impossible to do the encryption detection. But CloudGuard's default rules say that this has to be encrypted. The AWS module says that we cannot access this volume with this encryption, so we cannot use an agentless workload posture with AWS because of this. It is a best practice to ensure that all the volumes are being encrypted. Without the encryption, how can I do this? It is a big challenge for CloudGuard.
Aqeel Junaid - PeerSpot reviewer
Helps find vulnerabilities in a system to determine whether the system needs to be upgraded
The solution's exploit development functionality was easy to use and had all the scenarios I could use to run my security assessment. Since the solution has been updated regarding new malware, it gives data protection for security professionals. Rapid7 Metasploit is a good exploit tool, and users need to know what they're doing while using the solution. The solution provides perfect effectiveness in simulating real-world attacks for training purposes. Overall, I rate the solution a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The identification of misconfigurations, maintenance of compliance in a centralized way, and visibility across all the multi-cloud tenants are the key functionalities."
"The various CNAPP modules have granted more visibility of our cloud applications to our system engineers and developers."
"Helps identify and correct misconfigurations in cloud environments, ensuring that infrastructure and applications are secure and optimized."
"The way they offer container security is a big highlight that I have noticed. The solution is also agentless, so the scanning, runtime, really everything is offered directly by CloudGuard."
"It is able to bring visibility into that cloudy space where the security departments do not really see what is happening on the DevOps side. It brings visibility, security control, and standardization."
"The feature that I find most valuable is the blocking feature."
"Assets Management as it provide complete visibility of our workload inkling EC2 instance or Serverless"
"The Compliance engine has helped put our auditors and senior executives at ease, as we can quickly and accurately measure ourselves against hundreds of compliance checks to include CIS benchmarks, PCI, and other best practices."
"Stability-wise, I rate the solution a nine out of ten...Scalability-wise, I rate the solution a nine out of ten."
"The tool's most useful feature for penetration testing is its automation capabilities. With the professional edition, you can upload the results from Nessus in the Rapid7 Metasploit solution portal."
"The solution is open source and has many small targetted penetration tests that have been written by many people that are useful. You can choose different subjects for the test, such as Oracle databases or Apache servers."
"Technical support has been helpful and responsive."
"It contains almost all the available exploits and payloads."
"Rapid7 Metasploit is a useful product."
"The Search Engineering feature is good."
"All of the features are great."
 

Cons

"I’d like to see more integration with third-party tools. For example, it would be helpful to have an integration between Dome9 and ServiceNow to manage security incidents and security changes."
"The software configurations theory is complicated, and without proper planning and a well-skilled technical team, it cannot perform its tasks properly."
"The Check Point solution is somewhat expensive."
"The integration process could be enhanced by enabling integration at the organizational level rather than requiring the manual setup of individual accounts."
"The support must be more effective."
"When rules change, it messes up the remediation. They haven't found a fix for that yet. The remediation rule goes into limbo. It's an architectural design flaw within their end compliance engine—a serious bug."
"I am not a technical person, but generically, the user interface can be a little more intuitive. Our staff has trained network security and cloud security professionals, and they get it, but when you are trying to get to the customers to be able to pick it up and maintain it, it can be a bit difficult."
"In Dome9, there should be a policy validation option where we can validate the policy before we push it into production."
"It is necessary to add some training materials and a tutorial for beginners."
"There are numerous outdated exploits in their database that should be updated."
"I think areas with shortcomings that need improvement are more integration and automation."
"Better automation capabilities would be an improvement."
"The initial setup was a bit "tweaky" for the open-source version."
"If your company's patch is not up to date, but you have other detection or defense solutions such as endpoint detection and response and antivirus software, the product exploit may not work effectively. This is because its exploit database update process is slow and not real-time. For zero-day vulnerabilities or new security threats, relying on Rapid7 Metasploit alone may not be effective."
"We'd like them to offer better coverage of malware."
"Rapid7 Metasploit could be made easier for new users to learn."
 

Pricing and Cost Advice

"I suggest that you pay attention to the product pricing because while there are no tricks, and the licensing model is transparent, the final numbers may surprise you."
"It is difficult to contextualize the pricing because we are used to Indian pricing and licensing."
"It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution."
"Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
"The solution’s pricing is a little bit high."
"Check Point CloudGuard Posture Management is expensive."
"Its price is very fair."
"​They support either annual licensing or hourly. At the time of our last negotiation, it was either one or the other, you could not mix or match. I would have liked to mix/match. ​"
"Rapid7 Metasploit is an open-source solution."
"There are two versions available, one of which is the Pro version, and the other is the free version."
"I have used the free version of Rapid7 Metasploit."
"The great advantage with Rapid7 Metasploit, of course, is that it's free."
"Rapid7 Metasploit is cheaper than Tenable.io Vulnerability Management."
"I use the open-source version of this product. Pricing is not relevant."
"We pay monthly. The pricing is reasonable."
"It is expensive. Our license expired, and our company is not thinking to renew because of our budget."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
9%
Security Firm
6%
Computer Software Company
18%
Financial Services Firm
10%
Manufacturing Company
9%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Rapid7 Metasploit?
I use Rapid7 Metasploit for payload generation and Post-Exploitation.
What is your experience regarding pricing and costs for Rapid7 Metasploit?
I am not very sure about the pricing. It falls into an intermediate range. However, I am not involved with the partition part.
What needs improvement with Rapid7 Metasploit?
The database is not always updated with the latest vulnerabilities or zero-day exploits. If a vulnerability arises a month or two ago, it might not be included in the database, which is something I...
 

Also Known As

Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
Metasploit
 

Overview

 

Sample Customers

Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University
Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Rapid7 Metasploit and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.