Rapid7 InsightVM and Tenable Nessus compete in the vulnerability management category. Rapid7 InsightVM has a slight upper hand due to its integration capabilities and detailed remediation strategies.
Features: Rapid7 InsightVM offers a free community edition, comprehensive asset views, and swift vulnerability detection through integration with Metasploit. Its dashboard is intuitive, and its reporting is granular. Tenable Nessus is praised for customizable scans, rapid patch updates, and accurate vulnerability detection across various platforms. It offers flexibility in discovery capabilities.
Room for Improvement: Rapid7 InsightVM could refine its registration process, enhance API integration, and broaden its patch management features. The scans could be more intuitive, and real-time monitoring would be beneficial. Tenable Nessus could expand integration and enhance reporting capabilities. Users also note false positives and wish for improved interface usability.
Ease of Deployment and Customer Service: Rapid7 InsightVM supports hybrid cloud environments with straightforward setup and generally satisfactory technical support, though response times can sometimes lag. Tenable Nessus offers effective on-premises and hybrid cloud implementation, with widely appreciated customer service, albeit with some noted delays in response.
Pricing and ROI: Rapid7 InsightVM is seen as expensive, with comprehensive asset-based licensing, leading to mixed ROI perceptions. Its protective capabilities are valued despite the high cost. Tenable Nessus is recognized for affordability, offering competitive pricing and flexible licensing, delivering favorable ROI for smaller organizations through effective risk mitigation. Its pricing is considered accessible compared to Rapid7 InsightVM.
Sometimes support requests coincide with holidays in their support region, causing slight delays.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
According to the environment requirements, we can scale the solution as needed.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
We have not faced any issues with stability, and I would rate it a nine out of ten.
The stability of Rapid7 InsightVM is excellent.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
Having the ability to build our own audit file, similar to a feature in Tenable, would be beneficial.
The platform could be more intuitive and user-friendly.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
Rapid7 InsightVM is expensive, possibly one of the highest in pricing among similar products.
Tenable Nessus's pricing is adequate if it is fully utilized.
It's based on the CVSS risk scoring system, which is well-recognized and effective.
We have integrated our SIEM solutions and antivirus with each other through Rapid7.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The features I personally like include host discovery.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
Rapid7 InsightVM Features
Rapid7 InsightVM has many valuable key features. Some of the most useful ones include:
Rapid7 InsightVM Benefits
There are many benefits to implementing Rapid7 InsightVM. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Rapid7 InsightVM solution.
An owner at a tech services company says, "I liked the dashboard on it. I could customize my dashboard with different widgets and different heat maps."
PeerSpot user Kimeang S., Technical Consultant at Yip Intsoi, mentions, "The most important aspect of the solution is that it rarely gives false positives, especially compared to other products. It provides very clear reports for our IT teams to look at."
A Director of Information Technology at a government explains, "The main functionality of identifying item endpoints that weren't properly patched or had vulnerabilities is the solution's most valuable feature."
Tenable Nessus provides an efficient vulnerability management system with swift deployment and comprehensive scanning capabilities, making it an ideal choice for organizations seeking to enhance their security posture through effective threat detection and mitigation strategies.
Renowned for its top-tier vulnerability detection, Tenable Nessus offers a robust platform that integrates effortlessly across systems, enhancing threat management through automation, real-time monitoring, and customizable scanning options. Its broad asset coverage, including network devices and applications, coupled with ease of deployment, positions it as a go-to option for risk assessment and compliance. Organizations value its extensive reporting features and database, although they suggest enhancements in reporting formats and false positive detection. A more intuitive interface, improved cloud support, and competitive pricing models are sought after to cater to evolving enterprise needs.
What are the key features of Tenable Nessus?In industries such as finance, healthcare, and tech, Tenable Nessus is implemented for scanning internal and external networks, identifying risks, and ensuring data protection compliance. Organizations conduct regular scans to detect security vulnerabilities in servers and databases, leveraging its capabilities to strengthen their security frameworks while managing cloud infrastructures and enterprise networks efficiently.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.