Rapid7 InsightVM and Tenable Nessus compete in the vulnerability management category. Rapid7 InsightVM has a slight upper hand due to its integration capabilities and detailed remediation strategies.
Features: Rapid7 InsightVM offers a free community edition, comprehensive asset views, and swift vulnerability detection through integration with Metasploit. Its dashboard is intuitive, and its reporting is granular. Tenable Nessus is praised for customizable scans, rapid patch updates, and accurate vulnerability detection across various platforms. It offers flexibility in discovery capabilities.
Room for Improvement: Rapid7 InsightVM could refine its registration process, enhance API integration, and broaden its patch management features. The scans could be more intuitive, and real-time monitoring would be beneficial. Tenable Nessus could expand integration and enhance reporting capabilities. Users also note false positives and wish for improved interface usability.
Ease of Deployment and Customer Service: Rapid7 InsightVM supports hybrid cloud environments with straightforward setup and generally satisfactory technical support, though response times can sometimes lag. Tenable Nessus offers effective on-premises and hybrid cloud implementation, with widely appreciated customer service, albeit with some noted delays in response.
Pricing and ROI: Rapid7 InsightVM is seen as expensive, with comprehensive asset-based licensing, leading to mixed ROI perceptions. Its protective capabilities are valued despite the high cost. Tenable Nessus is recognized for affordability, offering competitive pricing and flexible licensing, delivering favorable ROI for smaller organizations through effective risk mitigation. Its pricing is considered accessible compared to Rapid7 InsightVM.
Sometimes support requests coincide with holidays in their support region, causing slight delays.
Whenever any issue arises, we contact the support, and they are always there for us.
The technical support is good yet could improve in terms of response time.
According to the environment requirements, we can scale the solution as needed.
Whether managing 50 servers today or 500 tomorrow, performance or capacity are not hindered.
We have not faced any issues with stability, and I would rate it a nine out of ten.
The stability of Rapid7 InsightVM is excellent.
We have not encountered any issues with missing network items or errors in API and webhook interactions.
Having the ability to build our own audit file, similar to a feature in Tenable, would be beneficial.
The platform could be more intuitive and user-friendly.
The documentation is not well-organized, which can be confusing when searching for solutions or specific information related to Tenable Nessus Professional.
Rapid7 InsightVM is expensive, possibly one of the highest in pricing among similar products.
Tenable Nessus's pricing is adequate if it is fully utilized.
It's based on the CVSS risk scoring system, which is well-recognized and effective.
We have integrated our SIEM solutions and antivirus with each other through Rapid7.
The scanning and reporting features are the most valuable aspects of Tenable Nessus.
The features I personally like include host discovery.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
Rapid7 InsightVM Features
Rapid7 InsightVM has many valuable key features. Some of the most useful ones include:
Rapid7 InsightVM Benefits
There are many benefits to implementing Rapid7 InsightVM. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Rapid7 InsightVM solution.
An owner at a tech services company says, "I liked the dashboard on it. I could customize my dashboard with different widgets and different heat maps."
PeerSpot user Kimeang S., Technical Consultant at Yip Intsoi, mentions, "The most important aspect of the solution is that it rarely gives false positives, especially compared to other products. It provides very clear reports for our IT teams to look at."
A Director of Information Technology at a government explains, "The main functionality of identifying item endpoints that weren't properly patched or had vulnerabilities is the solution's most valuable feature."
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
Tenable Nessus Benefits
Some of the ways that organizations can benefit by deploying Tenable Nessus include:
Tenable Nessus Features
Reviews from Real Users
Tenable Nessus is a solution that stands out when compared to many of its competitors. Two major advantages it offers are its ease of use and its vulnerability scanning feature.
Rallis F., the principal security architect at a technology vendor, writes, “The ease of use is the primary valuable feature. This specific version is very straightforward. I like the ability to modify it and configure it based on the different policies.”
Sandip D., a cyber security expert at Birlasoft India Ltd, writes, “The vulnerability scanner is the most valuable feature. It's an important feature for us. We use the plugin output for that. It shows us the exact version of Nessus and what is needed for remediation. Based on that, we decide what should be remediated first to get the best result for security.”
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.