Junior systems engineer at a tech services company with 11-50 employees
Real User
Top 10
Nov 20, 2025
I would say that because Rapid7 InsightCloudSec does not have automatic patching capabilities, it provides recommendations, but it does not execute anything from within Rapid7 InsightCloudSec. It highlights ways I can use to tackle those vulnerabilities, so we integrate it with ManageEngine, which has a patch management module, and utilize those two systems hand in hand to remediate identified vulnerabilities. My colleagues have mentioned that having a feature in Rapid7 InsightCloudSec to remediate vulnerabilities scanned from within the console would be helpful. They note that while ManageEngine allows for automatic patching, it would be beneficial for Rapid7 InsightCloudSec to provide a similar feature to make the process more streamlined, rather than having to remediate vulnerabilities manually.
Site Reliability Engineer at a comms service provider with 501-1,000 employees
Real User
Top 5
Nov 20, 2025
Rapid7 InsightCloudSec can be enhanced by improving the UI/UX. The interface could be more intuitive and faster. A new dashboard with customizable widgets and streamlined navigation would improve usability, especially for managing multiple environments or reports. The overall UI/UX needs improvement, as performance and speed can also become a concern when scaling large environments or pulling reports, which can sometimes lag. This can impact teams that rely on real-time or near-real-time data. Optimizing backend performance and offering more granular control over scans could be an improvement. Additionally, if Rapid7 InsightCloudSec could support more third-party tools or modern CI/CD pipelines, integrating it into my developer workflow would reduce time to fix and foster a shift-left security mindset.
From the dashboard perspective, if more details can be introduced, it would be helpful. During scans, it currently takes a lot of time to scan the servers and generate reports. Reducing this delay would greatly improve the experience. Integrating with other day-to-day tools could also be beneficial.
I had to patch a problem with taints on our nodes in our AKS cluster. I had to write a custom patch to get Rapid7 to run on those nodes. I emailed Rapid7 support, but they didn't have any documentation on how to patch it. I was disappointed as I thought this would be a common issue.
Managing Director - India & SAARC at a tech services company with 11-50 employees
Consultant
Top 10
Mar 14, 2024
Rapid7 InsightCloudSec could be better at showing dashboards for virtual firewalls and appliances. Compared to other solutions like Palo Alto, this area is not as good. So, they should work on improving this for virtual devices.
Overall, Rapid7 ICS is good. There are no major drawbacks. However, there are a lot of other solutions in the market, not only providing the features of a CSPM, but also CNAPP. When it comes to CNAPP, if you have deployed many containerized-based applications within your environment, plus the containers, managing all those things becomes complex. It can't be easy to keep an eye on those resources because sometimes doing so requires an additional agent that one needs to deploy so that they can perform the scans on those workloads. However, there are a lot of tools in the market that provide these scans at the API level. One could connect Rapid7 with an API at the workload or cluster level, and you'll get all that information. However, the challenge is how easily you can implement those things within the environment. Sometimes, you'll encounter some complexity while implementing APIs. Some customers won't be happy getting complex things implemented. At the end of the day, they would prefer that things be simpler. That is something Rapid7 could improve on. Besides, the UI is a bit complex and not user-friendly, but they're working on that.
Rapid7 InsightCloudSec is a comprehensive CSPM tool catering to cloud security across Docker and Kubernetes workloads, ensuring rigorous data classification and protection, focusing on AWS and Azure platforms.Organizations leverage Rapid7 InsightCloudSec for securing cloud environments, integrating smoothly into Kubernetes settings for extensive security oversight. This tool addresses data protection with governance and access controls, providing centralized visibility and alert mechanisms....
I would say that because Rapid7 InsightCloudSec does not have automatic patching capabilities, it provides recommendations, but it does not execute anything from within Rapid7 InsightCloudSec. It highlights ways I can use to tackle those vulnerabilities, so we integrate it with ManageEngine, which has a patch management module, and utilize those two systems hand in hand to remediate identified vulnerabilities. My colleagues have mentioned that having a feature in Rapid7 InsightCloudSec to remediate vulnerabilities scanned from within the console would be helpful. They note that while ManageEngine allows for automatic patching, it would be beneficial for Rapid7 InsightCloudSec to provide a similar feature to make the process more streamlined, rather than having to remediate vulnerabilities manually.
Rapid7 InsightCloudSec can be enhanced by improving the UI/UX. The interface could be more intuitive and faster. A new dashboard with customizable widgets and streamlined navigation would improve usability, especially for managing multiple environments or reports. The overall UI/UX needs improvement, as performance and speed can also become a concern when scaling large environments or pulling reports, which can sometimes lag. This can impact teams that rely on real-time or near-real-time data. Optimizing backend performance and offering more granular control over scans could be an improvement. Additionally, if Rapid7 InsightCloudSec could support more third-party tools or modern CI/CD pipelines, integrating it into my developer workflow would reduce time to fix and foster a shift-left security mindset.
From the dashboard perspective, if more details can be introduced, it would be helpful. During scans, it currently takes a lot of time to scan the servers and generate reports. Reducing this delay would greatly improve the experience. Integrating with other day-to-day tools could also be beneficial.
A couple of modules are missing when compared to other providers, specifically related to some IAM, and the login piece needs improvement.
I had to patch a problem with taints on our nodes in our AKS cluster. I had to write a custom patch to get Rapid7 to run on those nodes. I emailed Rapid7 support, but they didn't have any documentation on how to patch it. I was disappointed as I thought this would be a common issue.
Rapid7 InsightCloudSec could be better at showing dashboards for virtual firewalls and appliances. Compared to other solutions like Palo Alto, this area is not as good. So, they should work on improving this for virtual devices.
The tool needs to improve its documentation.
Overall, Rapid7 ICS is good. There are no major drawbacks. However, there are a lot of other solutions in the market, not only providing the features of a CSPM, but also CNAPP. When it comes to CNAPP, if you have deployed many containerized-based applications within your environment, plus the containers, managing all those things becomes complex. It can't be easy to keep an eye on those resources because sometimes doing so requires an additional agent that one needs to deploy so that they can perform the scans on those workloads. However, there are a lot of tools in the market that provide these scans at the API level. One could connect Rapid7 with an API at the workload or cluster level, and you'll get all that information. However, the challenge is how easily you can implement those things within the environment. Sometimes, you'll encounter some complexity while implementing APIs. Some customers won't be happy getting complex things implemented. At the end of the day, they would prefer that things be simpler. That is something Rapid7 could improve on. Besides, the UI is a bit complex and not user-friendly, but they're working on that.