

Find out what your peers are saying about Broadcom, Illumio, Akamai and others in Microsegmentation Software.
I have not seen a return on investment in terms of specific metrics like time saved or reduced risk, but I can say that reduced risk is significant.
Metasploit has helped save time, especially with testing websites or VIPD projects.
The ROI can be very rapid for organizations using vulnerability assessment for the first time.
Rapid7 sometimes struggles with queries from non-security people, whereas Tenable is more patient.
The customer support is excellent
It scales very well, and I can keep adding agents and scale as much as needed.
Rapid7 Metasploit is highly scalable.
Metasploit can handle big projects and is already prepared for them.
Rapid7 Metasploit has limited scalability based on my experience, as the customer receives the full functionality of the product with the license.
I have never faced any technical issues or downtimes.
I find Metasploit to be very stable, and I would rate its stability as a nine out of ten.
I think it is really valuable to take a course on Akamai Guardicore Segmentation because many things are not obvious in terms of how to do them correctly.
I believe implementing MFA would be very useful and helpful to us.
While you can check the vulnerability, and the system will tell you there is no vulnerability, usually, a human can change one, two, or three parameters and using the same technique and the same scripts can break the system.
The database is not always updated with the latest vulnerabilities or zero-day exploits.
Metasploit excels in vulnerability assessment, it could improve in vulnerability management.
The pricing was flexible, and it has worked out well with our budget.
The cost is approximately $15 per device.
After that, they usually purchase the commercial part of the solution due to its deep integration with InsightVM.
Metasploit is cheaper than Nessus and offers a more robust community edition that provides a good experience for studying Metasploit.
Akamai Guardicore Segmentation offers us large visibility in all our environments and helps us to understand network segmentation and traffic.
The best features Akamai Guardicore Segmentation offers make it simple to see all of the connections that are being made to each of the endpoints, and they can be controlled by process and port.
Rapid7 offers comprehensive features within one platform, eliminating the need to integrate multiple tools to see all alerts in one place.
InsightVM searches for potential threats and vulnerabilities of the infrastructure, and after that, Rapid7 Metasploit validates whether we can break the system using this vulnerability or threat, serving as a validator component of the InsightVM solution.
When I compare Metasploit with Nessus, I find that Metasploit is faster and it does not burden the system as much.
| Product | Market Share (%) |
|---|---|
| Akamai Guardicore Segmentation | 23.5% |
| Illumio | 26.8% |
| VMware NSX | 15.7% |
| Other | 34.0% |
| Product | Market Share (%) |
|---|---|
| Rapid7 Metasploit | 1.5% |
| Wiz | 6.6% |
| Tenable Nessus | 5.1% |
| Other | 86.8% |

| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 3 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 11 |
Akamai Guardicore Segmentation is a software-based microsegmentation solution that provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles. It enables you to prevent malicious lateral movement in your network through precise segmentation policies, visuals of activity within your IT environment, and network security alerts. Akamai Guardicore Segmentation works across your data centers, multicloud environments, and endpoints. It is faster to deploy than infrastructure segmentation approaches and provides you with unparalleled visibility and control of your network.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
We monitor all Microsegmentation Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.