Try our new research platform with insights from 80,000+ expert users

Pentera vs Rapid7 Metasploit comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Pentera
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
9
Ranking in other categories
Penetration Testing Services (2nd), Breach and Attack Simulation (BAS) (2nd)
Rapid7 Metasploit
Average Rating
7.8
Reviews Sentiment
7.1
Number of Reviews
21
Ranking in other categories
Vulnerability Management (20th)
 

Mindshare comparison

Pentera and Rapid7 Metasploit aren’t in the same category and serve different purposes. Pentera is designed for Breach and Attack Simulation (BAS) and holds a mindshare of 29.3%, up 28.3% compared to last year.
Rapid7 Metasploit, on the other hand, focuses on Vulnerability Management, holds 1.4% mindshare, down 1.6% since last year.
Breach and Attack Simulation (BAS)
Vulnerability Management
 

Featured Reviews

Jon Medvenics - PeerSpot reviewer
Useful in vulnerability management and can automate pen tests
One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources. Also, if you have credentials and want to check if they're still valid or can still be used, and you confirm they can't be used (maybe they're from a leak or a twenty-year-old database), there's no way for you to flag that these credentials aren't a problem anymore. The solution has a sort of flat report. It's annoying to go through lots of legwork only to see the same names or credentials still there, and you can't do anything about it in their portal. We've given them feedback, but I think it's probably on their long list of feature requests to address. For me, that would be a greater user configuration of the tests performed on a granular level. As I mentioned with Cymulate, they show you every line of code they will run and what tool is being used, step by step. Pentera is more closed in that regard. If Pentera released a feature that allows you to alter the attack path or change the command, that would be incredibly useful. Pentera might use one or a few different methods to do something, but if none of those work, it will just say everything is fine and secure. If Pentera could adapt or change based on what it finds in the environment, that would be very valuable. As a customer, we understand our environments better than an automated tool, so providing context to help the tool get better results would be valuable.
Mani Bommisetty - PeerSpot reviewer
Comprehensive insights with robust vulnerability detection and streamlined alert management
Rapid7 has a significant advantage in providing a clear picture of my environment. It provides insight and incident detection response capabilities. When deployed with the same agent in servers or endpoints, it identifies vulnerabilities and monitors data transmission to external sources. Rapid7 offers comprehensive features within one platform, eliminating the need to integrate multiple tools to see all alerts in one place.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"Pentera has many authentic features."
"Pentera has many authentic features."
"The most valuable feature of Pentera is that you can do continuous vulnerability assessment, which is automated."
"The tool showed us that our ransomware protection wasn’t working on some machines."
"Maybe there are some remediation steps on the website, we can mask sensitive information on the website better."
"The product is easy to use."
"The solution is SaaS-based. From a cloud perspective, it has Pentera Surface and Pentera Core. The Core is the on-prem deployed solution, while the Surface is the cloud-hosted solution that scans your public infrastructure. From the Surface perspective, the most valuable feature so far has been the attack surface mapping."
"When I compare Metasploit with Nessus, I find that Metasploit is faster and it does not burden the system as much."
"The reporting on the solution is good."
"The tool's most useful feature for penetration testing is its automation capabilities. With the professional edition, you can upload the results from Nessus in the Rapid7 Metasploit solution portal."
"I use Rapid7 Metasploit for payload generation and Post-Exploitation."
"It is scalable. It's in line with our needs."
"I don't have any other tools like it, and I always use it when I'm doing a pen test. Metasploit is a great solution for penetration testing,"
"The greatest advantage of Rapid7 Metasploit is that it is the only system that can directly exploit vulnerabilities on the Metasploit platform."
"The most valuable feature for us is the support for testing Linux-based web server components."
 

Cons

"Maybe scalability. I know that the Pentera right now is high level in order to scan big deals over 500 IPs and not less, and not less. That can be more granular. This will be useful."
"The automated penetration testing features must be improved."
"One area for product improvement could be the inclusion of a dashboard to cover multiple branches and subsidiaries, allowing for centralized monitoring."
"The licensing and IP management need improvement. When the IP is imported into a system, we cannot withdraw or revoke the license."
"The price could be improved."
"The licensing and IP management need improvement."
"There is room for improvement in virtualization compatibility."
"One of the big issues we have is that the tool has an additional license for compromised credentials. Suppose compromised credentials for any of your domains appear in leaks, dumps, or are being sold. In that case, they try to aggregate that data and highlight that, for example, ten users appeared in recent dumps as compromised credentials. However, they don't provide much information about where those compromises came from or their source information, probably to protect their sources."
"I would like to see more capabilities, more functions, and more features. More types of attack vectors."
"If your company's patch is not up to date, but you have other detection or defense solutions such as endpoint detection and response and antivirus software, the product exploit may not work effectively. This is because its exploit database update process is slow and not real-time. For zero-day vulnerabilities or new security threats, relying on Rapid7 Metasploit alone may not be effective."
"The database is not always updated with the latest vulnerabilities or zero-day exploits. If a vulnerability arises a month or two ago, it might not be included in the database, which is something I would like to see improved."
"The solution is not very scalable, it does not provide any automation to be able to scale it."
"I think areas with shortcomings that need improvement are more integration and automation."
"There are numerous outdated exploits in their database that should be updated."
"Advanced Infrastructure should be implemented in the next release for better orchestration."
"While Metasploit excels in vulnerability assessment, it could improve in vulnerability management."
 

Pricing and Cost Advice

"The tool is relatively cheap."
"The product's cost is reasonable. I rate the pricing a three out of ten."
"It's not that expensive, but it could be more cost-effective."
"We have to pay a yearly licensing cost for Pentera."
"The cost is approximately $15 per device."
"I have used the free version of Rapid7 Metasploit."
"We pay monthly. The pricing is reasonable."
"Rapid7 Metasploit is an open-source solution."
"I use the open-source version of this product. Pricing is not relevant."
"Rapid7 Metasploit is cheaper than Tenable.io Vulnerability Management."
"It is a reasonably priced solution. I would rate it from five out of ten."
"The great advantage with Rapid7 Metasploit, of course, is that it's free."
report
Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
10%
Educational Organization
6%
Computer Software Company
17%
Financial Services Firm
10%
Manufacturing Company
9%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Pentera?
What I like the most about Pentera is its solution-oriented approach.
What needs improvement with Pentera?
The licensing and IP management need improvement. When the IP is imported into a system, we cannot withdraw or revoke the license.
What is your primary use case for Pentera?
I am using the OpenIntra solution for pentesting and managing candidates in my environment. I also use this solution for house customers.
What do you like most about Rapid7 Metasploit?
I use Rapid7 Metasploit for payload generation and Post-Exploitation.
What is your experience regarding pricing and costs for Rapid7 Metasploit?
Metasploit is cheaper than Nessus and offers a more robust community edition that provides a good experience for studying Metasploit. This makes it a more economical choice for projects compared to...
What needs improvement with Rapid7 Metasploit?
While Metasploit excels in vulnerability assessment, it could improve in vulnerability management. Nessus currently holds the advantage in management functions. Support is another area where improv...
 

Also Known As

No data available
Metasploit
 

Overview

 

Sample Customers

Blackstone Group Caterpillar Apria Healthcare Taylor Vinters Sandler Capital Management Drawbridge BNP Paribas British Red Cross
City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University
Find out what your peers are saying about Pentera vs. Rapid7 Metasploit and other solutions. Updated: January 2025.
860,592 professionals have used our research since 2012.