Qualys Cloud Platform

What Is Qualys Cloud Platform?

Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain.

Qualys Cloud Platform Details

Qualys

http://www.qualys.com

Founded 1999

Qualys Cloud Platform Software - Vulnerability Dashboard
Qualys Cloud Platform Software - 2
Qualys Cloud Platform Software - 3
Qualys Cloud Platform Software - 4
Qualys Cloud Platform Software - 5
Qualys Cloud Platform video
Play
Qualys Cloud Platform Software - Vulnerability Dashboard - thumbnail
Qualys Cloud Platform Software - 2 - thumbnail
Qualys Cloud Platform Software - 3 - thumbnail
Qualys Cloud Platform Software - 4 - thumbnail
Qualys Cloud Platform Software - 5 - thumbnail

Compare Qualys Cloud Platform with similar products

Starting price

N/A
N/A
US$15.00/month
N/A

Free Version

Free Version No
Free Version No
Free Version No
Free Version No

Free Trial

Free Trial Yes
Free Trial Yes
Free Trial No
Free Trial Yes

Qualys Cloud Platform deployment and support

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)

Deployment

  • Cloud, SaaS, Web-based

Training

  • Videos

Qualys Cloud Platform Features

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Asset Management
  • Change Management
  • Client Portal
  • Collaboration Tools
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Contract/License Management
  • Customisable Forms
  • Customisable Reports
  • Customizable Fields
  • Data Import/Export
  • Data Mapping
  • Data Visualisation
  • Device Auto Discovery
  • Drag & Drop
  • Email Management
  • Help Desk Management
  • IT Asset Management
  • IT Asset Tracking
  • Impact Management
  • Incident Management
  • Inventory Management
  • Knowledge Base Management
  • License Management
  • Performance Monitoring
  • Prioritisation
  • Problem Management
  • Relationship Mapping
  • Reporting & Statistics
  • Request Assignment
  • SSL Security
  • Scheduled / Automated Reports
  • Self Service Portal
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Support Ticket Management
  • Support Ticket Tracking
  • Surveys & Feedback
  • Task Management
  • Third Party Integrations
  • Widgets
  • Workflow Management

View full list of CMDB Software

  • API
  • Access Controls/Permissions
  • Accounting Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Application Management
  • Audit Management
  • Automatic Backup
  • Billing & Provisioning
  • CRM
  • Capacity Analytics
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Cost Management
  • Data Import/Export
  • Data Mapping
  • Data Migration
  • Data Storage Management
  • Data Synchronisation
  • Data Visualisation
  • Database Support
  • Demand Monitoring
  • Drag & Drop
  • Email Management
  • Event Logs
  • IT Cost Management
  • Monitoring
  • Multi-Cloud Management
  • Performance Analysis
  • Performance Management
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Resource Management
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Supply Monitoring
  • Third Party Integrations
  • User Management
  • Workflow Approval
  • Workflow Management

View full list of Cloud Integration Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Encryption
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Cloud Security Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Archiving & Retention
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Controls Audit
  • Corrective and Preventive Actions (CAPA)
  • Customisable Reports
  • Customisable Templates
  • Data Visualisation
  • Document Management
  • Document Storage
  • Environmental Compliance
  • FDA Compliance
  • Forms Management
  • HIPAA Compliant
  • ISO Compliance
  • Incident Management
  • Monitoring
  • Multi-Language
  • OSHA Compliance
  • Policy Management
  • Process/Workflow Automation
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Sarbanes-Oxley Compliance
  • Security Auditing
  • Surveys & Feedback
  • Task Management
  • Template Management
  • Third Party Integrations
  • Training Management
  • Version Control
  • Workflow Management

View full list of Compliance Software

  • API
  • Access Control
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Best Practices Repository
  • Compliance Management
  • Data Security
  • Data Visualisation
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Maintenance Scheduling
  • Monitoring
  • Network Security Software
  • Password Management
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Computer Security Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Configuration Management
  • Container Isolation
  • Container Scanning
  • Continuous Delivery
  • Continuous Deployment
  • Continuous Integration
  • Continuous Monitoring
  • Customisable Reports
  • Deployment Management
  • Encryption
  • For DevSecOps
  • Incident Management
  • Intrusion Detection System
  • Metadata Management
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Runtime Container Security
  • Search/Filter
  • Security Auditing
  • Security Testing
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Vulnerability / Threat Prioritization
  • Vulnerability Management
  • Vulnerability Scanning

View full list of Container Security

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualisation
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity Software

  • AB Testing
  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Archiving & Retention
  • Auto-Responders
  • CRM
  • Campaign Analytics
  • Campaign Management
  • Campaign Segmentation
  • Canned Responses
  • Chat/Messaging
  • Click Tracking
  • Contact Database
  • Contact Management
  • Customer Segmentation
  • Customisable Branding
  • Customisable Forms
  • Customisable Templates
  • Customizable Fields
  • Data Recovery
  • Drag & Drop
  • Drip Campaigns
  • Email Distribution
  • Email Management
  • Email Marketing
  • Email Monitoring
  • Email Templates
  • Email Tracking
  • Inbox Management
  • Monitoring
  • Queue Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Response Management
  • Routing
  • Search/Filter
  • Shared Inboxes
  • Signature Management
  • Social Media Integration
  • Spam Blocker
  • Subscription Management
  • Template Management
  • Third Party Integrations
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Email Management Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Encryption
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Credential Management
  • Customisable Reports
  • Data Storage Management
  • Data Visualisation
  • Disk Encryption
  • Encryption
  • Event Logs
  • Event Tracking
  • File Encryption
  • HIPAA Compliant
  • Incident Management
  • Issue Tracking
  • Key Management
  • Monitoring
  • P2P Encryption
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning

View full list of Encryption Software

  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Behavioural Analytics
  • Continuous Monitoring
  • Endpoint Management
  • Event Analysis
  • Prioritisation
  • Remediation Management
  • Root Cause Analysis
  • Whitelisting/Blacklisting

View full list of Endpoint Detection and Response Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behaviour Tracking
  • Compliance Management
  • Content Filtering
  • Customisable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Asset Management
  • Asset Tracking
  • Audit Management
  • Audit Trail
  • Barcode / Ticket Scanning
  • Change Management
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Configuration Management
  • Contract/License Management
  • Cost Tracking
  • Customisable Branding
  • Customisable Forms
  • Customisable Reports
  • Customizable Fields
  • Dashboard Creation
  • Data Import/Export
  • Data Visualisation
  • Email Management
  • IT Asset Tracking
  • Incident Management
  • Inventory Management
  • Inventory Tracking
  • Knowledge Base Management
  • Maintenance Management
  • Maintenance Scheduling
  • Monitoring
  • Prioritisation
  • Problem Management
  • Procurement Management
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Requisition Management
  • Role-Based Permissions
  • Self Service Portal
  • Service Level Agreement (SLA) Management
  • Supplier Management
  • Support Ticket Management
  • Support Ticket Tracking
  • Task Management
  • Third Party Integrations
  • User Management
  • Workflow Management

View full list of IT Asset Management Software

  • API
  • Accounting Integration
  • Activity Dashboard
  • Alerts/Notifications
  • Barcode / Ticket Scanning
  • Barcode Recognition
  • Billing & Invoicing
  • Cost Tracking
  • Customer Database
  • Customisable Reports
  • Data Synchronisation
  • Forecasting
  • Inventory Auditing
  • Inventory Control
  • Inventory Management
  • Inventory Optimisation
  • Inventory Replenishment
  • Inventory Tracking
  • Invoice Management
  • Kitting
  • Manufacturing Inventory Management
  • Mobile Access
  • Multi-Channel Management
  • Multi-Currency
  • Multi-Location
  • Order Management
  • Order Tracking
  • Point of Sale (POS)
  • Product Identification
  • Purchase Order Management
  • Purchasing & Receiving
  • Real Time Data
  • Real Time Reporting
  • Real-time Updates
  • Reorder Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Retail Inventory Management
  • Returns Management
  • Sales Orders
  • Sales Reports
  • Search/Filter
  • Shipping Management
  • Status Tracking
  • Stock Management
  • Supplier Management
  • Third Party Integrations
  • Vendor Managed Inventory
  • Warehouse Management
  • eCommerce Management

View full list of Inventory Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customisable Reports
  • Data Import/Export
  • Data Storage Management
  • Data Synchronisation
  • Electronic Payments
  • Event Logs
  • Event Tracking
  • Exceptions Management
  • File Integrity Monitoring
  • File Management
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Log Management
  • Monitoring
  • PCI Assessment
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Sarbanes-Oxley Compliance
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Summary Reports
  • Third Party Integrations
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of PCI Compliance Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Management
  • Approval Process Control
  • Audit Management
  • Automatic Backup
  • Automatic Patch Deployment
  • Automatic Scans
  • Compliance Management
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Customization
  • Dashboard
  • Event Logs
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Monitoring
  • Network Wide Management
  • Patch Management
  • Patch Prioritisation
  • Patch Testing
  • Policy Management
  • Real Time Monitoring
  • Real Time Reporting
  • Real-time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Update / Installation
  • Reporting & Statistics
  • Risk Assessment
  • SSL Security
  • Scheduling
  • Secure Data Storage
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Status Tracking
  • Summary Reports
  • Support Ticket Management
  • Third Party Integrations
  • Usage Tracking/Analytics
  • Vulnerability Scanning
  • Workflow Management

View full list of Patch Management Software

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Approval Process Control
  • Archiving & Retention
  • Assessment Management
  • Attestation
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Configurable Workflow
  • Content Management
  • Customisable Reports
  • Customisable Templates
  • Document Management
  • Document Review
  • Document Storage
  • Document Templates
  • Forms Management
  • HIPAA Compliant
  • Incident Management
  • Lifecycle Management
  • Monitoring
  • Policy Creation
  • Policy Library
  • Policy Management
  • Policy Metadata Management
  • Policy Training
  • Purchasing & Receiving
  • Real Time Notifications
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Role-Based Permissions
  • Sarbanes-Oxley Compliance
  • Search/Filter
  • Secure Data Storage
  • Self Service Portal
  • Single Sign On
  • Template Management
  • Third Party Integrations
  • Training Management
  • Version Control
  • Visual Analytics
  • Workflow Management

View full list of Policy Management Software

  • API
  • Accounting Integration
  • Activity Dashboard
  • Approval Process Control
  • Audit Management
  • Audit Trail
  • Automated Discovery
  • Budgeting/Forecasting
  • Collaboration Tools
  • Compliance Management
  • Contact Management
  • Contract/License Management
  • Cost Tracking
  • Customisable Branding
  • Customisable Reports
  • Data Visualisation
  • Deadline Management
  • Email Management
  • Employee Management
  • Employee Onboarding
  • Forecasting
  • HR Management
  • Inventory Management
  • License Management
  • Member Accounts
  • Monitoring
  • Onboarding
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Renewal Management
  • Reporting & Statistics
  • Reporting/Analytics
  • SaaS Operations Management
  • Self Service Portal
  • Shadow IT Detection
  • Single Sign On
  • Spend Analysis
  • Spend Control
  • Spend Management
  • Status Tracking
  • Subscription Management
  • Task Management
  • Third Party Integrations
  • Transaction History
  • Usage Tracking/Analytics
  • User Management
  • Vendor Management
  • Workflow Management

View full list of SaaS Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Network Scanning
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Search/Filter
  • Security Auditing
  • Server Monitoring
  • Status Tracking
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Web Scanning

View full list of Vulnerability Management Software

  • API
  • Access Controls/Permissions
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Asset Discovery
  • Network Scanning
  • Network Security Software
  • Password Protection
  • Real Time Analytics
  • Reporting/Analytics
  • Risk Analytics
  • Runtime Container Security
  • SQL Injections
  • SSL Security
  • Source-Code Scanning
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Vulnerability / Threat Prioritization
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web-Application Security
  • Website Crawling

View full list of Vulnerability Scanner

Qualys Cloud Platform Alternatives

More Qualys Cloud Platform alternatives

Qualys Cloud Platform Reviews for UK Users

Read all reviews

Overall rating

3.6/5

Average score

Ease of Use 3.8
Customer Service 3.8
Features 3.9
Value for Money 3.6

Review software

Share your experiences with other software buyers.

Write a Review!
Héctor joel B.
Héctor joel B.
Ingeniero de Implementación y Soporte
Computer & Network Security, 11-50 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 08/01/2019

"Qualys the best vulnerability scanner"

Comments: Based on the experience I have with Qualys, it is very impressive to capture the vulnerabilities, this compiles a complete report of the risks that your infrastructure has, in addition the patches have very precise information that allows you to carry out the remediation very effectively. The analyzes are detailed and very complete, it works very well to carry out the compliance stages of PCI, CIS, etc... Providing a great guarantee that periodically your organization has an armored infrastructure.

Pros: In the firts instance we could see its operation inside a beast and we were amazed, its different configurations to make scans allows to obtain much more complete results than other programs. Qualys as a pentesting tool allows you to analyze those areas of greatest risk within your organization to remedy them. The ability to perform scans for a particular plugin is one of the features that other software should envy to Qualys. Your reports have a very detailed information that allows you to quickly identify vulnerabilities.

Cons: I have no negative comments, it has worked very well in the company and with our allies.

  • Reviewer Source 
  • Reviewed on 08/01/2019
Verified Reviewer
Security Consultant
Computer & Network Security, 11-50 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 05/12/2019

"In my oppinion, the best vulnerability management solution in the market"

Pros: From my years of experience with vulnerability management solutions, Qualys is the best one in the market. First, it is really easy to set up, specially the cloud solution. In less than few hours you can start scanning your environment. Second, it's vulnerability database is constantly updated with the latest vulnerabilities. Third, it contains tons of apps that extends its capabilities (e.g. Asset management app, web application scanning, PCI compliance monitoring, etc.) ...

Cons: The price tag is not the cheapest one. Their licensing model is per IP on the scope, not per live IPs. So for example, if you have three /24 networks with one server each, you will be paying to scan 765 IPs (255*3) instead of only 3 IPs.

  • Reviewer Source 
  • Reviewed on 05/12/2019
Safi R.
Information Security
Financial Services, 201-500 Employees
Used the Software for: 6-12 months
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    3/10
  • Reviewer Source 
  • Reviewed on 06/02/2019

"Qualys VM"

Comments: They need to make the product better .. Focus ion ease of use. Get a focus group going.

Pros: Agent deployment is simple. The software offers much if configured right. I dislike the add on services model.

Cons: False positives. If a later software update rectifies an older vulnerability then there is no need to show asset is vulnerable.
Vuln that shows up in Asset View is different in Vuln View.. Why?
Salesperson quit after the sale which sucked. Replacement helped but was not focused on us.

  • Reviewer Source 
  • Reviewed on 06/02/2019
Verified Reviewer
Information Security Adminstrator
Information Technology & Services, 51-200 Employees
Used the Software for: 2+ years
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 11/03/2020

"Qualys VM Review"

Comments: It is one of the better solutions I have worked with. There are false-positives however this is common to most vulnerability scanners. This is one of the top 3 vulnerability scanners I would recommend. Take the time to understand what you require from the product and start building your tasks and reporting around it. The product will proof extremely valuable.

Pros: The interface is nice and clean. Free online training with labs aids in understanding the product. Easy deployment of agents on both Windows and Linux endpoints.

Cons: Configuring scans was not the easiest of tasks to perform initially. I recommend doing the free online training first before embarking with the deployment. Reporting needs to be improved especially the look and feel of the .PDF reports. Scheduling tasks I found limited as I wanted a particular scan to run 2 days out of the month and was unable to do so. Instead I had to create 2 tasks. Could not find an option to create custom usernames.

  • Reviewer Source 
  • Reviewed on 11/03/2020
Verified Reviewer
Sr. UNIX Systems Admin
Computer Software, 1,001-5,000 Employees
Used the Software for: 1+ year
  • Overall Rating
  • Ease of Use
  • Features & Functionality
  • Customer Support
  • Value for Money
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 05/08/2020

"Vulnerability scanning"

Comments: Overall it has been very positive and we will continue to use it. It has helped us greatly lock down our environment.

Pros: Qualys gives high-quality reports in an easy to read format. The agent has been easy to install and has not caused any issues.

Cons: We have had some instances where scan attempts ended up causing confusion or application outages when they were not designed to handle the scans.

  • Reviewer Source 
  • Reviewed on 05/08/2020