GFI LanGuard is software used to manage and maintain end-point protection across a network. It provides visibility into all the elements in the network, helping to assess where there may be potential vulnerabilities, and enables the administrator to patch them. It is a patch management and network auditing solution.
N/A
Qualys TruRisk Platform
Score 6.5 out of 10
N/A
Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and remediation, and other features to provide vulnerability management and network attack surface reduction.
N/A
Pricing
GFI LanGuard
Qualys TruRisk Platform
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
GFI LanGuard
Qualys TruRisk Platform
Free Trial
Yes
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
GFI LanGuard
Qualys TruRisk Platform
Features
GFI LanGuard
Qualys TruRisk Platform
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
GFI LanGuard
-
Ratings
Qualys TruRisk Platform
8.7
7 Ratings
8% above category average
Network Analytics
00 Ratings
8.96 Ratings
Threat Recognition
00 Ratings
8.37 Ratings
Vulnerability Classification
00 Ratings
8.87 Ratings
Automated Alerts and Reporting
00 Ratings
9.07 Ratings
Threat Analysis
00 Ratings
8.27 Ratings
Threat Intelligence Reporting
00 Ratings
8.97 Ratings
Automated Threat Identification
00 Ratings
8.77 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
-To track the vulnerability level of a windows network. -To push windows and other application updates from a central location. -Produce reports to highlight work being done to protect a network. In some organizations, you may have to prove for audit reasons you are enforcing policies put into place around cyber-security. This software can help you track work done on an ongoing basis for such purposes.
Qualys Cloud Platform is well suited for organizations that need additional tools to secure and bolster their security from end to end. The automated, real-time threat protection is very quick to notify an admin of potential vulnerabilities and risks, as well as recommending quick fixes to resolve/close the gap before an incident occurs. QCP excels at portraying all of these in a single pane of glass, and find that the Qualys reports are more detailed than competitor product lines. One of our big issues with QCP is that you do have to pay for each scanner, which can quickly add up to large costs. For this reason, I would rate Qualys at a ~7 due to great features and functionality, but overall value could be better for a large organization. I would also say that QCP may make more sense for smaller organizations due to this pricing model.
It really does well at vulnerability scanning, which it is well known for. It's accuracy at finding vulnerabilities is top notch, more so than a lot of other vulnerability tools out there. In an organization/company you want this kind of accuracy at finding vulnerabilities in your network/endpoints
It is very good at managing endpoints on a consistent basis, meaning you can add endpoints to Qualys and have the platform scan/track/protect for vulnerabilities on an ongoing basis, without user intervention
It does really well at separating out and identifying what levels of criticality each vulnerability should fall into. This way, an organization/company can attack the more critical vulnerabilities first
It could be a bit of information overload which some things are shown can become noise. Maybe different levels of "security" for lack of a better term may be better where you have a summary vs detailed level when it comes to rating the vulnerability of the entire network.
I find I sometimes have issues with PCs on a different network accessed across a VPN where timeouts often occur with very large updates. This aspect can be improved.
This program is really complicated, the multiple functions that are presented to us are not very clear and in some cases, it is a matter of intuition to execute a function, it is not very informative.
The interface of this program can be a real problem; for our taste, this program looks a bit messy, and the interface does not help or guide you to find the options you need.
Again, the usability of Qualys has been a pinpoint for this entire review. It was easily the worst thing about the product and because of this, I would not recommend Qualys to anybody in my field. This should be something that Qualys strives to improve if they wish to stay in business.
I only tried to access there support once and it was a relatively pain-free process. They also have a lot of documentation available online which can be used to learn and tailor the software to suit your needs. It just takes time and effort to plan, execute and monitor going forward.
They had a support page within the WAS to report any concerns or seek help. But the UI of that is not smooth. Regardless support staff were pretty responsive and helpful. They scheduled calls to understand and address our problems. Email support is good as well.
WSUS was the other alternative I considered but I believe GFI takes updates, reporting, and functionality to a different level for an enterprise/medium-size business environment.
As described before Qualys is used to scan periodically the environment in order to check if there are some packages (Linux) or Applications (Windows) outdated, generating reports to the Service Owners, fulfilling what's is expected from us, attending all our expectations regarding the tool. That's why we'd choose Qualys to our organization.
Certainty. It allows you to know where on your network needs attention.
Peace of mind. As security professionals, we can only put the necessary things in place to prevent malicious persons from exploiting a network. The software allows you to know whether or not your risk of exploitation is high or low. and if high what to do with it.