Qualys VMDR 2.0 with TruRisk gives enterprises visibility and insight into cyber risk exposure with the goal of making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time.
N/A
Vulcan Cyber
Score 8.0 out of 10
Mid-Size Companies (51-1,000 employees)
Vulcan Cyber is an exposure and vulnerability risk mitigation platform that coordinates teams, tools and tasks to eliminate the most-critical exposure risk to the business. Vulcan Cyber first correlates risk signals from scanners, cyber asset and threat intelligence tools. Risk data from infrastructure, cloud, application and code projects is aggregated into the Vulcan Cyber data lake. Normalized risk data is then used to automate the prioritization and orchestration of risk mitigation…
$0
per year
Pricing
Qualys VMDR
Vulcan Cyber
Editions & Modules
No answers on this topic
Vulcan Free
$0
Vulnerability prioritization technology available for small organizations with less than 1,000 secured assets, one user and up to three integrated Vulcan Connectors.
Vulcan Enterprise
Custom licensing terms
Vulcan Enterprise is designed for large organizations with hyper-scale vulnerability and exposure risk management requirements. Custom pricing and licensing terms. Vulcan Enterprise offers scalable user licensing to help secure 5,000+ assets and unlimited integrations.
Offerings
Pricing Offerings
Qualys VMDR
Vulcan Cyber
Free Trial
No
No
Free/Freemium Version
No
Yes
Premium Consulting/Integration Services
No
Yes
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Qualys VMDR
Vulcan Cyber
Considered Both Products
Qualys VMDR
No answer on this topic
Vulcan Cyber
Verified User
Strategist
Chose Vulcan Cyber
Nucleus Security was missing some connectors and was more focused on risk prioritization than ticketing automation.
Seemplicity had a different billing method that may have ended up being more expensive. Also a younger app.
Qualys VMDR is best suited for larger companies with a very large IT asset footprint. Qualys VMDR is not suited for businesses that are small and upcoming as the price for the tool is very expensive and could be a budget sink if not used properly. In our organization we use the Qualys VMDR dashboard and reporting in order to collect any vulnerabilities we miss during our routine audits to ensure that our environment is stable and protected for attacks.
It's really challenging at times to contend with multiple vulnerabilities on a daily basis, and having a way to make sense of what actually needs to be prioritized and what can be shifted further down the task list is extremely helpful. Because the solution suggests what your next step should be in mitigating a specific vulnerability, it helps us save time and research by enabling us to immediately take action after being informed about an issue.
This is iron but I am giving it 5 star and I can give more If I can do because they are best in support. So once you own this product they will assign a dedicated support for you and when you are under the weather with anything just connect them with anything call, ping or ticket they will come like Genie.
It is a very similar tool but Qualys VMDR is much better when it comes to reporting and solutions provided. Asset management is really good in Qualys VMDR. Qualys VMDR support is really quick , you can get a TPM if you run into any issues. Qualys VMDR has wide variety of scanning options which lacks in tenable.
I wasn't here at the time when the company compared different vulnerability management platforms so I'm not sure on the reasoning and difference between the 2. It could be that the team went through different choices and found Vulcan to be the best fit. It's hard for me to say why Vulcan was specifically chosen
Allows much better prioritizing of which assets are most vulnerable
Allow a better understanding of what assets are actually under real threat vs. what is assumed to be vulnerable, but the real world fact is the system would be hard to reach internally, so it's not as vulnerable.