Reviews (1-6 of 6)
It addresses the business problem of helping to secure networks from intrusions and vulnerabilities. It helps IT see what computers on the network has vulnerabilities, and offers them an opportunity to remediate those vulnerabilities.
- It really does well at vulnerability scanning, which it is well known for. It's accuracy at finding vulnerabilities is top notch, more so than a lot of other vulnerability tools out there. In an organization/company you want this kind of accuracy at finding vulnerabilities in your network/endpoints
- It is very good at managing endpoints on a consistent basis, meaning you can add endpoints to Qualys and have the platform scan/track/protect for vulnerabilities on an ongoing basis, without user intervention
- It does really well at separating out and identifying what levels of criticality each vulnerability should fall into. This way, an organization/company can attack the more critical vulnerabilities first
- Can be slow at times, namely when scanning endpoints. Scans can take a while, and results may not be immediately known
- For IT personnel that have never used Qualys before, it can take some time to learn the platform, and how to actually use it. Some sort of training or consulting documentation on the product would be beneficial, as it's a more complicated platform
- Automatic password resets for user/admin login to the platform can be frustrating, as this can happen occasionally, without user/admin awareness
- False positives can also be detected, sometimes at a high rate. Need to lessen that as much as possible
It is less appropriate in environments that want to use a platform right away, without getting training in how to use it, or reading documentation on the product.
- Really good and up to date vulnerability database
- Good reporting capabilities
- PCI ready
- Price tag
- Have the license based on live IPs, not on entire subnets, so then you pay for the exactly amount of servers you have.
We have several scanners deployed in different locations in order to cover all sites, and scheduled scans that run on a periodic basis.
Qualys helps us to prioritize the mitigation, it includes not only OS patches, but also 3rd party software.
- Cloud-based management.
- Detailed info about the findings: reason, effect, risk, mitigations, etc.
- Clear UI.
- Additional modules can be added to the same management interface.(single point of management).
- Notices some findings which were not clear why they appear(suspected false positive).
- Working with Qualys support(for example due to the previous point) wasn't the best experience. the response was very slow.
- Qualys limit the daily API requests. In case you need more, it will cost.
You can scan all types of devices: servers, endpoints, network equipment, FW, and much more, including Cloud workloads (they have a dedicated appliance for IaaS).
For endpoints, it's better to use their Agent in order to avoid running the scans over the network. this has an additional cost.
For Compliance needs, Qualys is good enough.
- API Task scheduling and configuration
- Threat database updates through authenticated scanning of Windows and Unix operating systems
- Reporting capabilities
- The API query can only support limited number of connections in a time period without calling support to request more, I would suggest removing that limitation.
- User setup for multiple groups
- Ease of automation, set it and forget it
- Reporting features were a huge plus
- Took time to learn the UI
- Could be cumbersome for first time users
- Not much online documentation that was useful
At my current organization, Qualysguard is primarily used for discovery of assets and verification of secure configuration/patching by our security team. Our team is also assessing Qualysguard WAS to build into our secure development practices.
At my previous organization, we provided self-service capability for our engineers designing/building our products to perform their own infrastructure scans to identify security configuration flaws as early in the build process as possible. We also used Qualysguard for discovery of assets and verification of secure configuration/patching.
In both organizations, Qualysguard has added a ton of value.
- Discovery of assets on a network.
- Identifying infrastructure security configuration flaws for a number of different OS types.
- Easy UI to navigate.
- Easier way for VM scan custom profile management. A way to determine if there are duplicate scan profiles created to reduce redundancy with multiple administrators.
- This may have been addressed, but my previous organization had a lot of difficulties integrating Qualysguard with RSAM.
- Add trending over time capabilities to dashboard.
Qualys Cloud Platform Scorecard Summary
About Qualys Cloud Platform
Qualys Cloud Platform Technical Details