TrustRadius
The Qualys Cloud Platform (formerly Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and remediation, and other features to provide vulnerability management and network attack surface reduction.https://media.trustradius.com/product-logos/1N/CX/TQWNNZZX56H0.jpegBest platform for finding/remediating vulnerabilitiesIt is being used both across the whole organization, as well as at the department level. It is the platform used. It is used mainly for vulnerability scanning endpoints on the network, and then remediating those vulnerabilities. It is also used by some do do reporting and tracking of vulnerabilities. Internally, we mainly use it to scan individual computers, and well as groups of computers within a certain department. With regards to the vulnerabilities, we can determine if patching is needed on the endpoints. It addresses the business problem of helping to secure networks from intrusions and vulnerabilities. It helps IT see what computers on the network has vulnerabilities, and offers them an opportunity to remediate those vulnerabilities.,It really does well at vulnerability scanning, which it is well known for. It's accuracy at finding vulnerabilities is top notch, more so than a lot of other vulnerability tools out there. In an organization/company you want this kind of accuracy at finding vulnerabilities in your network/endpoints It is very good at managing endpoints on a consistent basis, meaning you can add endpoints to Qualys and have the platform scan/track/protect for vulnerabilities on an ongoing basis, without user intervention It does really well at separating out and identifying what levels of criticality each vulnerability should fall into. This way, an organization/company can attack the more critical vulnerabilities first,Can be slow at times, namely when scanning endpoints. Scans can take a while, and results may not be immediately known For IT personnel that have never used Qualys before, it can take some time to learn the platform, and how to actually use it. Some sort of training or consulting documentation on the product would be beneficial, as it's a more complicated platform Automatic password resets for user/admin login to the platform can be frustrating, as this can happen occasionally, without user/admin awareness False positives can also be detected, sometimes at a high rate. Need to lessen that as much as possible,9,One positive impact is it has helped to increase overall security of the network by proactively monitoring potential vulnerabilities on endpoints. Another positive impact it has had was to help to increase efficiencies of the IT support department, by enabling IT support personnel to have a central platform to find/remediate vulnerabilities on user's computers and the network.,,9,Microsoft Office 365, Freshdesk, Skype for Business (formerly Lync), TeamViewer, Malwarebytes, Microsoft System Center Endpoint Protection, Zoom, Avira Antivirus, Microsoft Project, WinZipQualysguard to improve the quality of your security postureWe used the Qualys API and python to create rolling scheduled scans of every 2 weeks for every network for our organization. We first focused on critical and high vulnerabilities with direction to remediate or remove the system within 30 days. We saw a drastic reduction in number of attacks and compromises for systems across the enterprise.,API Task scheduling and configuration Threat database updates through authenticated scanning of Windows and Unix operating systems Reporting capabilities,The API query can only support limited number of connections in a time period without calling support to request more, I would suggest removing that limitation.,8,ROI was noticed with reduction of compromises which required server downtime and incident response.,Nessus, OpenVAS and Nmap,Palo Alto Networks Next-Generation Firewalls - PA Series, Palo Alto Networks Threat Protection, Palo Alto PanoramaThe better vulnerability management toolWe used Qualysguard to automate testing of our environment for vulnerabilities. We used several groups to run the testing some with longer and more extensive tests. Mostly this was done in two phases, once before a resource was deployed for use and then several times after over duration to ensure any vulnerabilities were caught.,User setup for multiple groups Ease of automation, set it and forget it Reporting features were a huge plus,Took time to learn the UI Could be cumbersome for first time users Not much online documentation that was useful,9,I was not involved in the purchase but the personal ROI really helped make my job quicker and more efficient.,Nessus, NMap and Metasploit,Nmap, MetasploitQualysguard for Asset Discovery and Verification of Patching/Secure ConfigAt my current organization, Qualysguard is primarily used for discovery of assets and verification of secure configuration/patching by our security team. Our team is also assessing Qualysguard WAS to build into our secure development practices.At my previous organization, we provided self-service capability for our engineers designing/building our products to perform their own infrastructure scans to identify security configuration flaws as early in the build process as possible. We also used Qualysguard for discovery of assets and verification of secure configuration/patching.In both organizations, Qualysguard has added a ton of value.,Discovery of assets on a network. Identifying infrastructure security configuration flaws for a number of different OS types. Easy UI to navigate.,Easier way for VM scan custom profile management. A way to determine if there are duplicate scan profiles created to reduce redundancy with multiple administrators. This may have been addressed, but my previous organization had a lot of difficulties integrating Qualysguard with RSAM. Add trending over time capabilities to dashboard.,8,Provides the business the information needed to prioritize security requirements and secure appropriate budget. Provides self-service capabilities for users to perform their own scans. Provides visibility for asset discovery which was previously a difficult task.,Nessus and eEye,RSA Archer, Veracode, Burp Suite
Unspecified
Qualys Cloud Platform (formerly Qualysguard)
18 Ratings
Score 8.5 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>

Qualys Cloud Platform Reviews

Qualys Cloud Platform
18 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 8.5 out of 101

Do you work for this company?

Show Filters 
Hide Filters 
Filter 18 vetted Qualys Cloud Platform reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-4 of 4)

Companies can't remove reviews or game the system. Here's why.
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source
It is being used both across the whole organization, as well as at the department level. It is the platform used. It is used mainly for vulnerability scanning endpoints on the network, and then remediating those vulnerabilities. It is also used by some do do reporting and tracking of vulnerabilities. Internally, we mainly use it to scan individual computers, and well as groups of computers within a certain department. With regards to the vulnerabilities, we can determine if patching is needed on the endpoints.

It addresses the business problem of helping to secure networks from intrusions and vulnerabilities. It helps IT see what computers on the network has vulnerabilities, and offers them an opportunity to remediate those vulnerabilities.
  • It really does well at vulnerability scanning, which it is well known for. It's accuracy at finding vulnerabilities is top notch, more so than a lot of other vulnerability tools out there. In an organization/company you want this kind of accuracy at finding vulnerabilities in your network/endpoints
  • It is very good at managing endpoints on a consistent basis, meaning you can add endpoints to Qualys and have the platform scan/track/protect for vulnerabilities on an ongoing basis, without user intervention
  • It does really well at separating out and identifying what levels of criticality each vulnerability should fall into. This way, an organization/company can attack the more critical vulnerabilities first
  • Can be slow at times, namely when scanning endpoints. Scans can take a while, and results may not be immediately known
  • For IT personnel that have never used Qualys before, it can take some time to learn the platform, and how to actually use it. Some sort of training or consulting documentation on the product would be beneficial, as it's a more complicated platform
  • Automatic password resets for user/admin login to the platform can be frustrating, as this can happen occasionally, without user/admin awareness
  • False positives can also be detected, sometimes at a high rate. Need to lessen that as much as possible
It is well suited for environments that are looking for a solution that is top notch for vulnerability scanning, and is the most accurate at doing so. It would also fit environments that have a lot of endpoints to scan or like to have scanning done on an automatic basis.

It is less appropriate in environments that want to use a platform right away, without getting training in how to use it, or reading documentation on the product.
Read this authenticated review
Alex Waitkus, CISSP-ISSAP, OSCP profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source
We used the Qualys API and python to create rolling scheduled scans of every 2 weeks for every network for our organization. We first focused on critical and high vulnerabilities with direction to remediate or remove the system within 30 days. We saw a drastic reduction in number of attacks and compromises for systems across the enterprise.
  • API Task scheduling and configuration
  • Threat database updates through authenticated scanning of Windows and Unix operating systems
  • Reporting capabilities
  • The API query can only support limited number of connections in a time period without calling support to request more, I would suggest removing that limitation.
Qualysguard is well suited for all IT vulnerability scanning. Because of its noise (which is configurable) it is not recommended for ICS environments without customization.
Read Alex Waitkus, CISSP-ISSAP, OSCP's full review
Alan Matson, CCNA:S, MCP profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
We used Qualysguard to automate testing of our environment for vulnerabilities. We used several groups to run the testing some with longer and more extensive tests. Mostly this was done in two phases, once before a resource was deployed for use and then several times after over duration to ensure any vulnerabilities were caught.
  • User setup for multiple groups
  • Ease of automation, set it and forget it
  • Reporting features were a huge plus
  • Took time to learn the UI
  • Could be cumbersome for first time users
  • Not much online documentation that was useful
Of many of the other vulnerability testing suites I used, this offered the most robust features and, once you learned the UI, was a go-to tool. The reporting was very nice for not only us technical but for reports for management as well that were easy to understand and prioritize fixes.
Read Alan Matson, CCNA:S, MCP's full review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

At my current organization, Qualysguard is primarily used for discovery of assets and verification of secure configuration/patching by our security team. Our team is also assessing Qualysguard WAS to build into our secure development practices.

At my previous organization, we provided self-service capability for our engineers designing/building our products to perform their own infrastructure scans to identify security configuration flaws as early in the build process as possible. We also used Qualysguard for discovery of assets and verification of secure configuration/patching.

In both organizations, Qualysguard has added a ton of value.

  • Discovery of assets on a network.
  • Identifying infrastructure security configuration flaws for a number of different OS types.
  • Easy UI to navigate.
  • Easier way for VM scan custom profile management. A way to determine if there are duplicate scan profiles created to reduce redundancy with multiple administrators.
  • This may have been addressed, but my previous organization had a lot of difficulties integrating Qualysguard with RSAM.
  • Add trending over time capabilities to dashboard.
I've seen Qualysguard work really well for discovery, however you need to have good knowledge of your organization's network topology to ensure Qualys is able to access. In some cases you may end up requiring multiple appliances due to capacity or access contraints. Qualysguard is also very good for verifying patching, server hardening configurations, and other compliance requirements.
Read this authenticated review

Qualys Cloud Platform Scorecard Summary

About Qualys Cloud Platform

The Qualys Cloud Platform (formerly Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and remediation, and other features to provide vulnerability management and network attack surface reduction.

Qualys Cloud Platform Technical Details

Operating Systems: Unspecified
Mobile Application:No