Qualys TruRisk PlatformFormerly Qualys Cloud Platform / Qualysguard
Overview
What is Qualys TruRisk Platform?
Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and remediation, and other features to provide…
Integrate Security in the Early Stages of your Software Development Lifecycle
Qualys Review
Qualys Cloud Platform is a great program.
Qualys strikes again
Qualys Cloud Platform review
The …
Qualys Cloud Platform for Patch Management is a quick and effective tool to get started
Qualys Cloud Platform is a trusted solution for global security visibility, detection and remediation
A single guard on door with thousand hands.
Automated Threat Protection reaches all corners of our organization to provide an end-to-end security solution for the 21st Century
Qualys Policy Compliance - You are covered every second in this Cyber Security world.
Qualys Cloud: Holistic approach to Cloud Security
Qualys cloud: good product to use
High performer in the vulnerability management and cloud security space
Qualys WAS has a lot of scope for improvement
Beware of Qualys
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Popular Features
- IT Asset Realization (9)8.888%
- Web Scanning (8)8.888%
- Vulnerability Classification (7)8.787%
- Threat Recognition (7)8.383%
Reviewer Pros & Cons
Pricing
What is Qualys TruRisk Platform?
Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and remediation, and…
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
114 people also want pricing
Alternatives Pricing
What is Microsoft Defender for Endpoint?
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection…
What is CrowdStrike Falcon?
CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…
Features
Threat Intelligence
Features for categories that leverage threat intelligence in network security
- 8.8Network Analytics(6) Ratings
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
- 8.3Threat Recognition(7) Ratings
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
- 8.7Vulnerability Classification(7) Ratings
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
- 9Automated Alerts and Reporting(7) Ratings
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
- 8.2Threat Analysis(7) Ratings
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
- 8.9Threat Intelligence Reporting(7) Ratings
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
- 8.7Automated Threat Identification(7) Ratings
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Vulnerability Management Tools
Tools that focus on locating, identifying, and prioritizing vulnerabilities in a network that need to be patched.
- 8.8IT Asset Realization(9) Ratings
Scans a network to identify hardware and software assets on the network.
- 7.8Authentication(6) Ratings
Authentication of users and services within a network to prevent vulnerabilities from being introduced to the network.
- 8.4Configuration Monitoring(7) Ratings
Constant monitoring of a network set up to identify vulnerabilities as they occur within the network or tech stack on the network.
- 8.8Web Scanning(8) Ratings
Specifically scans webpages for potential threats or vulnerabilities.
- 8.6Vulnerability Intelligence(7) Ratings
Software that is able to label and store information about vulnerabilities to access for future use cases.
Product Details
- About
- Tech Details
- FAQs
What is Qualys TruRisk Platform?
Qualys TruRisk Platform Video
Qualys TruRisk Platform Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(86)Community Insights
- Business Problems Solved
- Pros
- Cons
- Recommendations
Qualys Cloud Platform provides users with a wide range of options to scan and manage vulnerability levels in applications and websites, offering detailed visibility into IT services. Users have successfully utilized the Qualys API and Python to schedule scans of their networks, focusing on critical and high vulnerabilities. This proactive approach has resulted in a reduction in attacks and compromises across the enterprise. Additionally, the integration capabilities of Qualys Cloud Platform have proven valuable for users consolidating multiple tools, providing a unified dashboard for better visibility and management of their IT infrastructure and risks.
One key use case of Qualys Cloud Platform is policy compliance. Users have praised Qualys Policy Compliance for its ability to create policies, establish controls, and manage compliance across the organization. The user-friendly UI and unified dashboard aid decision-making for C-level executives. Furthermore, Qualys Cloud Platform has been used to continuously assess workloads in multi-cloud environments and ensure they align with security policies.
Vulnerability detection and prioritization are also critical use cases for Qualys Cloud Platform. It is relied upon by users for network security monitoring, web application monitoring, asset discovery, threat protection, and compliance monitoring. With a comprehensive view of network security and critical applications, users can determine the need for patching and effectively secure their IT infrastructure. The software's effectiveness extends to monitoring and managing diverse assets such as servers, switches, Windows, UNIX systems, NAS appliances, and web URLs.
Another benefit of Qualys Cloud Platform is its automation capabilities for scanning and reporting tasks. This automation saves time while providing real-time awareness of security levels, vulnerability detection, and prioritized remediation needs. Users appreciate the user-friendly interface, organized asset management features, integration with Splunk, centralized logging for investigation purposes, as well as patching status monitoring. Overall, Qualys Cloud Platform equips organizations with the necessary tools to protect their IT infrastructure—such as data, applications, endpoints—and achieve compliance while streamlining security processes.
Informative Reports: Many users have praised the informative reports generated by Qualys Cloud Platform. Several reviewers have mentioned that the platform provides detailed and comprehensive reports, allowing them to easily identify security vulnerabilities in their systems. This feature has been highly appreciated by a significant number of customers.
Accurate Vulnerability Identification: The platform's capabilities in accurately identifying security vulnerabilities have been lauded by numerous users. Reviewers have highlighted that Qualys Cloud Platform effectively scans and detects potential weaknesses in their systems, providing them with reliable information to address these issues promptly. This aspect has received positive feedback from a substantial portion of customers.
User-friendly Interface: A considerable number of reviewers have commended the user-friendly interface of Qualys Cloud Platform. Users appreciate how easy it is to navigate through the platform and access different features without any technical difficulties. This intuitive design has made it convenient for many customers to use and maximize the benefits of the platform.
Complicated Program: Some users have found the program to be complicated and challenging to navigate, requiring intuition to execute tasks effectively. This complexity can make it difficult for new users to quickly understand all of its functions.
Messy Interface: Users have mentioned that the interface is cluttered and lacks clear organization, making it hard to find the options they need. The disorganized layout can lead to frustration and inefficiency in navigating the program.
Lack of Customer Support: Several users expressed dissatisfaction with Qualysguard's customer support, citing slow response times and missed SLAs. Prompt and efficient support is crucial for users when encountering issues or seeking assistance, but some felt let down by their experiences with Qualysguard's support team.
Users recommend using Qualys for security purposes, such as security validation and vulnerability assessment. They have found that Qualys does a solid job of detecting network vulnerabilities and reporting on them. Some users specifically recommend deploying agents on all endpoints and doing authenticated scans with Qualys to improve the accuracy of the results.
Users advise exploring product trials carefully to understand where Qualys might fall short of expectations. While many users find Qualys to be a valuable tool for security improvement and business analysis, they also note that it has a learning curve and can be difficult to set up initially.
Users mention that Qualys is more expensive compared to other products on the market but still worth the investment. They recommend integrating Qualys into the workflow of security scanning and highlight its functionalities and inbuilt features as reasons to choose it. Some users also suggest improving customer support for Qualys as an area of enhancement.
Overall, users strongly recommend Qualys as a reliable tool for security assessment, especially for enterprise organizations where vulnerabilities can have serious consequences for the business.
Attribute Ratings
Reviews
(1-18 of 18)Qualys Review
Qualys Cloud Platform for Patch Management is a quick and effective tool to get started
Qualys Cloud Platform is a trusted solution for global security visibility, detection and remediation
A single guard on door with thousand hands.
Automated Threat Protection reaches all corners of our organization to provide an end-to-end security solution for the 21st Century
- Tenable.sc (formerly SecurityCenter)
Qualys Cloud: Holistic approach to Cloud Security
Qualys cloud: good product to use
Qualys WAS has a lot of scope for improvement
Beware of Qualys
- VMware Carbon Black Cloud Managed Detection (formerly cb threatsight) and VMware Carbon Black Cloud Endpoint Standard (formerly Cb Defense)
Happy Qualys user.
Delivers as intended!
- Nessus and Metasploit
Best platform for finding/remediating vulnerabilities
Qualysguard to improve the quality of your security posture
- Nessus, OpenVAS and Nmap
The better vulnerability management tool
- Nessus, Nmap and Metasploit
- Nessus and eEye
Qualys, Vulnurability Management For The Pros
- Retina Network Security Scanner, Tenable Nessus and Microsoft Baseline Security Analyzer