Integrate Security in the Early Stages of your Software Development Lifecycle
Updated June 19, 2023

Integrate Security in the Early Stages of your Software Development Lifecycle

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

Qualys Cloud Platform

Modules Used

  • Web App Scanning
  • Vulnerability MAnagement

Overall Satisfaction with Qualys Cloud Platform

We use Qualys Cloud Platform to perform automated Web App Scans on internally developed platforms. Once set, and with the scheduled scans features, there's no more heavy lifting: just wait for the notifications either via mail or the ticketing system, download the report in pdf format, and escalate/assign to the right stakeholders.
  • Scheduled scans.
  • Detailed reports with graphs.
  • Notify when there's a [potential] vulnerability
  • Modernize the Web GUI.
  • Scheduled scanning.
  • Automatic Reports.
  • Notifications.
  • Integrate security in the early steps of software development
  • Find vulnerabilities before the bad actors do
  • Strengthen our compliance posture

Do you think Qualys TruRisk Platform delivers good value for the price?

Not sure

Are you happy with Qualys TruRisk Platform's feature set?

Yes

Did Qualys TruRisk Platform live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Qualys TruRisk Platform go as expected?

I wasn't involved with the implementation phase

Would you buy Qualys TruRisk Platform again?

Yes

Qualys Cloud Platform makes the dark corners of your webapp visible. What's visible can be made secure.
This allows you to focus on the important: your security and compliance posture.
With the automated scheduled scanning, reporting, and notifying you pretty much don't have any heavy lifting to do.
It also offers native integrations with the major Cloud Providers.

Qualys TruRisk Platform Feature Ratings

IT Asset Realization
10
Authentication
10
Configuration Monitoring
10
Web Scanning
10
Vulnerability Intelligence
10
Network Analytics
10
Vulnerability Classification
10
Automated Alerts and Reporting
10
Threat Analysis
10
Threat Intelligence Reporting
10
Automated Threat Identification
10
Threat Recognition
10