Qualys Review
January 24, 2023

Qualys Review

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

Qualys Cloud Platform

Modules Used

  • Patch Management

Overall Satisfaction with Qualys Cloud Platform

Qualys is used to scan periodically the environment in order to check if there are some packages (Linux) or Applications (Windows) outdated, generating reports to the Service Owners to let them know what's the current situation regarding their environment to schedule
  • OS inventory
  • Updated Database
  • Vulnerability Addressed
  • Reports should be improved
  • Knowledge Base (forums)
  • documentation
  • Scan Vulnerabilities
  • Help to create reports
  • Addressing findings
  • Return of Investment
  • Pro-active actions and decisions
  • Help to keep the environment up-to-date
As described before Qualys is used to scan periodically the environment in order to check if there are some packages (Linux) or Applications (Windows) outdated, generating reports to the Service Owners, fulfilling what's is expected from us, attending all our expectations regarding the tool. That's why we'd choose Qualys to our organization.

Do you think Qualys TruRisk Platform delivers good value for the price?

Yes

Are you happy with Qualys TruRisk Platform's feature set?

Yes

Did Qualys TruRisk Platform live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Qualys TruRisk Platform go as expected?

I wasn't involved with the implementation phase

Would you buy Qualys TruRisk Platform again?

Yes

In our company basically we use Qualys to scan periodically environment in order to check if there are some packages (Linux) or Applications (Windows) outdated, generating reports to the Service Owners helping them to addressing the findings scheduling to apply patches. So the tool's functionality fulfills the purpose expected from us.

Qualys TruRisk Platform Feature Ratings

IT Asset Realization
8
Configuration Monitoring
8
Web Scanning
8
Vulnerability Intelligence
9
Vulnerability Classification
Not Rated
Automated Alerts and Reporting
Not Rated
Threat Analysis
Not Rated
Automated Threat Identification
Not Rated
Threat Recognition
Not Rated