Qualys Cloud: Holistic approach to Cloud Security
March 15, 2022

Qualys Cloud: Holistic approach to Cloud Security

Naga Sayeenathan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Qualys Cloud Platform (formerly Qualysguard)

** To use Qualys Cloud to continuously assess the workloads in the multi-cloud environment and make sure they are in line with our security policies
** Application Security and Policy Compliance
** Reduce risk and increase their levels of
compliance in a cost-effective manner
**Detect and prioritise
vulnerabilities and misconfigurations across the IT estate, as well as
supporting automated patching and remediation activities
  • Vulnerability management
  • Patch management
  • Reporting and alerting mechanism
  • Addressing false positives
  • JIRA Integration
  • UI interface could be cumbersome for first time users
  • Policy Compliance
  • Continuous visibility
  • Web App Scanning
  • Maintain Compliance Status
  • Streamline risk management program
  • Save on cyber insurance
Qualys Cloud Platform is the best tool available in the market considering the following factors - (1) simplify security operations and lower the cost of compliance (2) Visibility of cloud security configuration issues (3)User friendly interface with flexible options to configure scan polices, schedules and reporting (3) Cost (4) Technical support

Do you think Qualys TruRisk Platform delivers good value for the price?

Yes

Are you happy with Qualys TruRisk Platform's feature set?

Yes

Did Qualys TruRisk Platform live up to sales and marketing promises?

Yes

Did implementation of Qualys TruRisk Platform go as expected?

Yes

Would you buy Qualys TruRisk Platform again?

Yes

Some of the major drivers behind why companies deploy Qualys Cloud --Compliance obligations, Policy enforcement validation and policy violations, Continuous monitoring and incident response, Detect and prioritize
vulnerabilities and mis-configurations across the IT estate, as well as
supporting automated patching and remediation activities continuous monitoring, event triage and threat hunting. Security should be a top business priority in every industry and a lack of funding is no excuse