Qualys VMDR detailed review
December 24, 2022

Qualys VMDR detailed review

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Qualys VMDR

We have a big customer which has over 2 million devices to manage and it is a very complex infrastructure. Qualys VMDR did come in handy to manage vulnerability aspect of management. Its is very good tool to use and easy to learn. It has wide set of functionality with role management as well in place.
  • vulnerability detection
  • updated CVEs and support from product
  • Reporting
  • Scheduling tasks
  • Asset Management
  • Custom Reporting option
  • More options on the dashboard customization
  • Reporting
  • Asset Management
  • Visibility into the vulnerable assets at a glance
  • Faster patching
  • Easy reports for multiple teams to work in coordination
  • Solutions to patch vulnerabilities
It is a very similar tool but Qualys VMDR is much better when it comes to reporting and solutions provided. Asset management is really good in Qualys VMDR. Qualys VMDR support is really quick , you can get a TPM if you run into any issues. Qualys VMDR has wide variety of scanning options which lacks in tenable.

Do you think Qualys VMDR delivers good value for the price?

Yes

Are you happy with Qualys VMDR's feature set?

Yes

Did Qualys VMDR live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Qualys VMDR go as expected?

Yes

Would you buy Qualys VMDR again?

Yes

Qualys VMDR supports both remote scanning and as well as agent based scanning. With a complex infrastructure with over 2 million devices and 100s getting added and removed on daily basis makes the operations challenging. Qualys VMDR has a great feature to do discovery scan to detect active devices on the network and perform vulnerability scans on those assets. Authentication is also easy to setup and use.

Qualys VMDR Feature Ratings

IT Asset Realization
10
Authentication
10
Configuration Monitoring
10
Web Scanning
9
Vulnerability Intelligence
10
Network Analytics
7
Vulnerability Classification
10
Automated Alerts and Reporting
10
Threat Analysis
7
Threat Intelligence Reporting
8
Automated Threat Identification
8
Threat Recognition
8