Overview
What is Qualys VMDR?
Qualys VMDR 2.0 with TruRisk gives enterprises visibility and insight into cyber risk exposure with the goal of making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate…
Qualys VMDR -- A Promising Security Program
A single guard on door with thousand hands.
A good vulnerability assessment tool for mid-sized companies
Qualys VMDR detailed review
Qualys VMDR is a MUST for any large IT Department!
Popular Features
- Vulnerability Classification (5)9.494%
- Automated Alerts and Reporting (5)9.494%
- Network Analytics (5)8.686%
- Threat Recognition (5)8.686%
Pricing
What is Qualys VMDR?
Qualys VMDR 2.0 with TruRisk gives enterprises visibility and insight into cyber risk exposure with the goal of making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true…
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
59 people also want pricing
Alternatives Pricing
What is Kaspersky Endpoint Security Cloud?
Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…
What is Snyk?
Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and helps security teams to collaborate with their development teams. It boasts a developer-first approach that ensures organizations can secure all of the critical components of their applications from code to…
Product Demos
Qualys VMDR Deep-Dive Demo | InfoSec Matters
Features
Threat Intelligence
Features for categories that leverage threat intelligence in network security
- 8.6Network Analytics(5) Ratings
Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.
- 8.6Threat Recognition(5) Ratings
Detection and recognition of malicious software within a network that could pose a threat to sensitive information.
- 9.4Vulnerability Classification(5) Ratings
Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.
- 9.4Automated Alerts and Reporting(5) Ratings
Systems in place to automatically alert, report, or notify of issues that may need timely remediation.
- 8.6Threat Analysis(5) Ratings
Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.
- 8.6Threat Intelligence Reporting(5) Ratings
Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)
- 8.6Automated Threat Identification(5) Ratings
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Vulnerability Management Tools
Tools that focus on locating, identifying, and prioritizing vulnerabilities in a network that need to be patched.
- 8.7IT Asset Realization(5) Ratings
Scans a network to identify hardware and software assets on the network.
- 8.3Authentication(5) Ratings
Authentication of users and services within a network to prevent vulnerabilities from being introduced to the network.
- 9.2Configuration Monitoring(5) Ratings
Constant monitoring of a network set up to identify vulnerabilities as they occur within the network or tech stack on the network.
- 8.7Web Scanning(4) Ratings
Specifically scans webpages for potential threats or vulnerabilities.
- 9.4Vulnerability Intelligence(5) Ratings
Software that is able to label and store information about vulnerabilities to access for future use cases.
Product Details
- About
- Tech Details
- FAQs
What is Qualys VMDR?
Qualys VMDR Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(28)Community Insights
- Business Problems Solved
- Recommendations
Users have found the automated scanning feature of the product helpful in identifying vulnerabilities in their systems. It supports most operating systems and provides the option to install an agent for better compatibility. The patching module helps users determine if vulnerabilities can be patched and provides information on patch availability. Real-time threat protection categorizes vulnerabilities, allowing users to prioritize remediation efforts. The product aids in managing assets within an organization, providing increased visibility into different components. Users appreciate the ability to prioritize vulnerabilities based on importance. The variety of applications included in the product, such as asset management and web application scanning, enhance its features. It helps in detecting and managing vulnerabilities, as well as monitoring for malicious activity.
Vulnerability management has become easier with the product, allowing for better tracking. It supports the implementation of a complete vulnerability management program in large corporations. Users find it time-saving and useful for solving vulnerability issues on Windows servers. Key roles of the product in organizations include asset identification, vulnerability management, patch prioritization, and risk management. Users appreciate the faster resolution provided by the product. It aids in vulnerability management of information systems and accurately reporting vulnerabilities and compliance status. Known issues are being resolved with its help. The inventory management feature enhances overall work experience while discovering unmanaged assets is made possible. Patching gaps are identified, aiding timely patching activities within the IT infrastructure. The product is suitable for continuous security monitoring and response capabilities.
Users have provided valuable recommendations for Qualys based on their experiences with the tool. The most common recommendations include prioritizing Qualys for vulnerability management and policy compliance, comparing Qualys with other vulnerability management providers to understand the real difference, and recognizing Qualys as a powerful enterprise-level tool for governing and managing vulnerability assessment programs. Additionally, users mention that while Qualys is better than other products in the market, they believe there is still room for improvement to meet all their requirements.
Attribute Ratings
Reviews
(1-5 of 5)Qualys VMDR -- A Promising Security Program
- Asset Discovery and Asset Management
- Vulnerability Management
- Front-line technical support
- A little expensive in comparison with other solutions
- Web Application Scanning
- PCI compliance
- IT Asset Realization
- 70%7.0
- Authentication
- 80%8.0
- Configuration Monitoring
- 80%8.0
- Web Scanning
- 80%8.0
- Vulnerability Intelligence
- 90%9.0
- Network Analytics
- 80%8.0
- Vulnerability Classification
- 80%8.0
- Automated Alerts and Reporting
- 80%8.0
- Threat Analysis
- 80%8.0
- Threat Intelligence Reporting
- 70%7.0
- Automated Threat Identification
- 80%8.0
- Threat Recognition
- 70%7.0
- Cut down on manual efforts to investigate or remediate vulnerabilities, which can be a big driver of ROI
- Avoidance of potential incidents with upfront risk mitigation
- Patching efficiency gains
A single guard on door with thousand hands.
- Cloud Security
- Network Security
- Infrastructure Security
- Asset Management
- Patch Management
- Compliance
- Reporting
- Patch Management
- Application Security
- Ghost asset scanning
- Asset Management
- Compliance
- Cloud Security
- IT Asset Realization
- 90%9.0
- Authentication
- 90%9.0
- Configuration Monitoring
- 90%9.0
- Web Scanning
- 80%8.0
- Vulnerability Intelligence
- 80%8.0
- Network Analytics
- 80%8.0
- Vulnerability Classification
- 90%9.0
- Automated Alerts and Reporting
- 90%9.0
- Threat Analysis
- 80%8.0
- Threat Intelligence Reporting
- 80%8.0
- Automated Threat Identification
- 80%8.0
- Threat Recognition
- 80%8.0
- It Increases Visibility
- It robust security posture
- Sometimes Bit slow because of bandwidth
A good vulnerability assessment tool for mid-sized companies
- Vulnerability Assessment
- Ranking
- Suggestions for Patches
- UI is a bit clunky
- Sorting could use work
- More direct links to other Qualys modules (e.g. Patch Management)
- Vulnerability Assessment
- Patching
- Overall view of company's state when it comes to vulnerability severity
- IT Asset Realization
- 80%8.0
- Authentication
- 50%5.0
- Configuration Monitoring
- 90%9.0
- Web Scanning
- N/AN/A
- Vulnerability Intelligence
- 100%10.0
- Network Analytics
- 100%10.0
- Vulnerability Classification
- 100%10.0
- Automated Alerts and Reporting
- 100%10.0
- Threat Analysis
- 100%10.0
- Threat Intelligence Reporting
- 100%10.0
- Automated Threat Identification
- 90%9.0
- Threat Recognition
- 100%10.0
- protected company assets from hacks
- visibility for execs who are not tech savvy
- programmable macros for sorting
Qualys VMDR detailed review
- vulnerability detection
- updated CVEs and support from product
- Reporting
- Scheduling tasks
- Asset Management
- Custom Reporting option
- More options on the dashboard customization
- Reporting
- Asset Management
- Visibility into the vulnerable assets at a glance
- IT Asset Realization
- 100%10.0
- Authentication
- 100%10.0
- Configuration Monitoring
- 100%10.0
- Web Scanning
- 90%9.0
- Vulnerability Intelligence
- 100%10.0
- Network Analytics
- 70%7.0
- Vulnerability Classification
- 100%10.0
- Automated Alerts and Reporting
- 100%10.0
- Threat Analysis
- 70%7.0
- Threat Intelligence Reporting
- 80%8.0
- Automated Threat Identification
- 80%8.0
- Threat Recognition
- 80%8.0
- Faster patching
- Easy reports for multiple teams to work in coordination
- Solutions to patch vulnerabilities
Qualys VMDR is a MUST for any large IT Department!
- Qualys VMDR automates the remediation process for risks without code.
- Scans and detects all of our assets whether they are IT or IOT
- Analyzes our environment for misconfigurations and measures risk against industry benchmarks
- Qualys VMDR can definitely improve on its reporting of assets as we have caught devices not captured in the Qualys VMDR scans.
- We would like to see an improvement on the dashboard interface as it is faulty sometimes.
- Qualys VMDR should focus on more competitive pricing as it is very expensive.
- Automated risk remediation
- Report comparisons to industry benchmarks allow us to fortify at an enterprise level.
- Give visibility of what devices and assets have exposure to the internet to help reduce cybersecurity risks.
- IT Asset Realization
- 100%10.0
- Authentication
- 100%10.0
- Configuration Monitoring
- 100%10.0
- Web Scanning
- 100%10.0
- Vulnerability Intelligence
- 100%10.0
- Network Analytics
- 100%10.0
- Vulnerability Classification
- 100%10.0
- Automated Alerts and Reporting
- 100%10.0
- Threat Analysis
- 100%10.0
- Threat Intelligence Reporting
- 100%10.0
- Automated Threat Identification
- 100%10.0
- Threat Recognition
- 100%10.0
- The Qualys VMDR reports allow us to be proactive in mitigating risks which is an immediate positive ROI
- With the asset scans we are able to see which devices we own and which ones are no longer in our environment and we can realize cost easier.
- It helps us prevent cyber security attacks which also provides a great ROI as we lower the chances of outages.