This content is currently locked.
Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.
1-888-670-8889 (US) or 1-844-618-3192 (CAN)
Speak With Your Representative
Request Access To Premium SoftwareReviews
Qualys
Qualys VMDR
Cyber risk is business risk - with risks growing faster than what traditional VM and SIEM tools can manage. Security and IT teams need a new approach to tackle cyber threats with a clear understanding of cybersecurity risk and automate workflows for rapid response.
7.9
Composite Score
Composite
Score
8.1
CX Score
CX
Score
+87
Emotional Footprint
Emotional
Footprint
86%
Likeliness to Recommend
Likeliness
to Recommend
Category Features
- Asset Discovery
- |
- Automated Containment & Observation Measures
- |
- Automated Patching
- |
- Automation and Orchestration
- |
- False Positive Identification
- |
- Integration With Other Security Tools
- |
- Live Vulnerability Assessment Dashboard Reporting
- |
- Mobile Vulnerability Management
- |
- Network Scanning
- |
- New Vulnerability Alerts
- |
- Risk Prioritization & Remediation Actions
- |
- Visibility
- |
- Vulnerability Definition Updates
- |
- Web Scanning
Report
Product Scorecard
A comprehensive report on a specific software product, aggregating feedback from real IT professionals and business leaders.
- Net Promoter Score and Planned Renewal Rates
- Feature and Vendor Capability Breakdown
- Version and Module Satisfaction Levels
- Comparisons by Organization Size, Usage, and Role
Word Cloud
As organizations become more and more dependent on software to automate and streamline operations, users are developing strong emotional connections to their applications and vendors. The SoftwareReviews word cloud aggregates the most commonly experienced pain points and prevailing opinions held by its users. Use this at-a-glance summary to evaluate the vendor-client relationship and product effectiveness.

Product Scorecard
Dive Into Data
Explore every product feature, vendor capability, and so much more in our comprehensive Product Scorecard, giving you unparalleled insight into the software.
See Full ReportProduct Reviews
- -
- 1
- 2
- 3
- 4
Recommends
9 / 10
MARY A.
Information Technology
Best VM i have come across.
Vendor Capability Satisfaction
- 3
- Availability and Quality of Training
- 3
- Ease of Customization
- 3
- Ease of Data Integration
- 3
- Ease of IT Administration
- 3
- Breadth of Features
- 3
- Business Value Created
- 3
- Ease of Implementation
- 3
- Product Strategy and Rate of Improvement
- 3
- Quality of Features
- 3
- Usability and Intuitiveness
- 3
- Vendor Support
Product Feature Satisfaction
- 3
- Integration With Other Security Tools
- 4
- Automated Containment & Observation Measures
- 4
- Asset Discovery
- 4
- Automated Patching
- 4
- Automation and Orchestration
- 4
- False Positive Identification
- 4
- Live Vulnerability Assessment Dashboard Reporting
- 4
- Network Scanning
- 4
- New Vulnerability Alerts
- 4
- Risk Scoring & Remediation Act
- 4
- Visibility
- 4
- Vulnerability Definition Updates
- 4
- Web Scanning
Recommends
10 / 10
Joe L.
Industry Specific Role
Great Product with Free training and an MSSP focus
Vendor Capability Satisfaction
- 3
- Ease of Data Integration
- 3
- Product Strategy and Rate of Improvement
- 2
- Ease of Customization
- 3
- Breadth of Features
- 4
- Business Value Created
- 4
- Availability and Quality of Training
- 4
- Ease of Implementation
- 3
- Quality of Features
- 4
- Usability and Intuitiveness
- 4
- Vendor Support
- 4
- Ease of IT Administration
Product Feature Satisfaction
- 2
- Automated Patching
- 2
- False Positive Identification
- 2
- Live Vulnerability Assessment Dashboard Reporting
- 3
- Automated Containment & Observation Measures
- 3
- Automation and Orchestration
- 3
- Integration With Other Security Tools
- 3
- Asset Discovery
- 3
- Web Scanning
- 3
- Visibility
- 3
- Risk Scoring & Remediation Act
- 4
- New Vulnerability Alerts
- 4
- Vulnerability Definition Updates
- 4
- Network Scanning
Recommends
10 / 10
Shahrukh S.
Information Technology
Qualys - Vulnerability Scanning with ease.
Vendor Capability Satisfaction
- 3
- Availability and Quality of Training
- 2
- Breadth of Features
- 3
- Business Value Created
- 3
- Ease of Customization
- 3
- Ease of Data Integration
- 4
- Ease of Implementation
- 3
- Ease of IT Administration
- 3
- Product Strategy and Rate of Improvement
- 3
- Quality of Features
- 3
- Usability and Intuitiveness
- 2
- Vendor Support
Product Feature Satisfaction
- 2
- Automated Containment & Observation Measures
- 2
- Automation and Orchestration
- 3
- Asset Discovery
- 3
- Automated Patching
- 3
- False Positive Identification
- 3
- Integration With Other Security Tools
- 3
- Live Vulnerability Assessment Dashboard Reporting
- 3
- Network Scanning
- 3
- New Vulnerability Alerts
- 3
- Risk Scoring & Remediation Act
- 3
- Visibility
- 3
- Vulnerability Definition Updates
- 3
- Web Scanning