This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US) or 1-844-618-3192 (CAN)

1/8 in Vulnerability Management

Response
Distribution
35Reviews

Qualys

Qualys VMDR

Cyber risk is business risk - with risks growing faster than what traditional VM and SIEM tools can manage. Security and IT teams need a new approach to tackle cyber threats with a clear understanding of cybersecurity risk and automate workflows for rapid response.

7.9

Composite Score

Composite
Score

8.1

CX Score

CX
Score

+87

Emotional Footprint

Emotional
Footprint

86%

Likeliness to Recommend

Likeliness
to Recommend

1/8 in Vulnerability Management

Response
Distribution
35Reviews
Category Features
  • Asset Discovery
  • |
  • Automated Containment & Observation Measures
  • |
  • Automated Patching
  • |
  • Automation and Orchestration
  • |
  • False Positive Identification
  • |
  • Integration With Other Security Tools
  • |
  • Live Vulnerability Assessment Dashboard Reporting
  • |
  • Mobile Vulnerability Management
  • |
  • Network Scanning
  • |
  • New Vulnerability Alerts
  • |
  • Risk Prioritization & Remediation Actions
  • |
  • Visibility
  • |
  • Vulnerability Definition Updates
  • |
  • Web Scanning

Report

Product Scorecard

A comprehensive report on a specific software product, aggregating feedback from real IT professionals and business leaders.

  • Net Promoter Score and Planned Renewal Rates
  • Feature and Vendor Capability Breakdown
  • Version and Module Satisfaction Levels
  • Comparisons by Organization Size, Usage, and Role

Word Cloud

As organizations become more and more dependent on software to automate and streamline operations, users are developing strong emotional connections to their applications and vendors. The SoftwareReviews word cloud aggregates the most commonly experienced pain points and prevailing opinions held by its users. Use this at-a-glance summary to evaluate the vendor-client relationship and product effectiveness.

Word Cloud legend

Product Scorecard

Dive Into Data

Explore every product feature, vendor capability, and so much more in our comprehensive Product Scorecard, giving you unparalleled insight into the software.

See Full Report

Product Reviews

  • -
  • 1
  • 2
  • 3
  • 4
Recommends
9 / 10

Information Technology

Best VM i have come across.

Vendor Capability Satisfaction

  • 3
  • Availability and Quality of Training
  • 3
  • Ease of Customization
  • 3
  • Ease of Data Integration
  • 3
  • Ease of IT Administration
  • 3
  • Breadth of Features
  • 3
  • Business Value Created
  • 3
  • Ease of Implementation
  • 3
  • Product Strategy and Rate of Improvement
  • 3
  • Quality of Features
  • 3
  • Usability and Intuitiveness
  • 3
  • Vendor Support

Product Feature Satisfaction

  • 3
  • Integration With Other Security Tools
  • 4
  • Automated Containment & Observation Measures
  • 4
  • Asset Discovery
  • 4
  • Automated Patching
  • 4
  • Automation and Orchestration
  • 4
  • False Positive Identification
  • 4
  • Live Vulnerability Assessment Dashboard Reporting
  • 4
  • Network Scanning
  • 4
  • New Vulnerability Alerts
  • 4
  • Risk Scoring & Remediation Act
  • 4
  • Visibility
  • 4
  • Vulnerability Definition Updates
  • 4
  • Web Scanning
Recommends
10 / 10

Industry Specific Role

Great Product with Free training and an MSSP focus

Vendor Capability Satisfaction

  • 3
  • Ease of Data Integration
  • 3
  • Product Strategy and Rate of Improvement
  • 2
  • Ease of Customization
  • 3
  • Breadth of Features
  • 4
  • Business Value Created
  • 4
  • Availability and Quality of Training
  • 4
  • Ease of Implementation
  • 3
  • Quality of Features
  • 4
  • Usability and Intuitiveness
  • 4
  • Vendor Support
  • 4
  • Ease of IT Administration

Product Feature Satisfaction

  • 2
  • Automated Patching
  • 2
  • False Positive Identification
  • 2
  • Live Vulnerability Assessment Dashboard Reporting
  • 3
  • Automated Containment & Observation Measures
  • 3
  • Automation and Orchestration
  • 3
  • Integration With Other Security Tools
  • 3
  • Asset Discovery
  • 3
  • Web Scanning
  • 3
  • Visibility
  • 3
  • Risk Scoring & Remediation Act
  • 4
  • New Vulnerability Alerts
  • 4
  • Vulnerability Definition Updates
  • 4
  • Network Scanning
Recommends
10 / 10

Information Technology

Qualys - Vulnerability Scanning with ease.

Vendor Capability Satisfaction

  • 3
  • Availability and Quality of Training
  • 2
  • Breadth of Features
  • 3
  • Business Value Created
  • 3
  • Ease of Customization
  • 3
  • Ease of Data Integration
  • 4
  • Ease of Implementation
  • 3
  • Ease of IT Administration
  • 3
  • Product Strategy and Rate of Improvement
  • 3
  • Quality of Features
  • 3
  • Usability and Intuitiveness
  • 2
  • Vendor Support

Product Feature Satisfaction

  • 2
  • Automated Containment & Observation Measures
  • 2
  • Automation and Orchestration
  • 3
  • Asset Discovery
  • 3
  • Automated Patching
  • 3
  • False Positive Identification
  • 3
  • Integration With Other Security Tools
  • 3
  • Live Vulnerability Assessment Dashboard Reporting
  • 3
  • Network Scanning
  • 3
  • New Vulnerability Alerts
  • 3
  • Risk Scoring & Remediation Act
  • 3
  • Visibility
  • 3
  • Vulnerability Definition Updates
  • 3
  • Web Scanning
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019