Average Ratings

2 Reviews
  • 1.5 / 5
  • 3 / 5
    Ease of Use
  • 1 / 5
    Customer Service

Product Details

Vendor has not completed this information.

About Qualys VM

Online vulnerability management system that allows you to scan current network, analyze its possible risks, and prepare reports.


Qualys VM Features

  • Asset Discovery
  • Asset Tagging
  • Network Scanning
  • Patch Management
  • Policy Management
  • Prioritization
  • Risk Management
  • Vulnerability Assessment
  • Web Scanning

Qualys VM Reviews Recently Reviewed!

Lots of promises, great marketing. Real quality rather low. Decided to find something better.

Jul 21, 2018
3 / 5
Ease of Use
4 / 5
Features & Functionality
1 / 5
Customer Support
2 / 5
Value for Money
Likelihood to Recommend: 1.0/10 Not

Pros: Lots of features, agent available, flexible pricing. Software as a service, so you don't need any infrastructure.

Cons: Useless unprofessional support, unable to solve any of my issues. They were closing unresolved issues. Lot of false positives. Support couldn't solve them, I got promises that it will be fixed in next release. Awful and unreliable reporting (errors on dashboards etc.). Very expensive. They're not using real cloud but couple of concentrators in different regions. Not useful for global customers. They promise they don't have access to customer data, but they request that to solve problems.

Overall: That was my first contact with vulnerability management. Perhaps it's a good software for start or for small companies. I was able to recognize my needs and it helped a lot to find a professional solution.

Incompetent badly supported rubbish.

Aug 24, 2018
3 / 5
Ease of Use
2 / 5
Features & Functionality

Pros: Nothing - I hate it.

Cons: Their ridiculous false positives - apparently it's a critical incompliance that certain options aren't set in the gdm config file /etc/gdm.conf.

Fair enough - if gdm was installed. A simple check that the file exists first would eliminate this and (of our 80+ compliance errors) most others. Complaining about mount options on non-existent filesystems, or that /etc/gshadow didn't match a regex - or did, I'm not sure from the report. The file has mode 0000 (so no permissions set at all).

The fix was to chown root:root /etc/gshadow*

Trust these amateurs at your own risk. If they are as incompetent as this, what are they missing?