Average Ratings

3 Reviews

  • 2.5 / 5
    Overall

  • 3.5 / 5
    Ease of Use

  • 3 / 5
    Customer Service

Product Details

Vendor has not completed this information.


About Qualys VM

Online vulnerability management system that allows you to scan current network, analyze its possible risks, and prepare reports.


Spotlight media placeholder

Qualys VM Features

  • Asset Discovery
  • Asset Tagging
  • Network Scanning
  • Patch Management
  • Policy Management
  • Prioritization
  • Risk Management
  • Vulnerability Assessment
  • Web Scanning

Qualys VM Reviews Recently Reviewed!


Lots of promises, great marketing. Real quality rather low. Decided to find something better.

Jul 21, 2018
2/5
Overall

3 / 5
Ease of Use

4 / 5
Features & Functionality

1 / 5
Customer Support

2 / 5
Value for Money
Likelihood to Recommend: 1.0/10 Not
Likely
Extremely
Likely

Pros: Lots of features, agent available, flexible pricing. Software as a service, so you don't need any infrastructure.

Cons: Useless unprofessional support, unable to solve any of my issues. They were closing unresolved issues. Lot of false positives. Support couldn't solve them, I got promises that it will be fixed in next release. Awful and unreliable reporting (errors on dashboards etc.). Very expensive. They're not using real cloud but couple of concentrators in different regions. Not useful for global customers. They promise they don't have access to customer data, but they request that to solve problems.

Overall: That was my first contact with vulnerability management. Perhaps it's a good software for start or for small companies. I was able to recognize my needs and it helped a lot to find a professional solution.

Vulnerability Management

Nov 21, 2018
5/5
Overall

5 / 5
Ease of Use

5 / 5
Features & Functionality

5 / 5
Customer Support

5 / 5
Value for Money
Likelihood to Recommend: 10.0/10 Not
Likely
Extremely
Likely

Pros: Works well and is a trusted source. Their scanning engine gives you some level organization independence (not entirely).

Cons: It is expensive, and you have to open up your organization to their IP's or put an in-house relay server.

Incompetent badly supported rubbish.

Aug 24, 2018
1/5
Overall

3 / 5
Ease of Use

2 / 5
Features & Functionality

Pros: Nothing - I hate it.

Cons: Their ridiculous false positives - apparently it's a critical incompliance that certain options aren't set in the gdm config file /etc/gdm.conf.

Fair enough - if gdm was installed. A simple check that the file exists first would eliminate this and (of our 80+ compliance errors) most others. Complaining about mount options on non-existent filesystems, or that /etc/gshadow didn't match a regex - or did, I'm not sure from the report. The file has mode 0000 (so no permissions set at all).

The fix was to chown root:root /etc/gshadow*

Trust these amateurs at your own risk. If they are as incompetent as this, what are they missing?