Try our new research platform with insights from 80,000+ expert users

Axonius vs Qualys CyberSecurity Asset Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 16, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Axonius
Ranking in Cyber Asset Attack Surface Management (CAASM)
1st
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
6
Ranking in other categories
IT Vendor Risk Management (7th)
Qualys CyberSecurity Asset ...
Ranking in Cyber Asset Attack Surface Management (CAASM)
2nd
Average Rating
9.2
Reviews Sentiment
7.6
Number of Reviews
21
Ranking in other categories
Vulnerability Management (11th), Patch Management (8th), Attack Surface Management (ASM) (4th), Software Supply Chain Security (7th)
 

Mindshare comparison

As of March 2025, in the Cyber Asset Attack Surface Management (CAASM) category, the mindshare of Axonius is 36.0%, down from 42.1% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 6.4%, up from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

Kirubakaran Jayakumar - PeerSpot reviewer
Agentless and can easily integrate with other platforms and provides robust API monitoring capabilities
Axonius can improve on delivering compliance-related features, like PCI DSS, and different dashboards that work with various compliances. For example, if a company follows ISO, they can create a dashboard that shows the gaps within that compliance framework. They have started delivering some of these features, but the tool still needs to mature for companies that heavily rely on certain standards, like payment compliances or cloud security guidelines. In those cases, the tool might need further development. However, I haven’t had specific issues because they are really good at fixing things. Whenever we report or escalate something, they are quick in providing solutions. I think they are very flexible in terms of working with them. But at the same time, they are customizing the solution too much based on client requirements. This might cause issues in the future because if they keep customizing the solution for every single client’s requirement, they might face difficulties in future releases. Integrating every customer’s options within the platform might be challenging to handle. That might be a risk they are taking. But we have had good communication with them, and overall, it’s been positive.
Revathi VeeraRaghavan - PeerSpot reviewer
Provides comprehensive visibility and covers the complete attack surface
For some of the software, there was no life cycle or general information. We wanted them to give details in the database as and when the software comes. I raised a ticket for that, and after that, they updated the details for more than one million software. They should address the false positives generated in EASM. It is fetching assets that have Infosys as the keyword. They should fix that. When we click on the web application, it only shows potential web assets. The application details are not there. Overall, CSAM has matured a lot. These are the few enhancements that need to be done.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Axonius provides preconfigured dashboards that can be customized to your needs."
"The solution's technical support was good...The product's initial setup phase is pretty straightforward."
"he best feature I found in Axonius is that it shows us the duration of eCheck, and it shows us what device is down and in which part of the system life cycle or the checking part the system is down in."
"The automation capabilities in Axonius have streamlined our security operations."
"I like that the tool has a user-friendly interface. It helps organizations and big companies improve business requirements and control processes."
"The most valuable features of Qualys CSAM include the ability to manage authorized and unauthorized applications efficiently. This feature helps in validating applications and maintaining a secure environment."
"We have a diverse organization with a robust infrastructure of more than 300,000 assets. By creating unauthorized lists and rules in the Qualys CSAM module, I can block certain software from being used in the organization."
"The integration with different third-party tools, such as cloud providers like Azure and AWS, and asset management tools like CMDB systems, is valuable."
"Qualys CyberSecurity Asset Management has helped to improve the organization's security posture significantly."
"Overall, I would give Qualys CyberSecurity Asset Management a nine out of ten."
"It provides most of the information needed regarding the assets, including the operating system and whether the assets are network devices or servers."
"I would rate Qualys CSAM a ten out of ten."
"The most valuable aspect we receive from Qualys is the remediation."
 

Cons

"For us, the product's deployment phase was a little challenging because we had to deal with other departments and business units."
"Axonius can improve on delivering compliance-related features."
"We can have fetch cycle issues."
"Adding more detailed descriptions or YouTube videos about specific features would help improve the application."
"Regarding the improvement of Axonius, it goes halfway for both the tool and the user. If we set it up quickly from our end, and if the AD groups and all other groups assigned to tag the assets have been tagged correctly, Axonius could not show an error."
"For Axonius, I would suggest supporting more ticketing platforms and enhancing API integration directly into the platform rather than just the connector. This would allow for better integration from different systems, possibly into workflows, which I think is currently lacking."
"Qualys could improve by enhancing its dynamic tagging and role-based access control features, and by refining its user interface for a more intuitive and efficient user experience."
"The scanning function could be improved."
"It is automatically exporting the vulnerabilities and the assets. However, it would be useful to have the ability to select or to filter which we would like to export."
"The main aspect that needs improvement is the user interface, which should be more intuitive."
"Some areas that would be helpful are more comprehensive tagging and the ability to set up better dynamic rules."
"The UI needs improvement as it can become overwhelming after prolonged use."
"In my opinion, the area that needs improvement is the role-based access control (RBAC). The access privilege management needs to be more robust and streamlined to enhance user access management. Additionally, improvements to the user interface could be beneficial."
"The UI needs improvement as it can become overwhelming after prolonged use."
 

Pricing and Cost Advice

"Axonius is quite a bit cheaper compared to other solutions."
"We are on a subscription model with them."
"Qualys offers excellent value for money."
"The pricing is market-competitive."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"The pricing for Qualys Cybersecurity Asset Management is reasonable, with an annual subscription costing around $1,000 per year or a monthly subscription starting at approximately $72 per month, depending on the specific package and features included."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"The cost for Qualys CyberSecurity Asset Management is high."
"The pricing is fair. I would love to see the price come down a little bit, but we do get a lot of value out of it. We are squeezing every ounce of value we can out of the tool."
"The pricing for Qualys CSAM is nominal."
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
842,388 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Government
10%
Manufacturing Company
8%
Computer Software Company
24%
Financial Services Firm
12%
Government
8%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Axonius?
Axonius is quite a bit cheaper compared to other solutions. And the amount of value they provide is really huge compared to other vendors. So, it’s based on the actual requirement and how you want ...
What needs improvement with Axonius?
Axonius can improve on delivering compliance-related features, like PCI DSS, and different dashboards that work with various compliances. For example, if a company follows ISO, they can create a da...
What is your primary use case for Axonius?
We use it for reporting, noncompliance reporting, and identifying gaps. We use it for API monitoring within our company. And we also use it as a CMDB. Our security team, people within the SOC team,...
What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management?
The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage.
What needs improvement with Qualys CyberSecurity Asset Management?
Qualys is continually developing, adding new features each year. Previously, there was no on-demand scan feature in a cloud agent, but multiple features have since been added to my cloud agent modu...
What is your primary use case for Qualys CyberSecurity Asset Management?
I have been working with Qualys for approximately two and a half years. I have used this module to manage security postures in cloud environments, and it is essentially used for hybrid management s...
 

Overview

 

Sample Customers

Extreme Engineering Solutions, AppsFlyer, Landmark Health, Natera
Information Not Available
Find out what your peers are saying about Axonius vs. Qualys CyberSecurity Asset Management and other solutions. Updated: March 2025.
842,388 professionals have used our research since 2012.