Try our new research platform with insights from 80,000+ expert users

HackerOne vs Qualys CyberSecurity Asset Management comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 16, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Ranking in Vulnerability Management
27th
Average Rating
9.6
Reviews Sentiment
8.1
Number of Reviews
2
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (6th)
HackerOne
Ranking in Vulnerability Management
38th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
5
Ranking in other categories
Application Security Tools (30th), Bug Bounty Platforms (1st), Penetration Testing Services (1st), Attack Surface Management (ASM) (9th)
Qualys CyberSecurity Asset ...
Ranking in Vulnerability Management
10th
Average Rating
9.2
Reviews Sentiment
7.6
Number of Reviews
21
Ranking in other categories
Patch Management (7th), Cyber Asset Attack Surface Management (CAASM) (2nd), Attack Surface Management (ASM) (4th), Software Supply Chain Security (5th)
 

Featured Reviews

Israel Cavazos Landini - PeerSpot reviewer
Weekly insights and risk analysis facilitate informed security decisions
I appreciate the weekly insights Zafran provides, which include critical topics for networks and IT security, allowing us to evaluate which insights apply to our environment. The organization score feature is valuable to keep the leadership team updated on how our infrastructure fares security-wise. The applicable risk level versus base risk level feature is beneficial because prior to Zafran, we only used the base risk level, but now understand that risk depends on the asset itself. Zafran is an excellent tool.
Faizan Nehal - PeerSpot reviewer
Platform supports skill development with effective vulnerability reporting
Everything has become slower on HackerOne. I have noticed that older researchers receive all the private invites while newer ones receive fewer. The same goes for real-life events, where the same people are invited repeatedly. There are no clear guidelines for being invited to programs and conferences, and the process for receiving invitations appears arbitrary.
Revathi VeeraRaghavan - PeerSpot reviewer
Provides comprehensive visibility and covers the complete attack surface
For some of the software, there was no life cycle or general information. We wanted them to give details in the database as and when the software comes. I raised a ticket for that, and after that, they updated the details for more than one million software. They should address the false positives generated in EASM. It is fetching assets that have Infosys as the keyword. They should fix that. When we click on the web application, it only shows potential web assets. The application details are not there. Overall, CSAM has matured a lot. These are the few enhancements that need to be done.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Zafran has become an indispensable tool in our cybersecurity arsenal."
"Zafran is an excellent tool."
"HackerOne is larger than WebCloud and has a better reputation than BugCloud, which results in a smoother process."
"HackerOne is larger than WebCloud and has a better reputation than BugCloud, which results in a smoother process."
"The most valuable feature of HackerOne is its variety of programs. These programs provide depth into various areas, such as mobile, API, and websites."
"Apart from getting all the bug bounty opportunities, we also get the chance to practice in a safe environment, like a demo setup. These features are great for beginners who want to explore bug bounties in the future."
"It helps me to get new sales, profits, and other benefits."
"I recommend Qualys CyberSecurity Asset Management due to its superior asset information collection capabilities, including comprehensive hardware and software inventorying."
"The integration with different third-party tools, such as cloud providers like Azure and AWS, and asset management tools like CMDB systems, is valuable."
"We have a diverse organization with a robust infrastructure of more than 300,000 assets. By creating unauthorized lists and rules in the Qualys CSAM module, I can block certain software from being used in the organization."
"The end-of-life and end-of-service software and hardware are some of my favorite features."
"Qualys CSAM helps find all the assets. It categorizes information based on various criteria such as host and tenant version. It provides in-depth visibility into both hardware and software."
"I would rate Qualys CSAM a ten out of ten."
"Our favorite features are the tagging and the ability to quickly find assets in the portal."
"Qualys CyberSecurity Asset Management offers comprehensive features to cover our entire attack surface."
 

Cons

"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"The ability to view the conversation between the triagers and the programs will be really good."
"One issue I've experienced is traffic. Many people try to participate when an opportunity with a bounty of around 1,000-15,000 dollars comes up. In this case, the first person to report the vulnerability gets the bounty. If a second person reports the same vulnerability, they are marked as duplicated instead of receiving some recognition. The second person also invested time finding the issue, so I think this can be improved."
"Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports."
"Everything has become slower on HackerOne. I have noticed that older researchers receive all the private invites while newer ones receive fewer."
"Everything has become slower on HackerOne."
"In our reporting, we faced a challenge syncing with cloud devices."
"The only minor issue is occasionally being redirected to multiple teams, causing slight delays."
"The Qualys CAPS service requires further exploration and improvement, particularly in its handling of protocols and reactivity with MAC and IP addresses for CAP agents."
"In my opinion, the area that needs improvement is the role-based access control (RBAC). The access privilege management needs to be more robust and streamlined to enhance user access management. Additionally, improvements to the user interface could be beneficial."
"The UI needs improvement as it can become overwhelming after prolonged use."
"They should address the false positives generated in EASM. It is fetching assets that have Infosys as the keyword."
"They should address the false positives generated in EASM. It is fetching assets that have Infosys as the keyword. They should fix that."
"The main aspect that needs improvement is the user interface, which should be more intuitive."
 

Pricing and Cost Advice

Information not available
"The tool is open-source and free for bug bounty hunters."
"The solution is free."
"The pricing is market-competitive."
"The pricing is fair. I would love to see the price come down a little bit, but we do get a lot of value out of it. We are squeezing every ounce of value we can out of the tool."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"The pricing for Qualys CSAM is nominal."
"Qualys is competitively priced for its features. Its pricing is suitable for large organizations with more than 4,000 assets, but for smaller organizations with few assets, such as banks, the costs might be high. They should come up with packages that are suitable for small organizations."
"The pricing for Qualys Cybersecurity Asset Management is reasonable, with an annual subscription costing around $1,000 per year or a monthly subscription starting at approximately $72 per month, depending on the specific package and features included."
"The cost for Qualys CyberSecurity Asset Management is high."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
6%
Retailer
6%
Computer Software Company
15%
Financial Services Firm
13%
Manufacturing Company
11%
Comms Service Provider
11%
Computer Software Company
22%
Financial Services Firm
14%
Government
9%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
Pricing for Zafran Security is not expensive. We have a contract for five years, and the cost is lower than other too...
What needs improvement with Zafran Security?
I would like to see an integration with Check Point firewalls. It's essential for us and they are currently working o...
What is your primary use case for Zafran Security?
We use Zafran Security for threat prioritization. We establish priority to understand which risks should be patched o...
What is your experience regarding pricing and costs for HackerOne?
The cost is rated as one since there is no need to pay anything, not even a fee or commission.
What needs improvement with HackerOne?
Everything has become slower on HackerOne. I have noticed that older researchers receive all the private invites whil...
What is your primary use case for HackerOne?
My use case is similar to DuckTron. The processes I use for DuckTron are exactly the same for HackerOne. Therefore, t...
What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management?
The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, c...
What needs improvement with Qualys CyberSecurity Asset Management?
Qualys is continually developing, adding new features each year. Previously, there was no on-demand scan feature in a...
What is your primary use case for Qualys CyberSecurity Asset Management?
I have been working with Qualys for approximately two and a half years. I have used this module to manage security po...
 

Also Known As

No data available
HackerOne Assets, HackerOne Pentesting Services, HackerOne Security Assessments, HackerOne Vulnerability Management
No data available
 

Overview

 

Sample Customers

Information Not Available
Zenefits, Adobe, Yelp
Information Not Available
Find out what your peers are saying about HackerOne vs. Qualys CyberSecurity Asset Management and other solutions. Updated: February 2025.
845,406 professionals have used our research since 2012.