Try our new research platform with insights from 80,000+ expert users

Qualys CyberSecurity Asset Management (CSAM) vs Tanium comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Qualys CyberSecurity Asset ...
Ranking in Vulnerability Management
25th
Average Rating
9.6
Number of Reviews
4
Ranking in other categories
Patch Management (17th), Cyber Asset Attack Surface Management (CAASM) (4th), Attack Surface Management (ASM) (11th), Software Supply Chain Security (11th)
Tanium
Ranking in Vulnerability Management
21st
Average Rating
7.4
Number of Reviews
15
Ranking in other categories
Server Monitoring (11th), Endpoint Protection Platform (EPP) (36th), Endpoint Detection and Response (EDR) (25th)
 

Featured Reviews

CG
Sep 17, 2024
Provides immediate alerts if any compromise occurs in our environment, highlighting specific loopholes
I would rate Qualys ability to cover the entire attack surface a nine out of ten. Previously, we used Tenable as our preferred tool but switched to Qualys for the cost-effectiveness. However, upon switching to Qualys, our primary concern was ensuring the seamless deployment of agents across our infrastructure. Fortunately, Qualys agents proved to be remarkably lightweight. Additionally, Qualys excels in network security, allowing us to identify vulnerabilities, track SSL and TSL certificates, and monitor their expiration dates. Qualys also offers robust password management capabilities, surpassing Tenable in this regard. Moreover, Qualys' reporting functionality is unparalleled, outperforming competitors like Tenable and other tools in the market. Qualys identifies all risk factors for our assets. For example, assigning a globally traceable computer name or using easily compromised passwords can create vulnerabilities. Qualys provides immediate alerts if any compromise occurs in our environment, highlighting specific loopholes. Consider a scenario where a programmer in a testing environment uses a simple password instead of a complex one. Hackers can easily exploit this, and Qualys will immediately identify the issue, generate a report pinpointing the responsible individual, and notify us. This real-time identification and reporting capability surpasses traditional PAM solutions, allowing for swift remediation of potentially exploitable changes. We use the risk scoring to prioritize the issues by criticality. We use Qualys to convert deployed cloud agents into passive sensors for VM ESX. Whenever new servers or network devices are added, Qualys immediately detects them and flags them as unregistered assets on the network. Based on this information, other teams often reach out to us to onboard or install an agent for enhanced visibility and management within Qualys.
Jun 8, 2023
The solution is limited to a few classes, but it helps discover CIs and assets
Tanium is primarily used for CMDV (Configuration management database) discovery. Tanium is meant to discover CIs and assets It's a good tool, but that's about it. It's like any other discovery tool. It's very detailed, and it will allow you to do hardware and software. I was using it in a very…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable aspect we receive from Qualys is the remediation."
"The end-of-life and end-of-service software and hardware are some of my favorite features."
"When you implement a dynamic tag using a query, you do not need to manually tag all the servers. It categorizes all the servers that come under that query. The tagging part is automatically done within a few minutes. It reduces the effort."
"Tags are very useful for us since we can tag virus applications in infrastructure types such as databases, operating systems, or web platforms."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"The interrogation piece was the most valuable feature because it was very detailed."
"I would say Tanium is the best tool for vulnerability management."
"Threat hunting is a very good feature on Tanium. We have just started using it and have not used it extensively."
"Tanium's most valuable features are patch management, inventory, and distribution software."
"The security features are very valuable."
"Tanium’s linear-chain architecture is valuable."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
 

Cons

"It is automatically exporting the vulnerabilities and the assets. However, it would be useful to have the ability to select or to filter which we would like to export."
"Currently, whenever the agent is running, it consumes over ten percent of my CPU, indicating that CPU consumption is another area Qualys needs to address."
"Qualys CyberSecurity Asset Management could be more cost-effective by offering a lower price point or integrating with existing VMDR features."
"One improvement that they can make in the EASM module is the scan frequency. After EASM is configured the first time, it allows you to do the complete configuration, but if you want to reconfigure it, it will not ask or provide any option for scan frequency. For that, you need to raise a case with Qualys and talk to the Qualys team."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"The most painful thing is the interface. It's a bit unclear sometimes."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
"The solution lacks mobility."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
"We had some issues with the solution's OS upgrade."
"The reporting could be improved."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
 

Pricing and Cost Advice

"The cost for Qualys CyberSecurity Asset Management is high."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"It is cost-effective because, in a single tool, we are getting everything. All the solutions come in a single license or price."
"The solution offers value for money."
"It's an expensive solution. It would be nice if the cost were lower."
"The solution is expensive but it's a good investment."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"It is higher than some competitors in the market."
"There is an annual license required to use this solution."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
805,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
32%
Government
12%
Manufacturing Company
8%
Comms Service Provider
7%
Financial Services Firm
16%
Government
13%
Computer Software Company
11%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management (CSAM)?
The pricing is fair. We don't have any objection to the current pricing model.
What needs improvement with Qualys CyberSecurity Asset Management (CSAM)?
It is automatically exporting the vulnerabilities and the assets. However, it would be useful to have the ability to select or filter which we would like to export. As of now, anything and everythi...
What is your primary use case for Qualys CyberSecurity Asset Management (CSAM)?
This is the main product that we are using for managing assets, including hardware assets and software assets.
What do you like most about Tanium?
Tanium’s linear-chain architecture is valuable.
What is your primary use case for Tanium?
We collect end-point data. We use it to make AI models and provide it to customers. I use Tanium’s sensors, collect data, and develop dashboards. The sensors have many data types. If we need differ...
 

Learn More

 

Overview

 

Sample Customers

JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about Qualys CyberSecurity Asset Management (CSAM) vs. Tanium and other solutions. Updated: August 2024.
805,335 professionals have used our research since 2012.