Tanium and Qualys CyberSecurity Asset Management compete in the cybersecurity asset management category. While both have unique strengths, Qualys CSAM often gains an advantage due to its robust features, justifying its higher cost.
Features: Tanium offers scalable endpoint management, comprehensive data collection capabilities, and real-time insights combined with fast remediation. Qualys CSAM provides cloud-based vulnerability management, automated asset discovery, continuous monitoring, and in-depth analytics. The main difference lies in Tanium's endpoint resilience focus versus Qualys CSAM's emphasis on vulnerability scanning and prevention.
Room for Improvement: Tanium could enhance its cloud capabilities, streamline integration processes, and expand customization options. Qualys CSAM might benefit from better on-premises deployment options, improved offline support resources, and reduced complexity in its user interface.
Ease of Deployment and Customer Service: Tanium is recognized for its straightforward on-premises deployment and extensive integration options, paired with responsive customer support. Qualys CSAM's cloud-native model ensures quicker setup and updates, yet relies more on online support resources, making it a more agile choice with distinct service nuances.
Pricing and ROI: Tanium is often seen as cost-effective, offering flexible pricing plans that enable rapid incident resolution and substantial returns. Qualys CSAM requires a higher initial investment, but delivers significant ROI through proactive risk management and continuous security enhancements. The different pricing structures highlight Tanium's efficiency in cost versus Qualys CSAM’s expansive security scope.
The support team was knowledgeable and offered a variety of quick resolution options.
Their SMEs have sufficient knowledge, and if they are not the right contact, they quickly redirect us to someone who can help resolve issues.
I would rate their customer support a ten out of ten.
Qualys is currently not able to identify assets lacking DNS information.
We would prefer more options, such as 'approved only for pilot' or 'approved for this line of business,' allowing for better granularity in categorizing software.
The reporting feature could offer more customizable templates and easier-to-digest visualizations.
We have about 300,000 assets installed with agents worldwide.
Qualys Cybersecurity Asset Management has proven to be a highly scalable solution for us over the past couple of years.
A monthly subscription starting at approximately $72 per month, depending on the specific package and features included.
Though the solution is considered expensive, if bundled with other services such as VMDR or cloud agents, its value would significantly increase.
The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage.
They are constantly adding capabilities.
This platform demonstrates excellent stability with consistent 100 percent uptime and no glitches observed.
Everything is smoothly managed by a different team, and our scheduled scans run without interruptions.
By correlating this with QDS scores, we can accurately assess the risk level of high or low QDS scores associated with each asset and monitor them accordingly.
The most valuable feature is the real-time visibility Qualys CyberSecurity Asset Management provides into all assets across our development and operational environments.
It also performs scans to identify any vulnerabilities, which helps to take proactive measures before those vulnerabilities are identified by any attacker.
Qualys CyberSecurity Asset Management (CSAM) provides industry-leading coverage of the internal and external attack surface (EASM), along with comprehensive cyber risk assessment, natively-integrated with Qualys Vulnerability Management, Detection, and Response (VMDR).
CSAM solidifies attack surface coverage and turbocharges vulnerability management with:
Tanium Endpoint Platform reduces security risk, improves agility & increases efficiency, a fundamentally new approach to endpoint security's threat detection, indicent response, vulnerability assessment and configuration compliance & with management's software distribution, asset utilization, asset inventory and patch management.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.