Qualys TotalCloud and Tenable Cloud Security are cloud security solutions competing in cybersecurity. Tenable Cloud Security seems to have the upper hand for its comprehensive feature set, despite higher pricing, whereas Qualys TotalCloud is favored for support and affordability.
Features: Qualys TotalCloud is noted for its comprehensive vulnerability scanning, robust integration capabilities, and affordability. Tenable Cloud Security is recognized for its deep insight into cloud environments, advanced analytics, and a broader feature spectrum that provides comprehensive security posture management.
Room for Improvement: Qualys TotalCloud users indicate a need for enhancement in custom reporting, scalability, and feature-richness. Tenable Cloud Security users mention areas for improvement in resource allocation, cross-platform support, and optimizing technical expertise requirements.
Ease of Deployment and Customer Service: Qualys TotalCloud is praised for straightforward deployment and reliable support, catering well to teams with limited resources. Tenable Cloud Security is suitable for complex environments requiring flexibility but demands more technical expertise. Customer service ratings favor Qualys TotalCloud for prompt issue resolution.
Pricing and ROI: Qualys TotalCloud offers cost-effectiveness with substantial ROI due to low setup costs, appealing to budget-conscious buyers. Tenable Cloud Security is priced higher but provides significant ROI through enhanced security features, appealing to those prioritizing long-term value.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
It has saved about 90% of our time.
We are constantly exploring new features and collaborating with Qualys to ensure we derive value.
We are seeing a 40 percent savings in resources and time.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
They are helpful, respond to my queries, and can answer any question.
Qualys's tech support is highly responsive, providing multiple ways to interact with them.
Qualys' customer service provides quality answers, but the response time is long, even though it is within the SLA.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
Qualys TotalCloud receives a perfect ten out of ten for scalability due to its effortless setup of new instances.
We started our organization about nine months back. We started with about 30 users, and we now have more than 100 users.
Our organization currently uses it to manage over 1200 web applications.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
Overall, the support provided has been excellent.
It is a stable solution, which is why we chose it.
Continuous monitoring is crucial to ensure system stability and avoid vulnerabilities or threats.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
Ideally, the scanner should automatically detect and scan all subdomains, even if not explicitly defined, ensuring comprehensive vulnerability assessment.
Ideally, updates should be more immediate, enabling quicker implementation of solutions.
An area for improvement would be to focus on risks related to AI, such as large language models and potential data leakage.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
I would rate the price of Qualys TotalCloud eight out of ten with ten being the most expensive.
Qualys TotalCloud's pricing is currently acceptable, it is becoming increasingly expensive.
Pricing is managed by our finance team; however, Qualys TotalCloud offers cost-effective licensing flexibility.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
This view of risk helps reduce the work we would have to do to combine multiple sources to prioritize risk.
It will help cybersecurity professionals monitor the cloud and find vulnerabilities.
We are enjoying the new feature, FlexScan, which is valuable for Internet-facing VMs.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
TotalCloud is the Qualys approach to Cloud Native Application Protection Platform (CNAPP) for cloud infrastructure and SaaS environments. With TotalCloud, customers extend TruRisk insights (transparent cyber risk scoring methodology) from the Qualys Enterprise TruRisk Platform to their cloud environments allowing for a seamless unified view of cyber risk across on-prem, hybrid, and multi-cloud environments.
Features and capabilities of Qualys TotalCloud include, but are not limited to:
Discover: Complete visibility and insights into cyber-risk exposure across multi-cloud. Continuously discover and monitor all your workloads across a multi-cloud environment for a 360-degree view of your cloud footprint. Identify known and previously unknown internet-facing assets for 100% visibility and tracking of risks.
Assess: Comprehensive cloud-native assessments with FlexScanTM. Extensive scanning capabilities with Qualys FlexScan, including no-touch, agentless, API- and snapshot-based scanning, along with agent- and network-based scanning for in-depth assessment. Use these multiple scanning methods to scan a workload to get a unified and comprehensive view of vulnerabilities and misconfigurations.
Prioritize: Unified security view to prioritize cloud risk with TruRiskTM. Experience a unified risk-based view of cloud security with insights across workloads, services, and resources. Qualys TruRisk quantifies security risk by workload criticality and vulnerabilities; it correlates with ransomware, malware, and exploitation threat intelligence to prioritize, trace, and reduce risk.
Defend: Real-time protection against evolving and unknown threats with InstaProtectTM. Qualys enables continuous monitoring of all cloud assets to ensure they are protected against threats and attacks at runtime. Qualys keeps your cloud runtime safe by detecting known and unknown threats across the entire kill chain in near real-time across a multi-cloud environment.
Remediate: Fast remediation with QFlow – no code, drag-and-drop workflows. The integration of QFlow technology into Qualys TotalCloud saves security and DevOps teams valuable time and resources. Automation and no-code, drag-and-drop workflows help simplify the time-consuming operational tasks of assessing vulnerabilities on ephemeral cloud assets, alerting on high-priority threats, remediating misconfigurations, and quarantining high-risk assets.
Tenable Cloud Security is a comprehensive solution designed to help organizations secure their cloud environments across various platforms, including AWS, Azure, and Google Cloud. It offers continuous visibility, compliance management, and threat detection to ensure that cloud infrastructure and applications are protected from vulnerabilities and misconfigurations.
Tenable Cloud Security exemplifies a comprehensive Cloud-Native Application Protection Platform (CNAPP) by providing a unified solution that covers the entire cloud security lifecycle, from development to runtime. This platform is designed to address vulnerabilities, misconfigurations, threats, and compliance risks across multi-cloud environments, making it an essential tool for organizations adopting cloud-native architectures. In practice, Tenable Cloud Security integrates security into the development process through its shift-left approach, particularly with Infrastructure as Code (IaC) security. This ensures that security measures are embedded early in the development lifecycle, allowing teams to identify and mitigate vulnerabilities before they reach production. Once in production, the platform continues to provide real-time visibility into cloud environments, enabling continuous monitoring and proactive threat detection.
The solution's comprehensive protection spans various aspects of cloud security, including the identification and remediation of misconfigurations, automated compliance management, and advanced threat intelligence. By automating these processes, Tenable Cloud Security reduces the manual effort required to manage cloud security, freeing up resources for more strategic initiatives.
What are the key features of Tenable Cloud Security?
What are the benefits of using Tenable Cloud Security?
Tenable Cloud Security is particularly valuable in industries with stringent regulatory requirements, such as finance, healthcare, and retail. For example, in the financial sector, it helps organizations ensure compliance with regulations like PCI-DSS while safeguarding sensitive data across cloud environments.
In summary, Tenable Cloud Security is a robust CNAPP solution that integrates security throughout the cloud lifecycle, providing comprehensive protection and operational efficiency for cloud-native environments.
We monitor all Cloud-Native Application Protection Platforms (CNAPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.