Try our new research platform with insights from 80,000+ expert users
reviewer1820922 - PeerSpot reviewer
President and CEO at a non-profit with 11-50 employees
Real User
Excellent intelligence and real-time inventory of vulnerabilities
Pros and Cons
  • "Qualys VM has allowed us to know the vulnerabilities we need to prioritize based on the threat levels and the possible impact if there's an intrusion."
  • "Qualys VM's machine learning and artificial intelligence features could be improved."

What is our primary use case?

I mainly use Qualys VM for CSAM, to complement vulnerability management on our assets, and to check for intrusions through our email gateways.

How has it helped my organization?

Qualys VM has allowed us to know the vulnerabilities we need to prioritize based on the threat levels and the possible impact if there's an intrusion. It also provides a view of inventories and vulnerabilities in the containers running on my infrastructure, which helps me to do better roadmapping on where I need to put my resources.

What is most valuable?

Qualys VM's best features are its machine-learning-backed intelligence, real-time inventory of vulnerabilities, backup, threat intelligence exposure database, and that it doesn't hold on to infrastructure resources like memory.

What needs improvement?

Qualys VM's machine learning and artificial intelligence features could be improved.

Buyer's Guide
Qualys VMDR
November 2024
Learn what your peers think about Qualys VMDR. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

For how long have I used the solution?

I've been using Qualys VM for over a year.

What do I think about the stability of the solution?

I've had no issues with Qualys VM's stability.

What do I think about the scalability of the solution?

Qualys VM is scalable.

How are customer service and support?

Qualys has an impeccable, readily available technical support team.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is very simple - it's just a deploy-and-run.

What's my experience with pricing, setup cost, and licensing?

Qualys VM is reasonably priced.

What other advice do I have?

I would rate Qualys VM as nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Information Security Engineer at a tech services company with 1,001-5,000 employees
MSP
The main purpose was to remove the granularity. It really helped us manage the security of our organization.
Pros and Cons
  • "It is a simple solution that makes scanning easy. You just give it a scheduled task, and it will do everything for you."
  • "The reporting is fine."
  • "The only improvement I can think of is on the implementation side. At times it is a bit slow."

What is our primary use case?

My primary use case is for the web application scans of websites. I also made some new search profiles and other scanning profiles.

How has it helped my organization?

Before using Qualys, we had other security tools. And, the main purpose was to remove the granularity. We had so many attacks every day. Qualys really helped us manage the security for our operations.

What is most valuable?

The most valuable features are that it is a simple solution that makes scanning easy. You just give it a scheduled task, and it will do everything for you. The reporting is fine, too. And, the knowledge base is pretty good, too.

What needs improvement?

The only improvement I can think of is on the implementation side, otherwise the operation is fine. At times it is a bit slow.

Qualys is really nice, but people only use Qualys for the VM and web scan. They just file the report, and send the report to the customer or client. They don't do anything with the reports. They will get the report, and there are usually 30 to 40 vulnerabilities, not in the web servers. And, of those 30 vulnerabilities, 10 or 15 were usually the first cases. In case of those vulnerabilities are around 50, in which around 50-60% of vulnerabilities are usually found worse. So, for those cases, was pretty low and in Qualys we have to look for them also. Whenever the report comes, we just send the report from the client. And that was one of the biggest issues. So, in this area, we only have to actually check the vulnerabilities in the report. You just have to catch a little bit of this, when we do the type or not. That was one of the issues we had with Qualys.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

No, we have not experienced any issues with stability of the product at all.

What do I think about the scalability of the solution?

I have not encountered issues with scalability of the solution. I had scanned 77 servers at a time, and found no issues with scalability while doing so.

How are customer service and technical support?

I have not had a need to deal with Qualys tech support.

Which solution did I use previously and why did I switch?

I have previous experience with Tenable Nessus. I like Qualys better because there are so many nice features, it builds better.

What's my experience with pricing, setup cost, and licensing?

I am not personally involved with the pricing or licensing of the solution for our organization.

Which other solutions did I evaluate?

I have prior experience with Alert Logic CloudDefender, RSA, Odyssey and Forcepoint Websense (formerly Raytheon Websense). 

What other advice do I have?

A really nice feature of Qualys is the asset management. Some of the end users were using that function, and paid for that particular function. It is helpful to get a bit of history of all types of supports of scanning of particular servers.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Qualys VMDR
November 2024
Learn what your peers think about Qualys VMDR. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Technology Security Expert at T-Mobile Polska (Deutsche Telekom)
Real User
Identifies and helps to remedy vulnerabilities, has good certificate management
Pros and Cons
  • "The most valuable feature is the certificate management."
  • "The reporting in this solution can be improved."

What is our primary use case?

Our primary use case is vulnerability assessment.

How has it helped my organization?

This solution has provided information about existing vulnerabilities, and helped with quick remediation in case of global malware attacks.

What is most valuable?

The most valuable feature is the certificate management. The reason is the limited license provided by the mother company.

What needs improvement?

The reporting in this solution can be improved.

For how long have I used the solution?

I have been using this solution for five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Information Security Specialist at a manufacturing company with 10,001+ employees
Real User
This solution helps us fill out forms in a timely manner. It is more expensive than competitive products.
Pros and Cons
  • "It is quite easy to implement."
  • "When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself."
  • "It is more expensive vs. other products on the market."

What is our primary use case?

My primary use case is to actually fill out forms, ensure that they are being closed in a timely manner. This is why we use these one point solutions.

What is most valuable?

I find most valuable to achieve a channel system and we can also use it to track when we actually close the ticketing of the sites.

In addition, it is quite easy to implement. We found it quite convenient.

What needs improvement?

I think it could improve asset imagery.  

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

I have not encountered issues with stability of the product.

What do I think about the scalability of the solution?

I have not encountered any issues of scalability function. We do have to pay extra according to the number we are placing on the scan. So, when you want to be covered for the scalability, you will have to pay more.

How was the initial setup?

The initial setup was straightforward. It was quite simple. We just needed to download the image from the website, and onto our service team.

What's my experience with pricing, setup cost, and licensing?

Qualys is considered more expensive versus other products on the market.

Which other solutions did I evaluate?

We were previously using McAfee. We had to switch because McAfee stopped producing the solution we needed. We considered Tenable Nessus, but we chose Qualys in the end.

What other advice do I have?

I advise that you see if this solution can fit your problems, and help your needs.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user254973 - PeerSpot reviewer
Manager Information Security at a healthcare company with 10,001+ employees
Real User
There are some stability issues with reporting, but it's straightforward to implement.

What is most valuable?

Vulnerability management.

How has it helped my organization?

It has helped to automate the vulnerability management program, increasing the security posture and helped us to identify the security risks in our infrastructure.

What needs improvement?

Web application security model needs some work.

For how long have I used the solution?

I've been using it for four years, including including VM, PCI, WAS and MDS features.

What was my experience with deployment of the solution?

No issues encountered.

What do I think about the stability of the solution?

There's been a few times, related to reporting, that we've had issues, but overall it's stable.

How are customer service and technical support?

Customer Service:

Excellent, the Qualys support team always helps on a priority basis.

Technical Support:

Excellent!

Which solution did I use previously and why did I switch?

No previous solution was used.

How was the initial setup?

It was straightforward.

What about the implementation team?

It was done in-house.

Which other solutions did I evaluate?

No other options were looked at.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user5130 - PeerSpot reviewer
Security Expert at a financial services firm with 1,001-5,000 employees
Vendor
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.

The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private cloud platform in a client's data center and under the client's control. If taken at their word, this may seen promising, but the reality is that Qualys still will have to manage this platform remotely. By doing so, they will have access to this data remotely anyway and can pull it down to their site as needed. Needless to say, Qualys requires the client to provide a backdoor to the system.

The Qualys PCP equipment is leased and never sold to the customer. There are many legal issues with this which allows them to access their equipment. They require the customer to give them remote access in order for them to manage it remotely. That is a requirement and not an option. They keep it a big secret how it is managed.

Remote Access

What kind of remote access to the QG PCP do they require?

1. Persistent iVPN tunnel
2. VPN remote access account


Qualys still has the means to pull the data back to Qualys through SSH/SCP even though it is hosted on a customer site. In fact, Qualys does not allow the customer to monitor the network traffic being sent back to Qualys. Such requests were flat out refused during a security assessment. What they pull back is their business and the customer has no right to know.

Network Sniffer

Network monitoring had to be done outside of the QG PCP as Qualys did not allow internal network sniffing. This traffic analysis did show a few weaknesses.

1. Emails were being sent to email server UNENCRYPTED. Yes, one could see the message being sent as well as who the recipients were. Emails were being back to Qualys through the Internet. A lot of sensitive information were sent unencrypted including server names, configuration, scripts, running jobs, listening ports, full internal DNS names.

2. Internet connections from Indonesia were seen accessing the QG PCP even though it was supposed to be in a controlled access network in a data center


3. A lot of failed DNS requests to www.qualys.com and other qualys subdomains, looks like the system has not been fined tuned to be hosted at a client site. The interesting thing is that it tries to do windows updates on its own by accessing the Internet.


4. Undocumented protocols used by the Qualys PCP; namely AppleTalk, CMIP-Man, and Feixin


5. syslog messages sent across the network unencrypted.

Firewall Rule Analysis

Firewall rule analysis shows that SSH is allowed into the platform through VPN firewall as well as HTTP(S) protocols.

Internet Access

The Qualys PCP itself does access network traffic in and out of the controlled access network environment as seen in the diagram below.

1. The Qualys PCP Service Network requires outbound communication for

a. NTP – Time Synchronization

b. DNS – Name Resolution

c. SMTP – Email

d. WHOIS – External Internet

e. Daily Vulnerability Updates - External Internet.

WHOIS pulls information from the Internet and Daily Signature Updates are pulled from Qualys through the Internet on port 443. In effect, the PCP is pulling information from Qualys through the Internet to retrieve updates. A man-in-the-middle attack could intercept the update and instead return a malware update to the Qualys PCP provided that a vulnerability exists in the platform.

2. The physical scanners communicate to the Qualys PCP. This requires that inbound port 443 be opened on the PCP. Physical scanners in the DMZ also need to communicate to the PCP on port 443. Access to the PCP from the DMZ increases the risk.

3. Qualys SOC accesses the PCP through iVPN and VPN connections from the Internet for maintenance and support.

Virtual Scanners

A sniffer placed on a virtual scanner showed that it chose to use SSLv3, which is deprecated, by default on some servers to communicate to the Qualys PCP. In particular, it uses SSLv3 with RC4-MD5. MD5 is obsolete. Qualys documentation claims they use TLSv1 and the latest modern secure protocols.

Application Analysis

Perl API

Application analysis was done by running Perl scripts against the qualysapi server and testing for vulnerabilities. The server itself was found to be vulnerable by accepting login credentials for API requests via base64 encoding and passed through plaintext HTTP. This could result of loss and capture of Qualys Admin credentials which could result in access to vulnerability scan results.


Web Application
The Qualys Web Application tests resulted in a number of vulnerabilities.

Qualys PCP Internal

Additional vulnerabilities were found inside the Qualys PCP infrastructure itself. It was found to be very insecure.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1781004 - PeerSpot reviewer
GM Network Information Security at a tech services company with 1,001-5,000 employees
Real User
Helpful support and scalable
Pros and Cons
  • "Qualys VM had a recent upgrade and the newer version is supporting the cloud."
  • "The reporting and dashboards could improve in Qualys VM. However, they have improved since the previous versions."

What is most valuable?

Qualys VM had a recent upgrade and the newer version is supporting the cloud.

What needs improvement?

The reporting and dashboards could improve in Qualys VM. However, they have improved since the previous versions.

For how long have I used the solution?

I have been using Qualys VM for approximately 10 years.

What do I think about the scalability of the solution?

Qualys VM is highly scalable.

How are customer service and support?

The technical support was very good from Qualys VM.

What was our ROI?

Qualys VM helps to identify the vulnerabilities on a timely basis. It helps the companies to upgrade their networks and apply patches. In the latest version, it has added the patching capability, it's very useful.

What other advice do I have?

My advice to others is this is one of the top solutions in its category. However, they can evaluate many solutions to see for themselves. 

I would recommend this solution to others to implement it in their network.

I rate Qualys VM an eight out of ten

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user254613 - PeerSpot reviewer
Security Consultant at Cyber Intelligence Sdn Bhd
Consultant
The reporting features needs to be improved, but you don't need to spend a lot of time on the deployment.

What is most valuable?

The fact that it's on the cloud, so there's no configuration whatsoever on my physical machine except for the VM scanner.

How has it helped my organization?

It now takes less time to run a vulnerability assessment for our client. I do not have to bring two laptops anymore to my clients sites.

What needs improvement?

Maybe the reporting features. It is too granular, so that if someone new wants to get familiar with it, they will have a hard time. A few more tutorials or guide on screen would also be appreciated.

For how long have I used the solution?

I've been using the consultant edition for two years.

What was my experience with deployment of the solution?

During the internal scanner deployment, but the issue was mostly not the product, but more the network architecture of our client.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

9/10

Technical Support:

9/10

Which solution did I use previously and why did I switch?

Rapid 7 Nexpose. To use the software, it takes a whole laptop just to run it, and the results have too much redundancy. Additionally, the scan rate is very slow compared to Qualys, and furthermore it is too expensive when compared to Qualys.

How was the initial setup?

It's very straightforward. Basically you can scan anything external/internet facing within five minutes. For internal scans you have to deploy the internal scanner which can be done in five minutes if the network architecture is not too complex.

What about the implementation team?

It was done In-house, but the help we get from their Singapore support team is awesome.

Which other solutions did I evaluate?

  • Nessus
  • Nexpose

What other advice do I have?

Use it. It is a great product. Many people are sceptical that their scan results are in the cloud. But if you want something affordable and that works like a charm, go for Qualys. Less headaches and easy to achieve ROI as you don't spend much on the deployment or maintenance.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: We have been doing some road-shows, & conferences in Malaysia to introduce Qualys.
PeerSpot user
Buyer's Guide
Download our free Qualys VMDR Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Qualys VMDR Report and get advice and tips from experienced pros sharing their opinions.