If I communicate with admin users responsible for modifying settings, I interact with around 14-16 of them. However, in terms of managing access and overseeing the health of Qualys, I handle close to 20,000-30,000, including network and server devices. Although we have specialized personnel, we lack visibility into logs to analyze and identify root causes. During screen sharing sessions, when troubleshooting, I actively participate and resolve issues most of the time. So, if we had additional specialists, they could also analyze logs, potentially leading to quicker resolutions. Overall, I rate the solution an eight-point five out of ten.
This category within cybersecurity focuses on the protection of data, applications, and infrastructures in both cloud environments and physical data centers.
If I communicate with admin users responsible for modifying settings, I interact with around 14-16 of them. However, in terms of managing access and overseeing the health of Qualys, I handle close to 20,000-30,000, including network and server devices. Although we have specialized personnel, we lack visibility into logs to analyze and identify root causes. During screen sharing sessions, when troubleshooting, I actively participate and resolve issues most of the time. So, if we had additional specialists, they could also analyze logs, potentially leading to quicker resolutions. Overall, I rate the solution an eight-point five out of ten.