Security Expert at a insurance company with 10,001+ employees
Real User
Top 20
2023-01-05T15:26:43Z
Jan 5, 2023
Qualys VM is used for vulnerability scans for the internet and applications using application exchange. There are many applications. We also use the solution for asset management per team, and the network scan to discover the devices on our network.
Qualys has many products. However, the prominent one is for scanning the vulnerabilities on endpoints, including servers and desktops. The other can be for using multiple other products, like taking the certificate, inventory, and software inventory of endpoints through scanning. Additionally, we use the solution for web application scanning. When they have web applications, they can scan applications for various vulnerabilities and give recommendations.
We use this solution to manage compliance and to verify the gap between the policy defined by the company and the ones that are implemented in the system. We also use Qualys for vulnerability management of assets in the cloud or on-prem.
Assistant Manager Solutions at Mutex Systems Pvt. Ltd.
Real User
2022-07-06T06:27:43Z
Jul 6, 2022
We're using the entire suite except for Patch Management. I use Qualys VM for my production environment on Amazon AWS. I also use it for my endpoints and some BDI solutions that require on-premise solutions, and I use it for both.
We use bother on-premise and cloud deployments of Qualys VM. For my clients in the cloud, we use a cloud solution, which is a bring your own license model. Additionally, We have our own deployment of Qualys VM. We are using Qualys VM to provide a VM service.
Manager, Info Security Planning & Architecture at a comms service provider with 10,001+ employees
Real User
2022-05-05T12:49:37Z
May 5, 2022
I mainly use Qualys VM for vulnerability management to carry out vulnerability scans on IT assets to find out which are vulnerable and what is needed to patch them. We also use it for policy compliance scans and in tablet for web application scans.
It is for vulnerability management. I used it in my previous company, and I also used it for my home network. It is a SaaS platform. So, there is always the latest version.
Cyber Security Director at a manufacturing company with 5,001-10,000 employees
Real User
Top 5
2021-09-22T12:03:29Z
Sep 22, 2021
We primarily use the solution for full enterprise visibility from both an asset detection perspective and vulnerability detection perspective. Basically, we are tracking all the devices over agents, including PCs and servers, et cetera. We are able to understand what our current situation is on the devices. At the second stage, we are able to catch the devices which do not have agents or which are not in the inventory, with on-premise scanners. We are running security configuration hardening assessments or compliance with CIA security benchmarks. In addition to that, we are also utilizing the cloud assessment solution of the Qualys, to ensure compliance with CIA security standards. For example, the Amazon cloud platform is configured compliantly with the CIA security benchmark. These are the four pillars utilized.
Senior Vice President | Information Security at a financial services firm with 1,001-5,000 employees
Real User
2021-07-26T16:19:46Z
Jul 26, 2021
I used this solution for one of my clients and the primary use case was for the compliance mode and scanning. We are customers of Qualys and I am senior vice president information security.
Chief Information Officer/Senior Vice President at a tech services company with 51-200 employees
Real User
2021-03-03T10:54:15Z
Mar 3, 2021
It's used for vulnerability assessments, assessment of IT equipment, PCs, servers. It's supposed to help prioritize which security patches need to be deployed on that equipment.
Sr. Manager, Vulnerability Management at a transportation company with 10,001+ employees
Real User
2021-01-08T19:00:41Z
Jan 8, 2021
We are using Qualys VM, as our scanner tool. We also use it for Application Security and Policy Compliance. We use it for the identification of vulnerabilities for all of our devices on the network. This includes Windows workstations, servers, and Linux machines. We also use it for cloud, and external use as well.
Network and security Pre-sales Engineer at a tech services company with 51-200 employees
MSP
2021-01-04T17:17:01Z
Jan 4, 2021
We are a system integrator. We implement Qualys for our customers for vulnerability management and policy compliance. We are not using Qualys as a product in our company. We have public, private, and hybrid cloud as well as on-premises deployments.
Global Infrastructure Architect at a energy/utilities company with 5,001-10,000 employees
Real User
2020-12-02T14:39:04Z
Dec 2, 2020
We are currently using Qualys for vulnerability detection, as part of our security solution. We're moving towards Defender ATP because I am looking more at the Operational Technology (OT) side of things than I am at the Information Technology (IT) side.
The primary use cases of this solution are as a scanner. We use it with Azure and AWS. For on-premises, we use physical scanners all over the globe. We have deployed our external scanners in approximately 70 regions.
Our primary use case is to manage vulnerabilities, scan web applications, and report assets throughout the network. Also, we create reports based on this data.
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk...
Qualys VM is used for vulnerability scans for the internet and applications using application exchange. There are many applications. We also use the solution for asset management per team, and the network scan to discover the devices on our network.
Qualys VM is used for vulnerability scanning.
We use this solution to scan the servers on the network. It is used predominantly by our information security team.
Qualys has many products. However, the prominent one is for scanning the vulnerabilities on endpoints, including servers and desktops. The other can be for using multiple other products, like taking the certificate, inventory, and software inventory of endpoints through scanning. Additionally, we use the solution for web application scanning. When they have web applications, they can scan applications for various vulnerabilities and give recommendations.
I mainly use Qualys VM for CSAM, to complement vulnerability management on our assets, and to check for intrusions through our email gateways.
I use Qualys VM for vulnerability scanning, enterprise management, web application scanning, and patch deployment.
We use this solution mainly for vulnerability management.
We use this solution to manage compliance and to verify the gap between the policy defined by the company and the ones that are implemented in the system. We also use Qualys for vulnerability management of assets in the cloud or on-prem.
We're using the entire suite except for Patch Management. I use Qualys VM for my production environment on Amazon AWS. I also use it for my endpoints and some BDI solutions that require on-premise solutions, and I use it for both.
I primarily use Qualys VM to manage vulnerability tickets.
We use bother on-premise and cloud deployments of Qualys VM. For my clients in the cloud, we use a cloud solution, which is a bring your own license model. Additionally, We have our own deployment of Qualys VM. We are using Qualys VM to provide a VM service.
I primarily use Qualys VM for vulnerability management, security configuration, and management and asset inventory.
I mainly use Qualys VM for vulnerability management to carry out vulnerability scans on IT assets to find out which are vulnerable and what is needed to patch them. We also use it for policy compliance scans and in tablet for web application scans.
It is for vulnerability management. I used it in my previous company, and I also used it for my home network. It is a SaaS platform. So, there is always the latest version.
Qualys' main function is to scan IT systems. It does the scanning of computer systems.
It was responsible for vulnerability scanning. It enforces vulnerability management websites.
We primarily use the solution for full enterprise visibility from both an asset detection perspective and vulnerability detection perspective. Basically, we are tracking all the devices over agents, including PCs and servers, et cetera. We are able to understand what our current situation is on the devices. At the second stage, we are able to catch the devices which do not have agents or which are not in the inventory, with on-premise scanners. We are running security configuration hardening assessments or compliance with CIA security benchmarks. In addition to that, we are also utilizing the cloud assessment solution of the Qualys, to ensure compliance with CIA security standards. For example, the Amazon cloud platform is configured compliantly with the CIA security benchmark. These are the four pillars utilized.
I used this solution for one of my clients and the primary use case was for the compliance mode and scanning. We are customers of Qualys and I am senior vice president information security.
It's used for vulnerability assessments, assessment of IT equipment, PCs, servers. It's supposed to help prioritize which security patches need to be deployed on that equipment.
We use this product for vulnerability management.
We are consultants and resellers of Qualys VM.
We are using Qualys VM, as our scanner tool. We also use it for Application Security and Policy Compliance. We use it for the identification of vulnerabilities for all of our devices on the network. This includes Windows workstations, servers, and Linux machines. We also use it for cloud, and external use as well.
We are a system integrator. We implement Qualys for our customers for vulnerability management and policy compliance. We are not using Qualys as a product in our company. We have public, private, and hybrid cloud as well as on-premises deployments.
We are currently using Qualys for vulnerability detection, as part of our security solution. We're moving towards Defender ATP because I am looking more at the Operational Technology (OT) side of things than I am at the Information Technology (IT) side.
I use Qualys to review the validity of legacy applications, infrastructure, and simple data operating systems.
We're primarily using the solution for vulnerability assessment of internal server as well as the external server.
We use Qualys to check the status of our security posture.
The primary use cases of this solution are as a scanner. We use it with Azure and AWS. For on-premises, we use physical scanners all over the globe. We have deployed our external scanners in approximately 70 regions.
Our primary uses for this solution are security vulnerability detection and policy compliance.
The primary use for the solution is vulnerability management.
Datacenters which are in different locations.
It mainly scans the model against all of our online websites.
My primary use case is to actually fill out forms, ensure that they are being closed in a timely manner. This is why we use these one point solutions.
My primary use case is for the web application scans of websites. I also made some new search profiles and other scanning profiles.
It improves the continuous monitoring of the systems on-premises.
Our primary use case is to manage vulnerabilities, scan web applications, and report assets throughout the network. Also, we create reports based on this data.