Qualys VM

Qualys VM Bewertungen

von Qualys

Qualys the best vulnerability scanner

Bewertet am 8.1.2019
Héctor joel B.
Ingeniero de Implementación y Soporte
Computer- & Netzwerksicherheit, 13-50 Mitarbeiter
Verwendete die Software für: Mehr als 2 Jahre
Quelle des Nutzers 
5/5
Gesamt
5/5
Benutzerfreundlichkeit
5/5
Eigenschaften & Funktionalitäten
5/5
Kundenbetreuung
5/5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Kommentare: Based on the experience I have with Qualys, it is very impressive to capture the vulnerabilities, this compiles a complete report of the risks that your infrastructure has, in addition the patches have very precise information that allows you to carry out the remediation very effectively. The analyzes are detailed and very complete, it works very well to carry out the compliance stages of PCI, CIS, etc... Providing a great guarantee that periodically your organization has an armored infrastructure.

Vorteile: In the firts instance we could see its operation inside a beast and we were amazed, its different configurations to make scans allows to obtain much more complete results than other programs. Qualys as a pentesting tool allows you to analyze those areas of greatest risk within your organization to remedy them. The ability to perform scans for a particular plugin is one of the features that other software should envy to Qualys. Your reports have a very detailed information that allows you to quickly identify vulnerabilities.

Nachteile: I have no negative comments, it has worked very well in the company and with our allies.

Nice tool for Vulnerability Management.

Bewertet am 28.1.2019
Verifizierter Rezensent
Senior Information Technology Security Consultant
Krankenhausversorgung & Gesundheitswesen, 501-1.000 Mitarbeiter
Verwendete die Software für: Mehr als 2 Jahre
Quelle des Nutzers 
4/5
Gesamt
4/5
Benutzerfreundlichkeit
3/5
Eigenschaften & Funktionalitäten
3/5
Kundenbetreuung
3/5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Kommentare: Overall We are happy, Web interface is very interactive and training are awesome.

Vorteile: Easy to implement, enabling sensors are not much techie.

Nachteile: Sometime handling false positive detection are really a tough task.

Useful Vulnerabilty Management option

Bewertet am 5.3.2019
Verifizierter Rezensent
Senior ICT Advisor - Innovation & Security
Öffentliche Ordnung, 501-1.000 Mitarbeiter
Verwendete die Software für: 6-12 Monate
Quelle des Nutzers 
4/5
Gesamt
4/5
Benutzerfreundlichkeit
3/5
Eigenschaften & Funktionalitäten
3/5
Kundenbetreuung
4/5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Vorteile: Detailed explanations and possible resolutions for vulnerabilities that are detected by the Cloud Agents.

Nachteile: I have used other solutions as well on the same machines and they seem to detect quite a few different vulnerabilities, it seems neither give a rather complete list, so it's a good idea to use multiple solutions from different vendors with a different focus to get a clear insight in the ones that are classified as higher risks.

Qualys VM

Bewertet am 6.2.2019
Safi R.
Information Security
Finanzdienstleistungen, 201-500 Mitarbeiter
Verwendete die Software für: 6-12 Monate
Quelle des Nutzers 
3/5
Gesamt
2/5
Benutzerfreundlichkeit
3/5
Eigenschaften & Funktionalitäten
3/5
Kundenbetreuung
3/5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Kommentare: They need to make the product better .. Focus ion ease of use. Get a focus group going.

Vorteile: Agent deployment is simple. The software offers much if configured right. I dislike the add on services model.

Nachteile: False positives. If a later software update rectifies an older vulnerability then there is no need to show asset is vulnerable.
Vuln that shows up in Asset View is different in Vuln View.. Why?
Salesperson quit after the sale which sucked. Replacement helped but was not focused on us.

Vulnerability Management

Bewertet am 21.11.2018
Verifizierter Rezensent
CISO
Outsourcing/Offshoring, 1.001-5.000 Mitarbeiter
Verwendete die Software für: 6-12 Monate
Quelle des Nutzers 
5/5
Gesamt
5/5
Benutzerfreundlichkeit
5/5
Eigenschaften & Funktionalitäten
5/5
Kundenbetreuung
5/5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Vorteile: Works well and is a trusted source. Their scanning engine gives you some level organization independence (not entirely).

Nachteile: It is expensive, and you have to open up your organization to their IP's or put an in-house relay server.

Lots of promises, great marketing. Real quality rather low. Decided to find something better.

Bewertet am 21.7.2018
Verifizierter Rezensent
Server, storage and messaging team leader
Automotive
Verwendete die Software für: Mehr als 1 Jahr
Quelle des Nutzers 
2/5
Gesamt
3/5
Benutzerfreundlichkeit
4/5
Eigenschaften & Funktionalitäten
1/5
Kundenbetreuung
2/5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Kommentare: That was my first contact with vulnerability management. Perhaps it's a good software for start or for small companies. I was able to recognize my needs and it helped a lot to find a professional solution.

Vorteile: Lots of features, agent available, flexible pricing. Software as a service, so you don't need any infrastructure.

Nachteile: Useless unprofessional support, unable to solve any of my issues. They were closing unresolved issues. Lot of false positives. Support couldn't solve them, I got promises that it will be fixed in next release. Awful and unreliable reporting (errors on dashboards etc.). Very expensive. They're not using real cloud but couple of concentrators in different regions. Not useful for global customers. They promise they don't have access to customer data, but they request that to solve problems.

Incompetent badly supported rubbish.

Bewertet am 24.8.2018
Graham N.
Owner
Informationstechnologie & -dienste, 2-10 Mitarbeiter
Verwendete die Software für: 1-5 Monate
Quelle des Nutzers 
1/5
Gesamt
3/5
Benutzerfreundlichkeit
2/5
Eigenschaften & Funktionalitäten
Kundenbetreuung
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Vorteile: Nothing - I hate it.

Nachteile: Their ridiculous false positives - apparently it's a critical incompliance that certain options aren't set in the gdm config file /etc/gdm.conf.
Fair enough - if gdm was installed. A simple check that the file exists first would eliminate this and (of our 80+ compliance errors) most others. Complaining about mount options on non-existent filesystems, or that /etc/gshadow didn't match a regex - or did, I'm not sure from the report. The file has mode 0000 (so no permissions set at all).
The fix was to chown root:root /etc/gshadow*
Trust these amateurs at your own risk. If they are as incompetent as this, what are they missing?