We performed a comparison between Invicti and Qualys Web Application Scanning based on real PeerSpot user reviews.
Find out in this report how the two Application Security Tools solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Scan, proxify the application, and then detailed report along with evidence and remediations to problems."
"Crawling feature: Netsparker has very detail crawling steps and mechanisms. This feature expands the attack surface."
"The best features of Invicti are its ability to confirm access vulnerabilities, SSL injection vulnerabilities, and its connectors to other security tools."
"The scanner and the result generator are valuable features for us."
"The scanner is light on the network and does not impact the network when scans are running."
"The dashboard is really cool, and the features are really good. It tells you about the software version you're using in your web application. It gives you the entire technology stack, and that really helps. Both web and desktop apps are good in terms of application scanning. It has a lot of security checks that are easily customizable as per your requirements. It also has good customer support."
"Attacking feature: Actually, attacking is not a solo feature. It contains many attack engines, Hawk, and many properties. But Netsparker's attacking mechanism is very flexible. This increases the vulnerability detection rate. Also, Netsparker made the Hawk for real-time interactive command-line-based exploit testing. It's very valuable for a vulnerability scanner."
"It has a comprehensive resulting mechanism. It is a one-stop solution for all your security testing mechanisms."
"It works with many different products."
"We can do scanning and submit reports straight to the customers when there are new vulnerabilities, then tell them whether they are affected or not."
"The simplicity of exporting reports and the simplicity and clarity of the reports included with the product are good."
"Qualys Web Application Scanning has multiple features like threat protection and container security scanning in one box."
"The product prevents possible vulnerabilities in our network."
"It is a very stable solution."
"Key features include: Cloud-based, so the installation is not so tedious. Easily deployed. Highly scalable. Comprehensive reporting."
"I have found the detection of vulnerabilities tool thorough with good results and the graphical display output to be wonderful and full of colors. It allows many types of outputs, such as bar and chart previews."
"Right now, they are missing the static application security part, especially web application security."
"The scannings are not sufficiently updated."
"I think that it freezes without any specific reason at times. This needs to be looked into."
"Reporting should be improved. The reporting options should be made better for end-users. Currently, it is possible, but it's not the best. Being able to choose what I want to see in my reports rather than being given prefixed information would make my life easier. I had to depend on the API for getting the content that I wanted. If they could fix the reporting feature to make it more comprehensive and user-friendly, it would help a lot of end-users. Everything else was good about this product."
"Invicti takes too long with big applications, and there are issues with the login portal."
"The scanner itself should be improved because it is a little bit slow."
"The solution's false positive analysis and vulnerability analysis libraries could be improved."
"The support's response time could be faster since we are in different time zones."
"The area of false positives could be improved. There are quite a number of false positives as compared to other solutions. They could probably fine tune the algorithm to be able to reduce the number of false positives being detected."
"The software’s pricing could be improved."
"We procured around 110 licenses for Web Application Scanning, but we have issues running concurrent scans. I don't currently have the option to trigger scans for all 100-plus websites. The default limit is around 10 conference scans. It's not very scalable, to be honest, because of the limitation that they put on concurrent scans."
"There could be better management and faster scanning."
"In terms of the Policy Compliance model which they currently have, not all the platforms are being covered. If they could improve on the Policy Compliance model, since there are policies which are benchmarked against it, this will be helpful for us."
"The scanner reports a lot of false positives, which is something that needs to be improved."
"They should try to include business logic vulnerabilities in the scanner testing."
"When comparing this solution to Veracode, Veracode has good interactive features and gives a clear understanding of what the vulnerabilities are, which error line of the vulnerability is on and what can be done. It gives interactive features, whereas this solution does not give a clear understanding of where or how to fix the problem."
More Qualys Web Application Scanning Pricing and Cost Advice →
Invicti is ranked 20th in Application Security Tools with 25 reviews while Qualys Web Application Scanning is ranked 19th in Application Security Tools with 31 reviews. Invicti is rated 8.2, while Qualys Web Application Scanning is rated 7.8. The top reviewer of Invicti writes "A customizable security testing solution with good tech support, but the price could be better". On the other hand, the top reviewer of Qualys Web Application Scanning writes "A stable solution that can be used for infrastructure vulnerability scanning and web application scanning". Invicti is most compared with OWASP Zap, Acunetix, PortSwigger Burp Suite Professional, Fortify WebInspect and Rapid7 AppSpider, whereas Qualys Web Application Scanning is most compared with OWASP Zap, Veracode, SonarQube, PortSwigger Burp Suite Professional and ImmuniWeb. See our Invicti vs. Qualys Web Application Scanning report.
See our list of best Application Security Tools vendors and best Static Application Security Testing (SAST) vendors.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.