We performed a comparison between Microsoft Defender Vulnerability Management and Qualys VMDR based on real PeerSpot user reviews.
Find out in this report how the two Risk-Based Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."One valuable feature is the Microsoft Security Scorecard."
"The solution helps identify threats and vulnerabilities."
"The solution is up-to-date and helps prevent zero-day attacks."
"The product’s most valuable features are compliance, recommendations, and inventories."
"The product's stability is very high...The scalability of the product is amazing."
"The reporting functionality is great."
"I find the most valuable features are the continuous monitoring. Even on premises, there is constant monitoring."
"What I like about Qualys VM is the dashboard presentation. It's very good."
"The most valuable feature is the ability to run different capabilities with the same agent. With only one agent, we can have EDR, vulnerability management, compliance and some basic SaaS security capabilities."
"They also have threat detection which maps threats. There is a feed that comes from Qualys when a new vulnerability is found. It tells us which machines are infected with that vulnerability."
"Performs automated, regular scans in the network."
"The solution is easy to use."
"It is quite easy to implement."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"The technical support takes too much time to resolve tickets."
"It is challenging to extract and customize reports from the system."
"Integration can be improved."
"The general support could be improved."
"It is a struggle to be able to pull our report and to be able to do onboarding using automated tools."
"There's a need to upgrade or fix the potential vulnerability rate. Around 20,000 potential vulnerabilities were showing in Qualys VMDR, but none of the other tools showed them. When we checked, it wasn't the case. Support explained that even small issues were being counted as vulnerabilities, causing issues in our audit. So, the security features could be improved to identify vulnerabilities accurately."
"They're still evolving their platform in terms of reporting capabilities."
"The ability to manage user accounts and give rights to the operator to know about abnormalities of applications is something that needs improvement."
"The customer support is very bad."
"One of the biggest issues from the clients' perspective is that all Qualys computing is on the cloud."
"If anything, I would like to see the user interface modernized a bit more."
"It's quite complex on the way it is set up, so it takes a fair bit of time in order to get your head around it in order to deploy it. Once you've deployed it, then you're never confident on the versions of the browsers and the SSL certificates, etc. You have to always go back into Qualys and check."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 7th in Risk-Based Vulnerability Management with 5 reviews while Qualys VMDR is ranked 3rd in Risk-Based Vulnerability Management with 77 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while Qualys VMDR is rated 8.2. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of Qualys VMDR writes "Good visibility but expensive and needs better support". Microsoft Defender Vulnerability Management is most compared with Tenable Nessus, Rapid7 InsightVM, Tenable Vulnerability Management, Microsoft Defender XDR and Microsoft Sentinel, whereas Qualys VMDR is most compared with Tenable Nessus, Tenable Security Center, Rapid7 InsightVM, Tenable Vulnerability Management and Microsoft Defender for Cloud Apps. See our Microsoft Defender Vulnerability Management vs. Qualys VMDR report.
See our list of best Risk-Based Vulnerability Management vendors.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.