Have A Question About Vulnerability Management?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.

Have A Question About Vulnerability Management?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.
Most Views
From IT Central Station visitors
Most Followed
By IT Central Station users
Most Compared
From IT Central Station visitors

Vulnerability Management Reviews

Read top reviews of Vulnerability Management solutions from the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Skybox Security
Reseller
Director, Security Architecture at a tech services company with 51-200 employees
May 23 2018

What is most valuable?

The Vulnerability Management module is among the ones we talk about the most and the one that customers are biting off on quite a bit. Skybox, in general, has quite a few features that are particularly useful to large clients, but their... more»

How has it helped my organization?

Specifically, in the Vulnerability Management piece, vulnerability management products are very noisy and they provide this arbitrary score called the CVSS that rates the criticality of the vulnerability. How bad would it be if somebody were... more»

What needs improvement?

The only place where Skybox has room for improvement, and they're working on releasing this, it's just a slow-go, is the UI. The user interface has historically been via a locally installed thick client. They are moving to a web-based console... more»
Skybox Security
Consultant
Sr. Consultant at a tech services company with 1,001-5,000 employees
Feb 12 2018

What is most valuable?

For us, it's more important for our firewalls, to maintain the configuration compliance, to look at duplication of rules; clean up functionalities on the firewall and compliance of the firewall. That's where it's most important. We're still... more»

How has it helped my organization?

It's given us more visibility in terms of what are the kinds of configurations that are on these devices, and how many of these are stale rules. So it's helped greatly in terms of cleaning up of rules, for sure. And it has definitely given a... more»

What needs improvement?

The primary room for improvement would be to enable a web interface, which is not something which is there in the product. This is supposed to have come a year, a year and a half ago, but still has failed to come out. It still needs a client... more»

Have A Question About Vulnerability Management?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
Real User
Country Manager - Africa at Qualys
Jan 25 2018

What do you think of QualysGuard?

It is a very good product in terms of ease of deployment and management and I have personally implemented the solution at a financial institution. The latest release of ThreatProtect is a cloud-based service that correlates external threat data against an organization’s internal vulnerabilities & lets IT pros automatically prioritize remediation work, such as patch deployment & risk mitigation.The dashboard displays entire threat posture at a glance and provides stats such as assets with active zero-day vulnerabilities.The release of our Cloud agent allows organizations to continuously monitor their systems for vulnerabilities and compliance violations in real-time with active alerts. Current in beta is IOC,FIM and the new release of WAF 2.0 and WAS 2.0. Qualys...
Consultant
ITSM & AntiFraud Consultant with 51-200 employees
May 16 2017

What is most valuable?

From my point of view all the Qualys products are valuable. From the clients' perspective, I believe vulnerability management is the most valuable one and it’s a must in every organization. After the client realize the risks from outside, and... more»

How has it helped my organization?

After the first scan of the servers at all the POCs QualysGuard discovered many vulnerabilities that are grouped from low to high impact. The ability to use asset management to scan the grouped servers from the vulnerability management... more»

What needs improvement?

One of the biggest issues from the clients' perspective is that all Qualys computing is on the cloud. As last month The issue with the private cloud is that is costs very much for a small firm.
Skybox Security
Real User
Information Security Architect with 201-500 employees
Apr 23 2018

What is most valuable?

It's the firewall change audit every week. Also, being able to track firewall ACL usage, so that we can produce semiannual reports on ACL usage and on shadowed and redundant rules on the firewall.

How has it helped my organization?

It has automated things. What was a manual process is now just running a report and delivering it to the people who have to mitigate the issues. A better workflow.

What needs improvement?

It's tough to say, because the areas of improvement, I understand the difficulty. For example, they pull configs from thousands of types of devices, and it's difficult for them to stay on top of when vendors change the way their commands... more»
Consultant
ITSM & AntiFraud Consultant with 51-200 employees
Oct 16 2017

What is most valuable?

Rapid 7 offers the community edition, a free of charge edition( 32 IP's) that helps small companies to secure their IT environment. Also with this edition it helps the students to learn about Vulnerability Management. The report from Nexpose... more»

How has it helped my organization?

I use Nexpose to scan my production servers, check the patching level on those servers, and use the reports to show the evolution of security on my servers.

What needs improvement?

For the community edition one of the big issues is with the registration. Rapid 7 only supports paid domains for registration, so no .gmail.com , .yahoo.com domains (once it was possible) . Also the resources needed by the scans can be an issue.
Real User
Chief of Security Operation Division at a financial services firm with 1,001-5,000 employees
Jan 31 2017

What do you think of Fortinet FortiDB?

Valuable Features VA (Vulnerability) DAM (DataBase Activity Monitoring) • Improvements to My Organization When you implement FortiDB in your environment, you get the benefit of three important features: VA, Auditing and Alerting. You can audit your entire database in depth and review the users activity on your critical databases both in real time and offline. This helps you with both debugging and security. • Room for Improvement SIEM integration (all areas) Log management performance Warehousing • Use of Solution I have used Fortinet FortiDB for three years. • Stability Issues We had many issues with the performance and the appliance resource management. • Scalability Issues We had many issues with the hardware limits in high EPS environments. • Customer...
Skybox Security
Real User
Networks Vice President at a tech services company with 1,001-5,000 employees
Mar 26 2018

What is most valuable?

Network path analysis is the most valuable feature. There is a lot of work in my team to support internal and external customers, to answer their questions and difficulties with connectivity that doesn’t work. Mostly, the problem is missing... more»

How has it helped my organization?

This is something we are on the way to doing.

What needs improvement?

At the moment we have a lot of work in implementing the tool in our workflow, so we are not looking for new features. But this could change in the next six to 12 months.
Skybox Security
Real User
CEO at a tech services company with 51-200 employees
May 16 2018

What is most valuable?

Identifies direct exposed vulnerabilities.

How has it helped my organization?

Standard scanning solutions are not able to give any priority in terms of associated risk from identified vulnerabilities. Understanding the real exposure from vulnerabilities and associated assets can reduce the time and investment needed to... more»

What needs improvement?

Firewall Change Management has to be improved with rules provisioning on firewalls because that is where the competition is going and is what customers need.
Real User
Shared Information Security Officer at a university with 1,001-5,000 employees
Sep 06 2016

What do you think of QualysGuard?

Valuable Features Totally vendor-managed appliance Highly scalable and deployable portal interface Ability to easily distribute administration functions based on access roles • Improvements to My Organization It provides fully automated internal and external vulnerability management. • Room for Improvement Streamline PCI integration and attestation. • Use of Solution I have used it for five years. • Scalability Issues I have not encountered any scalability issues. • Customer Service and Technical Support Technical staff are excellent. • Previous Solutions We previously used Rapid 7. The product was not staying current with shifting trends, sales staff were pushy and management were arrogant. • Initial Setup Initial setup was simple. • Pricing,...
Skybox Security
Real User
IT Security Specialist with 10,001+ employees
Jan 11 2018

What do you think of Skybox Security Suite?

Primary Use Case Potential attack vector discovery Network troubleshooting Security check Compliance Aside from Firewall Assurance, we use Network Assurance for network visualisation and troubleshooting. Currently, we are not using the Change Manager Module. • Improvements to My Organization User interface. A web interface would be better. • Valuable Features Change Tracking (audit logs) Access Analyser (access checks) Compliance • Use of Solution One to three years. • Stability Issues No issues. • Scalability Issues No changes to check. • Customer Service and Technical Support It is sufficient. • Previous Solutions No. • Initial Setup The initial setup was easy. • Other Solutions Considered No. • Other Advice Check product...
Real User
Junior Information Security Analyst at a tech services company with 5,001-10,000 employees
May 30 2018

What do you think of QualysGuard?

Primary Use Case Our primary use case is to manage vulnerabilities, scan web applications, and report assets throughout the network. Also, we create reports based on this data.  • Improvements to My Organization Tracks workstations and servers. Monitors workstations and servers for vulnerabilities and creates reports. Performs automated, regular scans in the network. Detects new hosts along with vulnerabilities. • Valuable Features The Qualys Agent is most valuable for getting insight into what is happening on what device with all its metadata. • Room for Improvement Improve the API speed.  Make some minimal dashboard improvements. Improve the user interface. • Use of Solution Less than one year.

Have A Question About Vulnerability Management?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
6,774

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Reviewed McAfee Complete Endpoint Protection: If a client needs new components, ePO helps them to...

Sign Up with Email