Hillstone I-Series Server Breach Detection System vs. Qualys VM

Hillstone I-Series Server Breach Detection System is ranked 27th in Intrusion Detection and Prevention Software vs Qualys VM which is ranked 2nd in Vulnerability Management with 3 reviews. The top reviewer of Qualys VM writes "Easy to deploy and manage but reporting and dashboards have room for improvement". Hillstone I-Series Server Breach Detection System is most compared with . Qualys VM is most compared with Rapid7 NeXpose, Tenable SecurityCenter and Darktrace.
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Use Hillstone I-Series Server Breach Detection System? Share your opinion.

Have A Question About Intrusion Detection and Prevention Software?

Our experts can help. 291,379 professionals have used our research on 6,533 solutions.

Quotes From Members Comparing Hillstone I-Series Server Breach Detection System vs. Qualys VM

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
Usually every implementation is different and the quote is in function of number of assets.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
291,379 professionals have used our research since 2012.
Ranking
RANKING
Views
21
Comparisons
17
Reviews
0
Followers
52
Avg. Rating
N/A
Views
18,635
Comparisons
7,732
Reviews
4
Followers
376
Avg. Rating
9.0
Top Comparisons
Top ComparisonsSee more Hillstone I-Series Server Breach Detection System competitors »
Compared 34% of the time.
Compared 30% of the time.
Compared 4% of the time.
See more Qualys VM competitors »
Also Known As
Also Known AsHillstone sBDSQualysGuard VM
Website/Video
Website/VideoHillstone Networks
Qualys
Overview
Overview

The Hillstone Server Breach Detection System (sBDS) adopts multiple threat detection technologies that include both traditional signature-based technology as well as large-scale threat intelligent data modeling and user behavioral analytics modeling, which provides an ideal solution to detect unknown or 0-day threat attacks, to protect high-value, critical servers and their sensitive data from being leaked or stolen. Together with deep threat hunting analysis capabilities and visibility, Hillstone sBDS provides security admins the effective means to detect IOCs (Indicators of Compromise) events, restore the threat attack kill chain and provide extensive visibility into threat intelligence analysis and mitigations.

Qualys Vulnerability Management (VM) is a cloud-based service that gives you immediate, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps you to continuously identify threats and monitor unexpected changes in your network before they turn into breaches.

OFFER
Learn more about Hillstone I-Series Server Breach Detection System
Learn more about Qualys VM
Sample Customers
Sample Customers
Information Not Available
Agrokor Group, American Specialty Health, American State Bank, Arval, Life:), Axway, Bank of the West, Blueport Commerce, BSkyB, Brinks, CaixaBank, Cartagena, Catholic Health System, CEC Bank, Cegedim, CIGNA, Clickability, Colby-Sawyer College, Commercial Bank of Dubai, University of Utah, eBay Inc., ING Singapore, National Theatre, OTP Bank, Sodexo, WebEx
Top Industries
Top Industries
No Data Available
REVIEWERS
Healthcare Company
27%
Comms Service Provider
27%
Insurance Company
9%
Financial Services Firm
9%
VISITORS READING REVIEWS
Financial Services Firm
21%
Marketing Services Firm
11%
Comms Service Provider
8%
Healthcare Company
7%
Company Size
Company Size
No Data Available
REVIEWERS
Small Business
10%
Midsize Enterprise
25%
Large Enterprise
65%
VISITORS READING REVIEWS
Small Business
35%
Midsize Enterprise
9%
Large Enterprise
56%

Have A Question About Intrusion Detection and Prevention Software?

Our experts can help. 291,379 professionals have used our research on 6,533 solutions.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email