Anonymous UserIT Consultant Supervisor at a financial services firm
Anonymous UserPrincipal security consultant at a computer software company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Technical support is fantastic."
"The most valuable features are vulnerability detection and the scanning capability to enable identification of vulnerabilities across our network."
"What I like about Qualys VM is the dashboard presentation. It's very good."
"It's a good product. After the scan our internet works well. It scans our security posture."
"It is very easy to use and there are lots of options. We can usually easily go through it and all of the things we want to configure, and we can configure everything to our specifications very easily."
"The initial setup was good. We didn't have any problems with it."
"Technical support is great and we've never really had a problem."
"The features that are most valuable are the identification, scan features, and the identification of vulnerabilities."
"The most valuable feature for us is the support for testing Linux-based web server components."
"The reporting on the solution is good."
"All of the features are great."
"It's quite complex on the way it is set up, so it takes a fair bit of time in order to get your head around it in order to deploy it. Once you've deployed it, then you're never confident on the versions of the browsers and the SSL certificates, etc. You have to always go back into Qualys and check."
"I would like to see this solution more developed and competitive in the Cloud space."
"The customer support is very bad."
"The reporting needs improvement. It should generate much more stuff like field reports."
"Sometimes we face a problem with accessing the tool and not getting an expected result. From a technology point of view, they need to look into this."
"The ability to manage user accounts and give rights to the operator to know about abnormalities of applications is something that needs improvement."
"We are moving away from Qualys to Defender ATP because I find that Defender ATP is much better at prioritizing the vulnerabilities that I should be looking at."
"I would like to see more accuracy in detections, better reporting capabilities, and better dashboard download capabilities."
"Better automation capabilities would be an improvement."
"The solution should improve the responsiveness of its live technical support."
"At the time I was using it, the graphical user interface needed some improvements."
"They have recently changed the pricing model, which is now better than it was before."
"It is different for every company, but for us, it's every three years."
"Qualys is cheaper and more affordable than other solutions."
"The pricing and licensing for Qualys could be improved."
"The great advantage with Rapid7 Metasploit, of course, is that it's free."
Qualys Vulnerability Management (VM) is a cloud-based service that gives you immediate, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps you to continuously identify threats and monitor unexpected changes in your network before they turn into breaches.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Qualys VM is ranked 4th in Vulnerability Management with 12 reviews while Rapid7 Metasploit is ranked 8th in Vulnerability Management with 3 reviews. Qualys VM is rated 8.2, while Rapid7 Metasploit is rated 7.6. The top reviewer of Qualys VM writes "Easy to use and scalable but needs to be priced more competitively". On the other hand, the top reviewer of Rapid7 Metasploit writes "Straightforward to set up, and helpful for moving from development to production". Qualys VM is most compared with Tenable Nessus, Tenable SC, Rapid7 InsightVM, Darktrace and SecurityScorecard, whereas Rapid7 Metasploit is most compared with Tenable Nessus, Rapid7 InsightVM, Wireshark, Darktrace and Acunetix Vulnerability Scanner. See our Qualys VM vs. Rapid7 Metasploit report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.