We just raised a $30M Series A: Read our story
2018-05-21T09:21:00Z

What is your primary use case for Qualys VM?

25

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
2020 Answers

author avatar
Top 20MSP

We primarily use the solution for full enterprise visibility from both an asset detection perspective and vulnerability detection perspective. Basically, we are tracking all the devices over agents, including PCs and servers, et cetera. We are able to understand what our current situation is on the devices. At the second stage, we are able to catch the devices which do not have agents or which are not in the inventory, with on-premise scanners. We are running security configuration hardening assessments or compliance with CIA security benchmarks. In addition to that, we are also utilizing the cloud assessment solution of the Qualys, to ensure compliance with CIA security standards. For example, the Amazon cloud platform is configured compliantly with the CIA security benchmark. These are the four pillars utilized.

2021-09-22T12:03:29Z
author avatar
Real User

I used this solution for one of my clients and the primary use case was for the compliance mode and scanning. We are customers of Qualys and I am senior vice president information security.

2021-07-26T16:19:46Z
author avatar
Top 5Real User

It's used for vulnerability assessments, assessment of IT equipment, PCs, servers. It's supposed to help prioritize which security patches need to be deployed on that equipment.

2021-03-03T10:54:15Z
author avatar
Top 20Real User

We use this product for vulnerability management.

2021-02-01T19:51:52Z
author avatar
Reseller

We are consultants and resellers of Qualys VM.

2021-01-12T09:04:44Z
author avatar
Top 5Real User

We are using Qualys VM, as our scanner tool. We also use it for Application Security and Policy Compliance. We use it for the identification of vulnerabilities for all of our devices on the network. This includes Windows workstations, servers, and Linux machines. We also use it for cloud, and external use as well.

2021-01-08T19:00:41Z
author avatar
Top 20MSP

We are a system integrator. We implement Qualys for our customers for vulnerability management and policy compliance. We are not using Qualys as a product in our company. We have public, private, and hybrid cloud as well as on-premises deployments.

2021-01-04T17:17:01Z
author avatar
Top 20Real User

We are currently using Qualys for vulnerability detection, as part of our security solution. We're moving towards Defender ATP because I am looking more at the Operational Technology (OT) side of things than I am at the Information Technology (IT) side.

2020-12-02T14:39:04Z
author avatar
Consultant

I use Qualys to review the validity of legacy applications, infrastructure, and simple data operating systems.

2020-11-18T11:05:00Z
author avatar
Top 20Real User

We're primarily using the solution for vulnerability assessment of internal server as well as the external server.

2020-09-17T08:05:51Z
author avatar
Top 20Consultant

We use Qualys to check the status of our security posture.

2020-04-16T08:44:00Z
author avatar
Top 20Real User

The primary use cases of this solution are as a scanner. We use it with Azure and AWS. For on-premises, we use physical scanners all over the globe. We have deployed our external scanners in approximately 70 regions.

2020-03-05T08:39:45Z
author avatar
Top 5Real User

Our primary uses for this solution are security vulnerability detection and policy compliance.

2019-12-11T22:01:00Z
author avatar
Real User

The primary use for the solution is vulnerability management.

2019-09-08T09:50:00Z
author avatar
Real User

Datacenters which are in different locations.

2019-02-20T09:09:00Z
author avatar
Real User

It mainly scans the model against all of our online websites.

2018-10-28T09:33:00Z
author avatar
Real User

My primary use case is to actually fill out forms, ensure that they are being closed in a timely manner. This is why we use these one point solutions.

2018-10-28T09:33:00Z
author avatar
MSP

My primary use case is for the web application scans of websites. I also made some new search profiles and other scanning profiles.

2018-10-28T09:33:00Z
author avatar
Real User

It improves the continuous monitoring of the systems on-premises.

2018-10-28T09:33:00Z
author avatar
Real User

Our primary use case is to manage vulnerabilities, scan web applications, and report assets throughout the network. Also, we create reports based on this data.

2018-05-21T09:21:00Z
Find out what your peers are saying about Qualys, Rapid7, Tenable Network Security and others in Vulnerability Management. Updated: October 2021.
543,089 professionals have used our research since 2012.