Try our new research platform with insights from 80,000+ expert users

Axonius vs Qualys CyberSecurity Asset Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 20, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Axonius
Ranking in Cyber Asset Attack Surface Management (CAASM)
2nd
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
7
Ranking in other categories
IT Vendor Risk Management (5th)
Qualys CyberSecurity Asset ...
Ranking in Cyber Asset Attack Surface Management (CAASM)
3rd
Average Rating
9.2
Reviews Sentiment
7.7
Number of Reviews
22
Ranking in other categories
Vulnerability Management (8th), Patch Management (6th), Attack Surface Management (ASM) (3rd), Software Supply Chain Security (5th)
 

Mindshare comparison

As of July 2025, in the Cyber Asset Attack Surface Management (CAASM) category, the mindshare of Axonius is 34.1%, down from 39.6% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 8.0%, up from 2.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

Ashok Gunnia - PeerSpot reviewer
Integrates with ServiceNow and provides alerts for deviations
The most valuable feature of Axonius is its ability to deduplicate records and identify which ones are old and stale versus those more relevant. For example, if you haven't logged in today but a system somewhere else mentions you have, Axonius can detect this through various logs like Active Directory, file logging, or Wi-Fi connections. Traditionally, someone would have to make numerous calls and spend a lot of time to find out if you are on-site or connected to a Wi-Fi network. The tool simplifies this process. From my experience, onboarding and adding connectors was pretty easy, especially when integrating with the ServiceNow environment. It worked well for my use case, but the ease of use can depend on the customer's specific needs and what they are trying to achieve.
Scott Frederick - PeerSpot reviewer
Well-integrated with our vulnerability scanning utilities and efficient in asset tagging and identification
Our favorite features are the tagging and the ability to quickly find assets in the portal. Additionally, I do like the fact that Qualys CSAM is integrated with the rest of our vulnerability scanning utilities. We use the full suite from Qualys. The fact that it is integrated makes it very easy to understand. It shares tagging information with VMDR. That is very nice. Qualys CSAM has discovered assets not previously covered by our vulnerability management program. Primarily, if we have assets without vulnerabilities, they become less visible, but Qualys CSAM alerts us to them because they have IP addresses and are attached to our network. It could discover everything from printers to servers to endpoints. It could discover UPSs, network devices, and across all operating systems. It discovers our security badge readers and digital signage. We have to feed that the IP address ranges, but beyond that, it finds everything in our internal network. We were able to realize its benefits within the first quarter of installing it. We did have to take some time to learn it and understand how to operationally leverage what it was telling us, but it was very quick. In addition to vulnerabilities, Qualys CSAM helps identify other risk factors to a degree. For instance, we can see if servers or assets have incorrect naming standards. We have our network segmented into development model, test, and production, and we have server naming standards that identify which management they should be in. If a production server has the naming standard of a development model server, we can find that. That is one area we have used it for. We are not fully using TruRisk, but we are using the Qualys detection score that is central to our corporate risk prioritization approach. It has completely replaced our homegrown one.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The automation capabilities in Axonius have streamlined our security operations."
"Axonius provides preconfigured dashboards that can be customized to your needs."
"he best feature I found in Axonius is that it shows us the duration of eCheck, and it shows us what device is down and in which part of the system life cycle or the checking part the system is down in."
"The solution's technical support was good...The product's initial setup phase is pretty straightforward."
"Overall, I would rate Axonius an eight out of ten."
"I like that the tool has a user-friendly interface. It helps organizations and big companies improve business requirements and control processes."
"Overall, I would give Qualys CyberSecurity Asset Management a nine out of ten."
"I would rate the Qualys CSAM a ten out of ten for its overall performance."
"When you implement a dynamic tag using a query, you do not need to manually tag all the servers. It categorizes all the servers that come under that query. The tagging part is automatically done within a few minutes. It reduces the effort."
"We have had zero attacks since we enabled all the features in Qualys CSAM."
"The most valuable features of Qualys CSAM include the ability to manage authorized and unauthorized applications efficiently. This feature helps in validating applications and maintaining a secure environment."
"Qualys CSAM helps find all the assets. It categorizes information based on various criteria such as host and tenant version. It provides in-depth visibility into both hardware and software."
"My favourite feature of Qualys CyberSecurity Asset Management is its ability to target missing software."
"I like the EASM part because it provides visibility into unmanaged assets that are public-facing."
 

Cons

"For Axonius, I would suggest supporting more ticketing platforms and enhancing API integration directly into the platform rather than just the connector. This would allow for better integration from different systems, possibly into workflows, which I think is currently lacking."
"For us, the product's deployment phase was a little challenging because we had to deal with other departments and business units."
"Regarding the improvement of Axonius, it goes halfway for both the tool and the user. If we set it up quickly from our end, and if the AD groups and all other groups assigned to tag the assets have been tagged correctly, Axonius could not show an error."
"Adding more detailed descriptions or YouTube videos about specific features would help improve the application."
"Axonius could improve by increasing their integrations with more technology vendors."
"Axonius can improve on delivering compliance-related features."
"We can have fetch cycle issues."
"The deployment is somewhat complicated and could be made more user-friendly for most users."
"The main aspect that needs improvement is the user interface, which should be more intuitive."
"Qualys could improve by enhancing its dynamic tagging and role-based access control features, and by refining its user interface for a more intuitive and efficient user experience."
"Qualys could improve by enhancing its dynamic tagging and role-based access control features, and by refining its user interface for a more intuitive and efficient user experience."
"The Qualys CAPS service requires further exploration and improvement, particularly in its handling of protocols and reactivity with MAC and IP addresses for CAP agents."
"In our reporting, we faced a challenge syncing with cloud devices."
"Further research and development are needed to enhance integration with other cloud agents and products, particularly improving communication with external products and vendors."
"Further research and development are needed to enhance integration with other cloud agents and products, particularly improving communication with external products and vendors."
 

Pricing and Cost Advice

"We are on a subscription model with them."
"Axonius is quite a bit cheaper compared to other solutions."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"The pricing for Qualys Cybersecurity Asset Management is reasonable, with an annual subscription costing around $1,000 per year or a monthly subscription starting at approximately $72 per month, depending on the specific package and features included."
"Qualys offers excellent value for money."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"The pricing for Qualys CSAM is nominal."
"Though the solution is considered expensive, if bundled with other services such as VMDR or cloud agents, its value would significantly increase. It is currently a bit costly, but with bundling, it could become attractive to more customers."
"The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution."
"The cost for Qualys CyberSecurity Asset Management is high."
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Government
10%
Computer Software Company
9%
University
8%
Computer Software Company
18%
Financial Services Firm
14%
Government
9%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Axonius?
Axonius is somewhat costly and has a price above average. It provides great value, but obtaining significant discounts can be challenging. As the tools are unique, they have limited direct competit...
What needs improvement with Axonius?
Axonius could improve by increasing their integrations with more technology vendors. There are cases where Axonius doesn't have full compatibility with some newer solutions that have recently appea...
What is your primary use case for Axonius?
The general use case for Axonius ( /products/axonius-reviews ) is cybersecurity asset management. My company, an IT solution provider, works with Axonius ( /products/axonius-reviews ) to offer both...
What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management?
The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution.
What needs improvement with Qualys CyberSecurity Asset Management?
Qualys CyberSecurity Asset Management helps us prioritize assets according to operating system, kernel version, installed software, and current version information. The ASM assists with attack surf...
What is your primary use case for Qualys CyberSecurity Asset Management?
We are using Qualys CyberSecurity Asset Management for daily activities such as identifying new assets through network scanning and agent-based scanning for newly provisioned assets. When any new a...
 

Overview

 

Sample Customers

Extreme Engineering Solutions, AppsFlyer, Landmark Health, Natera
Information Not Available
Find out what your peers are saying about Axonius vs. Qualys CyberSecurity Asset Management and other solutions. Updated: June 2025.
860,168 professionals have used our research since 2012.