Datadog and Qualys TotalCloud compete in the monitoring and security space. Datadog seems to have the upper hand with its robust set of features and ease of integration, making it preferred for straightforward deployments, while Qualys TotalCloud shines in offering comprehensive cloud security and compliance options.
Features: Datadog offers extensive monitoring capabilities with easily integratable APIs, sharable dashboards, Slack integration, alert systems, and anomaly detection. These features make it a powerful tool for operational efficiency. Qualys TotalCloud focuses on cloud security posture management, offering cloud-native infrastructure with zero-touch features and powerful integration capabilities.
Room for Improvement: Datadog users highlight the need for better control over dashboard sharing, enhanced querying capabilities, and improved metric customization. For Qualys TotalCloud, users seek better scanning capabilities for niche devices and non-Windows systems, along with an improved dashboard interface for easier navigation.
Ease of Deployment and Customer Service: Datadog is praised for its intuitive deployment process in public and hybrid cloud environments, though customer service reviews are mixed regarding responsiveness. Qualys TotalCloud is noted for its strong support infrastructure and consistent high ratings in customer service, supporting a variety of cloud environments for flexible deployment options.
Pricing and ROI: Datadog's pricing is seen as high, especially as usage scales, but it provides a high ROI through time savings and operational efficiency. Qualys TotalCloud, though perceived as expensive, offers competitive pricing given its comprehensive feature set, aligning with its premium offerings and ensuring value in security and compliance.
It has saved about 90% of our time.
TotalCloud has generated overall savings of 30 to 40 percent across various departments.
CallStream helps us integrate and automate tasks.
They are helpful, respond to my queries, and can answer any question.
Qualys's tech support is highly responsive, providing multiple ways to interact with them.
Qualys' customer service provides quality answers, but the response time is long, even though it is within the SLA.
We started our organization about nine months back. We started with about 30 users, and we now have more than 100 users.
Our organization currently uses it to manage over 1200 web applications.
It is absolutely scalable, and I would rate its scalability as nine out of ten.
Overall, the support provided has been excellent.
It is a stable solution, which is why we chose it.
Continuous monitoring is crucial to ensure system stability and avoid vulnerabilities or threats.
The documentation is adequate, but team members coming into a project could benefit from more guided, interactive tutorials, ideally leveraging real-world data.
In future updates, I would like to see AI features included in Datadog for monitoring AI spend and usage to make the product more versatile and appealing for the customer.
There should be a clearer view of the expenses.
Ideally, the scanner should automatically detect and scan all subdomains, even if not explicitly defined, ensuring comprehensive vulnerability assessment.
Ideally, updates should be more immediate, enabling quicker implementation of solutions.
Our goal is to integrate all these functions into Qualys, creating a single dashboard for comprehensive security monitoring and management.
The setup cost for Datadog is more than $100.
Qualys TotalCloud's pricing is currently acceptable, it is becoming increasingly expensive.
Pricing is managed by our finance team; however, Qualys TotalCloud offers cost-effective licensing flexibility.
Qualys TotalCloud is expensive, but it offers a premier solution with no headaches.
Our architecture is written in several languages, and one area where Datadog particularly shines is in providing first-class support for a multitude of programming languages.
The technology itself is generally very useful.
This view of risk helps reduce the work we would have to do to combine multiple sources to prioritize risk.
It will help cybersecurity professionals monitor the cloud and find vulnerabilities.
We are enjoying the new feature, FlexScan, which is valuable for Internet-facing VMs.
Datadog is a comprehensive cloud monitoring platform designed to track performance, availability, and log aggregation for cloud resources like AWS, ECS, and Kubernetes. It offers robust tools for creating dashboards, observing user behavior, alerting, telemetry, security monitoring, and synthetic testing.
Datadog supports full observability across cloud providers and environments, enabling troubleshooting, error detection, and performance analysis to maintain system reliability. It offers detailed visualization of servers, integrates seamlessly with cloud providers like AWS, and provides powerful out-of-the-box dashboards and log analytics. Despite its strengths, users often note the need for better integration with other solutions and improved application-level insights. Common challenges include a complex pricing model, setup difficulties, and navigation issues. Users frequently mention the need for clearer documentation, faster loading times, enhanced error traceability, and better log management.
What are the key features of Datadog?
What benefits and ROI should users look for in reviews?
Datadog is implemented across different industries, from tech companies monitoring cloud applications to finance sectors ensuring transactional systems' performance. E-commerce platforms use Datadog to track and visualize user behavior and system health, while healthcare organizations utilize it for maintaining secure, compliant environments. Every implementation assists teams in customizing monitoring solutions specific to their industry's requirements.
TotalCloud is the Qualys approach to Cloud Native Application Protection Platform (CNAPP) for cloud infrastructure and SaaS environments. With TotalCloud, customers extend TruRisk insights (transparent cyber risk scoring methodology) from the Qualys Enterprise TruRisk Platform to their cloud environments allowing for a seamless unified view of cyber risk across on-prem, hybrid, and multi-cloud environments.
Features and capabilities of Qualys TotalCloud include, but are not limited to:
Discover: Complete visibility and insights into cyber-risk exposure across multi-cloud. Continuously discover and monitor all your workloads across a multi-cloud environment for a 360-degree view of your cloud footprint. Identify known and previously unknown internet-facing assets for 100% visibility and tracking of risks.
Assess: Comprehensive cloud-native assessments with FlexScanTM. Extensive scanning capabilities with Qualys FlexScan, including no-touch, agentless, API- and snapshot-based scanning, along with agent- and network-based scanning for in-depth assessment. Use these multiple scanning methods to scan a workload to get a unified and comprehensive view of vulnerabilities and misconfigurations.
Prioritize: Unified security view to prioritize cloud risk with TruRiskTM. Experience a unified risk-based view of cloud security with insights across workloads, services, and resources. Qualys TruRisk quantifies security risk by workload criticality and vulnerabilities; it correlates with ransomware, malware, and exploitation threat intelligence to prioritize, trace, and reduce risk.
Defend: Real-time protection against evolving and unknown threats with InstaProtectTM. Qualys enables continuous monitoring of all cloud assets to ensure they are protected against threats and attacks at runtime. Qualys keeps your cloud runtime safe by detecting known and unknown threats across the entire kill chain in near real-time across a multi-cloud environment.
Remediate: Fast remediation with QFlow – no code, drag-and-drop workflows. The integration of QFlow technology into Qualys TotalCloud saves security and DevOps teams valuable time and resources. Automation and no-code, drag-and-drop workflows help simplify the time-consuming operational tasks of assessing vulnerabilities on ephemeral cloud assets, alerting on high-priority threats, remediating misconfigurations, and quarantining high-risk assets.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.