

Docker and Qualys CyberSecurity Asset Management are solutions in the tech space focused on deployment and security management. Docker holds an advantage with its affordability and flexibility, benefiting users seeking cost efficiency, while Qualys provides comprehensive security and asset management essential for enterprises.
Features: Docker provides functionalities such as portability, ease of integration with technologies, and a model that ensures consistent environments across platforms. With advanced vulnerability detections, Qualys excels in managing IT assets and offering detailed inventories, though users find its integration challenging.
Room for Improvement: Docker could benefit from better security reports, enhanced documentation, and support for Windows environments. Qualys users request improved third-party integration, user interfaces, and reduced costs seen as restrictive for smaller organizations.
Ease of Deployment and Customer Service: Docker is easily deployable across environments and enjoys strong community support, despite desires for improved official support. Qualys offers the same deployment models but users face complex initial setups and call for better support services.
Pricing and ROI: Docker's open-source nature provides cost-effectiveness, with significant ROI upfront for streamlined processes. Qualys, though considered costly as an additional service, delivers good ROI in robust asset management and security tracking, with pricing suitable for larger setups but less so for smaller enterprises.
I can do containerization and share it with every computer, making it work for everyone.
Improvements to our security infrastructure contributed to overall business growth of approximately 150 percent over the past year.
By automating tasks, it significantly reduces the human resources required, leading to increased efficiency and productivity.
It has reduced the number of development and scripting hours along with maintenance hours.
From what I gather, customer support is great; they are quick and always available to support or help.
The support team was knowledgeable and offered a variety of quick resolution options.
Their SMEs have sufficient knowledge, and if they are not the right contact, they quickly redirect us to someone who can help resolve issues.
I would rate their customer support a ten out of ten.
Previously, only one or two applications could run on a server, but now it can handle hundreds of applications, scaling up or down as needed.
A realistic metric I observe is that I can scale services from two to over 20 containers without code changes.
We have about 300,000 assets installed with agents worldwide.
The scalability is excellent as we manage more than one hundred thousand assets, including over one hundred thousand endpoints, approximately 2,600 servers, and more than 1,200 network devices.
Qualys Cybersecurity Asset Management has proven to be a highly scalable solution for us over the past couple of years.
Docker has been very stable in my environment, especially once best practices and proper organization were in place.
I would rate the stability of Qualys CSAM a ten out of ten.
The product stability has notably declined over the last two months, and the performance to fulfill a page request is very slow compared to its previous performance.
They are constantly adding capabilities.
Docker is a time-tested, proven solution with industry-wide applications.
Windows containers are heavier and slower than Linux containers.
In terms of communication between services, perhaps the configuration within networks between containers could be improved.
Qualys is currently not able to identify assets lacking DNS information.
Features enhancing the interaction with IT or security teams should be added, such as a ticketing feature that, if an issue arises in the CSAM module, enables direct ticket creation in systems like ServiceNow.
If there's one key aspect to focus on, it's discovery—the ability to identify assets that you are not aware of, even when you can see they are present.
Docker Desktop is free for individual developers and small teams, but a paid subscription is required for large enterprises.
I consider Docker's pricing to be affordable.
A cost-effective solution.
I believe that the stability and reliability of Qualys offer great value for the money.
A monthly subscription starting at approximately $72 per month, depending on the specific package and features included.
It allows the software to run on various machines without compatibility issues, saving a lot of time.
Good security capabilities are included as well, providing image scanning, non-root containers, and minimal base images that reduce the attack surface.
The most valuable feature is the simple containerization.
By correlating this with QDS scores, we can accurately assess the risk level of high or low QDS scores associated with each asset and monitor them accordingly.
The most valuable feature is the real-time visibility Qualys CyberSecurity Asset Management provides into all assets across our development and operational environments.
It also performs scans to identify any vulnerabilities, which helps to take proactive measures before those vulnerabilities are identified by any attacker.
| Product | Market Share (%) |
|---|---|
| Docker | 5.0% |
| Qualys CyberSecurity Asset Management | 2.4% |
| Other | 92.6% |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 4 |
| Large Enterprise | 35 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 2 |
| Large Enterprise | 23 |
Docker provides a robust containerization platform, enabling identical environments across machines. With features like portability, fast deployment, and minimal resource consumption, Docker supports development, facilitating multitier architectures and integrating seamlessly with Kubernetes.
Docker offers an advanced containerization solution that enhances application management through automation and security measures. By isolating environments and managing dependencies, Docker supports platforms for scalable application development. Its integration with orchestration tools like Kubernetes and independence from host operating systems enable developers to create lightweight applications effectively. Although known for its cost efficiency and flexibility, Docker could improve in areas such as stability, command-line usability, and Windows performance integration. Users also point out the need for enhanced documentation, simplified management tools, and better persistence storage options, along with stronger marketing and easier user adoption.
What important features does Docker provide?Industries leverage Docker for application packaging, deploying microservices, and CI/CD processes. It supports DevOps, enhances backend service management, and enables resource-efficient development environments. Docker's compatibility with tools such as Jenkins ensures seamless integration and orchestration in modern IT workflows.
Qualys CyberSecurity Asset Management provides key features including asset inventory management, end-of-life tracking, dynamic tagging, and integration with CMDB, offering extensive visibility and support for proactive threat response.
Qualys offers comprehensive visibility across hardware and software assets, aiding in tracking unauthorized applications and facilitating automated vulnerability remediation. Its user-friendly interface and dynamic risk scoring enhance security posture management. Users leverage it for vulnerability management and compliance, benefiting from real-time risk identification and efficient operations in cloud and on-premises environments.
What are the key features of Qualys CyberSecurity Asset Management?Cybersecurity teams in various industries, such as financial services, healthcare, and manufacturing, utilize Qualys to manage technical debt through end-of-life tracking and facilitate robust patch management. It supports compliance and visibility initiatives, essential for maintaining data integrity and operational security in dynamic environments.
We monitor all Software Supply Chain Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.