Microsoft Configuration Manager and Qualys CyberSecurity Asset Management compete in network and asset management. Microsoft Configuration Manager is advantageous in deployment and patching efficiency, while Qualys excels in asset discovery and vulnerability management.
Features: Microsoft Configuration Manager is equipped with comprehensive software, application deployment, and patch management capabilities, ensuring network configuration and compliance. It also offers detailed reporting, automation features, and supports device management. Qualys CyberSecurity Asset Management provides asset discovery and management capabilities with dynamic tagging, advanced scanning, and real-time risk assessment, enhancing visibility into both software and hardware vulnerabilities.
Room for Improvement: Microsoft Configuration Manager needs better integration with non-Microsoft products, improved automation and reporting, a more intuitive UI, and efficient resource usage. Enhanced cloud integration is also required. Qualys CSAM can benefit from more robust customization for reporting and tagging, improved third-party tool integration, reduced CPU usage, and a more user-friendly interface.
Ease of Deployment and Customer Service: Microsoft Configuration Manager offers varied deployment options ideal for on-premises infrastructures, though it often requires extensive technical support. Qualys provides flexibility with hybrid and cloud deployment options, which suits modern cloud-first strategies, albeit with some deployment challenges. Both have similar customer service feedback; Microsoft provides extensive community resources while Qualys offers support aligned with its pricing.
Pricing and ROI: Microsoft Configuration Manager involves a high initial investment with complex licensing, but offers positive ROI through efficiency gains. Qualys CyberSecurity Asset Management is expensive as a VMDR add-on, but its robust features justify the cost by enhancing security posture and providing substantial returns in enterprise environments.
Improvements to our security infrastructure contributed to overall business growth of approximately 150 percent over the past year.
By automating tasks, it significantly reduces the human resources required, leading to increased efficiency and productivity.
It has reduced the number of development and scripting hours along with maintenance hours.
The support team was knowledgeable and offered a variety of quick resolution options.
Their SMEs have sufficient knowledge, and if they are not the right contact, they quickly redirect us to someone who can help resolve issues.
I would rate their customer support a ten out of ten.
The product is suitable for our size, handling 800 devices.
We have about 300,000 assets installed with agents worldwide.
The scalability is excellent as we manage more than one hundred thousand assets, including over one hundred thousand endpoints, approximately 2,600 servers, and more than 1,200 network devices.
Qualys Cybersecurity Asset Management has proven to be a highly scalable solution for us over the past couple of years.
There were misconfigurations by our team rather than issues with the product itself.
I would rate the stability of Qualys CSAM a ten out of ten.
They are constantly adding capabilities.
This platform demonstrates excellent stability with consistent 100 percent uptime and no glitches observed.
Qualys is currently not able to identify assets lacking DNS information.
Features enhancing the interaction with IT or security teams should be added, such as a ticketing feature that, if an issue arises in the CSAM module, enables direct ticket creation in systems like ServiceNow.
We would prefer more options, such as 'approved only for pilot' or 'approved for this line of business,' allowing for better granularity in categorizing software.
The setup cost is considered sufficient.
A cost-effective solution.
A monthly subscription starting at approximately $72 per month, depending on the specific package and features included.
Though the solution is considered expensive, if bundled with other services such as VMDR or cloud agents, its value would significantly increase.
The product valuable for deployment recovery.
By correlating this with QDS scores, we can accurately assess the risk level of high or low QDS scores associated with each asset and monitor them accordingly.
The most valuable feature is the real-time visibility Qualys CyberSecurity Asset Management provides into all assets across our development and operational environments.
It also performs scans to identify any vulnerabilities, which helps to take proactive measures before those vulnerabilities are identified by any attacker.
Microsoft Configuration Manager streamlines IT management with features such as software deployment, patch management, and automation, centralizing operations for Windows environments. Integration with Microsoft products allows efficient oversight of workstations and servers.
Microsoft Configuration Manager provides comprehensive IT management, offering software deployment, patch management, and application pushing. Automation reduces manual tasks, ensuring consistency across systems. Centralized management enables standardized OS deployments, application updates, and configuration integrity. Integration with Microsoft products facilitates seamless operations, while hardware and software inventory, compliance reporting, and remote control functions enhance IT management. Users seek improvements in application deployment for those without deep scripting knowledge and desire better WSUS control, PowerShell and Intune integration, Linux compatibility, and user interface enhancements. Performance improvements are requested for remote user management and third-party application support.
What features enhance Microsoft Configuration Manager?Microsoft Configuration Manager is widely implemented in organizations to manage Windows workstations and servers. It is essential for deploying operating systems and applications, managing software updates, and conducting hardware and software inventories. The tool is crucial for endpoint and configuration management, ensuring compliance, and automating processes like patching and vulnerability management. Industries such as finance, healthcare, and education rely on Microsoft Configuration Manager to keep systems secure and operational, adapting it to address their specific needs and challenges in maintaining diversified IT environments.
Qualys CyberSecurity Asset Management provides advanced real-time asset visibility, dynamic tagging, and External Attack Surface Management. It streamlines asset discovery and management using cloud agents and IP-based scanning, enhancing risk management and software lifecycle tracking.
Qualys CyberSecurity Asset Management offers a comprehensive solution for managing asset inventories and tracking software lifecycle states. It facilitates network visibility and supports zero-day vulnerability solutions, enhancing security posture through efficient monitoring. Users benefit from its cloud-based interface, which provides in-depth asset configurations and insights. Key features include automated vulnerability scanning and unauthorized software management, reducing manual efforts. The platform also emphasizes the importance of timely remediation and ongoing risk mitigation across multiple environments. Despite its strengths, users note the need for enhanced integration with additional CMDBs beyond ServiceNow, as well as cost efficiency improvements. Requests also include better report customization, more scan control, and a simplified UI.
What are the key features of Qualys CyberSecurity Asset Management?In industries like finance, healthcare, and manufacturing, Qualys CyberSecurity Asset Management enhances asset control by offering visibility into hardware and software configurations. It aids in maintaining security compliance and identifying unauthorized software, crucial for sectors with strict regulatory requirements.
We monitor all Patch Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.