

Tenable Security Center and Qualys CyberSecurity Asset Management compete in the cybersecurity domain. Tenable leads in vulnerability management due to its superior scanning capabilities, whereas Qualys stands out in asset management, providing comprehensive security insights across environments.
Features: Tenable Security Center benefits from Nessus technology for asset discovery and vulnerability prioritization. Its dashboards and reporting are noteworthy, offering in-depth visibility into the vulnerability profile. Qualys CyberSecurity Asset Management allows real-time asset visibility, advanced tagging features, and robust system integration.
Room for Improvement: Tenable Security Center could improve its reporting configurability and tool integration, as creating custom reports can be challenging. For Qualys, enhancements in user interface intuitiveness and dynamic tagging are desired, along with improvements in its EASM module for scan scheduling.
Ease of Deployment and Customer Service: Tenable Security Center is typically deployed on-premises with mixed reviews on tech support responsiveness. Qualys offers both cloud and on-premises deployment options and is generally praised for its customer service, though premium support may incur additional costs.
Pricing and ROI: Tenable Security Center is seen as expensive compared to competitors like Rapid7, but its extensive feature set offers a good return on investment through reduced manual efforts and risk mitigation. On the other hand, while Qualys is also considered pricey, it provides good value in asset management and vulnerability detection, enhancing security posture and operational efficiency.
Improvements to our security infrastructure contributed to overall business growth of approximately 150 percent over the past year.
By automating tasks, it significantly reduces the human resources required, leading to increased efficiency and productivity.
It has reduced the number of development and scripting hours along with maintenance hours.
If we cannot adjust how to operate the solution, then it becomes very difficult, so hearing and initial tuning are very important.
Through the use of Tenable Security Center, my clients achieve more efficient patching and gain visibility and understanding of security operations, leading to improved resilience and infrastructure insight.
The support team was knowledgeable and offered a variety of quick resolution options.
Their SMEs have sufficient knowledge, and if they are not the right contact, they quickly redirect us to someone who can help resolve issues.
I would rate their customer support a ten out of ten.
Longer response times and less thorough assistance.
They are helpful and were very helpful to us, coordinating with us on several issues.
We have about 300,000 assets installed with agents worldwide.
The scalability is excellent as we manage more than one hundred thousand assets, including over one hundred thousand endpoints, approximately 2,600 servers, and more than 1,200 network devices.
Qualys Cybersecurity Asset Management has proven to be a highly scalable solution for us over the past couple of years.
I can scale it extensively with the use of agents, allowing scanning in restrictive environments and loosely connected devices.
Scalability is a bit limited with Tenable Security Center.
I would rate the stability of Qualys CSAM a ten out of ten.
The product stability has notably declined over the last two months, and the performance to fulfill a page request is very slow compared to its previous performance.
They are constantly adding capabilities.
The stability of the solution is outstanding.
Qualys is currently not able to identify assets lacking DNS information.
Features enhancing the interaction with IT or security teams should be added, such as a ticketing feature that, if an issue arises in the CSAM module, enables direct ticket creation in systems like ServiceNow.
If there's one key aspect to focus on, it's discovery—the ability to identify assets that you are not aware of, even when you can see they are present.
It's important for Tenable to catch up on testing capabilities that are present in solutions like Qualys.
The reports and plugins for reports and scans could benefit from enhancements.
Translating reports into European languages is especially relevant in Central Eastern Europe, where clients often require reports in local languages.
A cost-effective solution.
I believe that the stability and reliability of Qualys offer great value for the money.
A monthly subscription starting at approximately $72 per month, depending on the specific package and features included.
The product is somewhat pricey, reflecting its valuable features and status as a high-quality solution in the vulnerability management market.
Tenable Security Center is quite expensive, particularly for the CEE region, causing us to lose cases due to its pricing.
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
By correlating this with QDS scores, we can accurately assess the risk level of high or low QDS scores associated with each asset and monitor them accordingly.
The most valuable feature is the real-time visibility Qualys CyberSecurity Asset Management provides into all assets across our development and operational environments.
It also performs scans to identify any vulnerabilities, which helps to take proactive measures before those vulnerabilities are identified by any attacker.
We obtained good reports showing when patches were closed and the details of each patch, including who executed it and everything related to the patching process until it was closed.
Tenable Security Center provides an overall score of vulnerabilities, comparing an organization with others in the same industry.
The most effective feature of Tenable Security Center for detecting vulnerabilities is its capability for critical mapping.
| Product | Mindshare (%) |
|---|---|
| Tenable Security Center | 3.1% |
| Qualys CyberSecurity Asset Management | 1.4% |
| Other | 95.5% |

| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 2 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 10 |
| Large Enterprise | 27 |
Qualys CyberSecurity Asset Management provides key features including asset inventory management, end-of-life tracking, dynamic tagging, and integration with CMDB, offering extensive visibility and support for proactive threat response.
Qualys offers comprehensive visibility across hardware and software assets, aiding in tracking unauthorized applications and facilitating automated vulnerability remediation. Its user-friendly interface and dynamic risk scoring enhance security posture management. Users leverage it for vulnerability management and compliance, benefiting from real-time risk identification and efficient operations in cloud and on-premises environments.
What are the key features of Qualys CyberSecurity Asset Management?Cybersecurity teams in various industries, such as financial services, healthcare, and manufacturing, utilize Qualys to manage technical debt through end-of-life tracking and facilitate robust patch management. It supports compliance and visibility initiatives, essential for maintaining data integrity and operational security in dynamic environments.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.