"This is one of the best products I have worked with so far. I like the power of Qualys, and it's a better solution because you can scan a compact file, a BIT file, or batch files. The product already knows what's happening inside, and you don't need to expand the package. Tenable will do the same thing, but you need to have a package issuance claim. With Qualys, we can immediately understand the file, even a compact file. If there's some kind of discovery or incident, you will know what happened in the environment."
"This solution is very easy to use and easy to install."
"It's easy to use. It's fast, it's a powerful easy to access tool."
"I have been in contact with technical support and they are not bad."
"The most important aspect of the solution is that it rarely gives false positives, especially compared to other products. It provides very clear reports for our IT teams to look at."
"The most valuable feature is the site scanning, where we can provide a complete subnet and what it is we need to scan on those devices."
"The main functionality of identifying item endpoints that weren't properly patched or had vulnerabilities is the solution's most valuable feature."
"When you connect any new device to the network, Rapid7 has the ability to detect the new device immediately. It can scan that device to detect if it has any vulnerability. It tells you what is vulnerable and what has been misconfigured. It also tells you what is the risk of that misconfiguration or lack of patches and how to resolve the problem."
"The performance is good."
"Integration could be better. When you think about scanning, it's not used just with this product alone but with other Qualys products. If you think about the bundle, the product itself is good. But integration with other products and packages has space for improvement. They should also offer a better price for bundles."
"The reporting has room for improvement. You cannot customize any report. If I need a specific requirement, I have to create a new report for it."
"The solution could improve by being more secure."
"The reporting is very bad when you compare it with other vulnerability assessment tools."
"I would like to see more integration."
"There are end-user needs and expectations that are being overlooked in the development that could be addressed by appointing a customer advisory board."
"The integration with other solutions like JIRA could be better. Perhaps there could be some additional updates in the next phase that could integrate with it, so then you can proceed with the VT much easier."
"There needs to be much clearer instructions surrounding scanning."
Qualys Virtual Scanner Appliance supports the same global scanning capabilities as our physical scanner appliance. The virtual scanner appliance is a stateless, disposable resource which acts as an extension of the Qualys Cloud Platform and is not a separately managed entity. This user guide describes how to get started with using a virtual scanner with your virtualization or cloud platform.
Rapid7 InsightVM is the vulnerability assessment tool built for the modern web. InsightVM combines complete ecosystem visibility, an unparalleled understanding of the attacker mindset, and the agility of SecOps so you can act before impact.
Qualys Virtual Scanner Appliance is ranked 20th in Vulnerability Management with 1 review while Rapid7 InsightVM is ranked 2nd in Vulnerability Management with 19 reviews. Qualys Virtual Scanner Appliance is rated 9.0, while Rapid7 InsightVM is rated 8.0. The top reviewer of Qualys Virtual Scanner Appliance writes "A powerful virtual scanner appliance that scans batch files, BIT files, and compact files". On the other hand, the top reviewer of Rapid7 InsightVM writes "Broad capabilities make this scanning solution able to cover a lot of ground". Qualys Virtual Scanner Appliance is most compared with Microsoft Intune, Qualys VM, Kenna.VM, Tenable Nessus and IronNet IronDefense, whereas Rapid7 InsightVM is most compared with Tenable Nessus, Qualys VM, Tenable SC, Tenable.io Vulnerability Management and Varonis Datalert.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.