We performed a comparison between Qualys VM and Tripwire IP360 based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Earn 20 points
We’re on a mission to help organizations effectively reduce risks in their Cloud and Kubernetes environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights that don't waste time.
Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and development teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches.
Qualys Vulnerability Management (VM) is a cloud-based service that gives you immediate, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps you to continuously identify threats and monitor unexpected changes in your network before they turn into breaches.
Tripwire IP360 delivers risk-based vulnerability assessment and asset discovery capabilities. With IP360, you get:
Qualys VM is ranked 3rd in Vulnerability Management with 26 reviews while Tripwire IP360 is ranked 22nd in Vulnerability Management. Qualys VM is rated 8.2, while Tripwire IP360 is rated 0.0. The top reviewer of Qualys VM writes "Excellent continuous monitoring, helpful technical support, easy to scale, and simple to install". On the other hand, Qualys VM is most compared with Tenable Nessus, Tenable.sc, Microsoft Defender for Cloud Apps, Rapid7 InsightVM and Tenable.io Vulnerability Management, whereas Tripwire IP360 is most compared with Tenable Nessus, Tenable.sc, Veracode, SonarQube and Trend Micro Deep Security.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.