No more typing reviews! Try our Samantha, our new voice AI agent.

Qualys Web Application Scanning vs Seeker Interactive comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Qualys Web Application Scan...
Average Rating
7.6
Reviews Sentiment
6.3
Number of Reviews
40
Ranking in other categories
Application Security Tools (15th), Static Application Security Testing (SAST) (13th)
Seeker Interactive
Average Rating
7.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
Internet Security (15th), Mobile Threat Defense (14th), API Security (16th)
 

Mindshare comparison

Qualys Web Application Scanning and Seeker Interactive aren’t in the same category and serve different purposes. Qualys Web Application Scanning is designed for Application Security Tools and holds a mindshare of 1.8%, down 1.9% compared to last year.
Seeker Interactive, on the other hand, focuses on Internet Security, holds 1.1% mindshare, up 0.0% since last year.
Application Security Tools Mindshare Distribution
ProductMindshare (%)
Qualys Web Application Scanning1.8%
SonarQube16.3%
Checkmarx One9.9%
Other72.0%
Application Security Tools
Internet Security Mindshare Distribution
ProductMindshare (%)
Seeker Interactive1.1%
Cisco Umbrella30.0%
Zscaler Internet Access28.8%
Other40.099999999999994%
Internet Security
 

Featured Reviews

AnkitSharma13 - PeerSpot reviewer
Security Officer at a tech vendor with 10,001+ employees
Web scanning needs improvement but offers good vulnerability detection
The downside of Qualys Web Application Scanning is that it cannot crawl automatically. If I provide an IP address and a login form, it does basic testing, but it doesn't go deep as IBM AppScan does. If Qualys Web Application Scanning could improve its crawling capability, it would be more user-friendly. Qualys Web Application Scanning does IP-level testing, requiring direct input of credentials, and can only scan a few pages to provide known generic vulnerabilities, which isn't as beneficial from my point of view. The Vulnerability Management also relies heavily on version numbers and will flag vulnerabilities based on the component version, but it doesn't check if a real fix exists, leading to flags on components that actually have workarounds available.
San K - PeerSpot reviewer
Senior Group Leader at Infosys
More effective than dynamic scanners, but is missing useful learning capabilities
One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need. The purposes for which applications are designed may differ in practice in the industry, and because of this, there will always be tools that sometimes report false positives. Thus, there should be some means with which I can customize the way that Seeker learns about our applications, possibly by using some kind of AI / ML capability within the tool that will automatically reduce the number of false positives that we get as we use the tool over time. Obviously, when we first start using the scanning tool there will be false positives, but as it keeps going and as I keep using the tool, there should be a period of time where either the application can learn how to ignore false positives, or I can customize it do so. Adding this type of functionality would definitely prevent future issues when it comes to reporting false positives, and this is a key area that we have already asked the vendor to improve on, in general. On a different note, there is one feature that isn't completely available right now where you can integrate Seeker with an open-source vulnerability scanner or composition analysis tool such as Black Duck. I would very much like this capability to be available to us out-of-the-box, so that we can easily integrate with tools like Black Duck in such a way that any open source components that are used in the front-end are easily identified. I think this would be a huge plus for Seeker. Another feature within Seeker which could benefit from improvement is active verification, which lets you actively verify a vulnerability. This feature currently doesn't work in certain applications, particularly in scenarios where you have requested tokens. When we bought the tool, we didn't realize this and we were not told about it by the vendor, so initially it was a big challenge for us to overcome it and properly begin our deployment.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is easy to use."
"We can do scanning and submit reports straight to the customers when there are new vulnerabilities, then tell them whether they are affected or not."
"Key features include: Cloud-based, so the installation is not so tedious. Easily deployed. Highly scalable. Comprehensive reporting."
"With our vulnerabilities under control, it's putting our services in compliance and minimizing our risk for exposure."
"It protects against zero-day vulnerabilities, like Heartbleed."
"Qualys WAS' most valuable features are the navigation flow of the UI and the option for a different layer of security (identification and operation through email and mobile)."
"The most valuable feature of Qualys Web Application Scanning is the effective scanning that can be done."
"It scans web applications to identify vulnerabilities during deployment."
"A significant advantage of Seeker is that it is an interactive scanner, and we have found it to be much more effective in reducing the amount of false positives than dynamic scanners such as AppScan, Micro Focus Fortify, etc., and furthermore, with Seeker, we are finding more and more valid (i.e. "true") positives over time compared with the dynamic scanners."
"A significant advantage of Seeker is that it is an interactive scanner, and we have found it to be much more effective in reducing the amount of false positives than dynamic scanners such as AppScan, Micro Focus Fortify, etc. Furthermore, with Seeker, we are finding more and more valid (i.e. "true") positives over time compared with the dynamic scanners."
 

Cons

"I have experience with adaptive scanning for single-page applications, which was not very effective."
"We are researching open source software because Qualys needs to improve their reports and the documentation for the end-users in resolving scanned issues."
"I would like it to be cheaper because it is a bit expensive compared to competitors like Tenable Nessus."
"The licensing and user permissions are a little wonky for a DevOps team to use, probably because it’s traditionally an InfoSec tool."
"We procured around 110 licenses for Web Application Scanning, but we have issues running concurrent scans."
"In certain cases, this product does have false positives, which the company should work on."
"It should have better automatic reporting."
"The product's pricing could be better."
"One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need."
"All in all, the enterprise server installation is very easy and straightforward, but with the agent installation you might face problems up to 50% of the time for a variety of reasons, depending on what type of application is involved, the type of deployment used, and so on."
 

Pricing and Cost Advice

"From my perspective, it is a budget-friendly option."
"Try the free trial of the product to understand the basic working mechanisms.​"
"​It is best to be an institutional buyer and directly contact the sales team, as they can provide over-the-top discounts for bulk orders​."
"Qualys WAS' pricing is competitive."
"It is an expensive platform."
"Pricing was reasonable and competitive. It was not too far above the other products."
"There are different options available with respect to licensing."
"The product pricing is fair and reasonably priced."
"The licensing for Seeker is user-based and for 50 users I believe it costs about $70,000 per year."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
885,376 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
12%
Computer Software Company
9%
Comms Service Provider
6%
Financial Services Firm
22%
Government
16%
Comms Service Provider
9%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise6
Large Enterprise27
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Qualys Web Application Scanning?
Regarding pricing, I think for personal use, it is costly, but if organizations are ready to pay, then it is fine as they are using it.
What needs improvement with Qualys Web Application Scanning?
The downside of Qualys Web Application Scanning is that it cannot crawl automatically. If I provide an IP address and a login form, it does basic testing, but it doesn't go deep as IBM AppScan does...
What is your primary use case for Qualys Web Application Scanning?
I use Qualys Web Application Scanning, and we are using Vulnerability Management. By Vulnerability Management, I mean not TotalCloud; they have some on-premises solutions also. Patch Management and...
Ask a question
Earn 20 points
 

Also Known As

Qualys WAS
No data available
 

Overview

 

Sample Customers

BskyB, Cartagena, ClearPoint Learning Systems, Connect Group, du, Fortrex Technologies, HBOR, HDI, Highlights for Children, The Lithuanian State Enterprise Centre of Registers, City of Miami Beach, Microsoft, MidlandHR, MSCI Inc., Northern Arizona University, Ofgem, Olympus Europa, PhoneFactor, RTL Nederland, ThousandEyes, VGZ Organisatie B.V.
El Al Airlines and Société Française du Radiotelephone
Find out what your peers are saying about SonarSource Sàrl, Checkmarx, Veracode and others in Application Security Tools. Updated: February 2026.
885,376 professionals have used our research since 2012.