My main reasons to use Qualys Enterprise TruRisk Platform were vulnerability severity assessment for assets like server endpoints and cloud resources. We utilized it for asset scores, vulnerability scores, overall enterprise risk, security perimeter analysis, and zero-trust implementation.
Mediation Specialist III at a tech vendor with 201-500 employees
Real User
Top 20
Sep 26, 2025
I basically use Qualys Enterprise TruRisk Platform to scan my internal networks and the URLs we work on. These two are the test cases, and then we scan the clusters. If we have an IP hosted on the Kubernetes clusters, we just pick that IP address and scan it for vulnerabilities. That is one use case from that scanner. When we have an IP range from 0 to 32 in the ports, we try to scan it from there. If one IP has multiple applications, we try to scan it on that particular part where it is hosted as an external network and it scans all those things along with the web applications. It's a SAST thing which we do.
We are using Qualys Enterprise TruRisk Platform ( /products/qualys-enterprise-trurisk-platform-reviews ) for scanning both Windows and Linux environments. We produce reports for vulnerability management. The main focus is on vulnerability scanning.
I am using all the modules on Qualys. It is a vulnerability and risk management platform. Additionally, we are using it for quality compliance. Currently, we are managing overall projects and supporting some initiatives. We access the check systems for this purpose. While Tenable sometimes misses vulnerabilities, Qualys consistently identifies potential vulnerabilities.
Learn what your peers think about Qualys Enterprise TruRisk Platform. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
Qualys TruRisk Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors. Qualys TruRisk Platform automatically gathers and analyzes IT, security, and compliance data in a scalable, state-of-the-art backend. Provisioning any of Qualys’ natively integrated security and compliance apps - twenty and counting - is as easy as checking a box.
My main reasons to use Qualys Enterprise TruRisk Platform were vulnerability severity assessment for assets like server endpoints and cloud resources. We utilized it for asset scores, vulnerability scores, overall enterprise risk, security perimeter analysis, and zero-trust implementation.
I basically use Qualys Enterprise TruRisk Platform to scan my internal networks and the URLs we work on. These two are the test cases, and then we scan the clusters. If we have an IP hosted on the Kubernetes clusters, we just pick that IP address and scan it for vulnerabilities. That is one use case from that scanner. When we have an IP range from 0 to 32 in the ports, we try to scan it from there. If one IP has multiple applications, we try to scan it on that particular part where it is hosted as an external network and it scans all those things along with the web applications. It's a SAST thing which we do.
We are using Qualys Enterprise TruRisk Platform ( /products/qualys-enterprise-trurisk-platform-reviews ) for scanning both Windows and Linux environments. We produce reports for vulnerability management. The main focus is on vulnerability scanning.
I am using all the modules on Qualys. It is a vulnerability and risk management platform. Additionally, we are using it for quality compliance. Currently, we are managing overall projects and supporting some initiatives. We access the check systems for this purpose. While Tenable sometimes misses vulnerabilities, Qualys consistently identifies potential vulnerabilities.