Senior Cybersecurity Engineer at 3M Health Information Systems
Real User
Top 10
2023-07-13T18:03:00Z
Jul 13, 2023
We are managing hundreds of AWS and several on-premises accounts using Qualys agents and scanners to provide data inputs for Qualys. We are using several of the Qualys modules, VMDR, Cloud Agents, Connectors along with Global Asset View (GAV). GAV dynamic tagging is valuable for tracking owners of assets. Qualys' main function is to provide us with vulnerability management information for our end users and is a major input to our CMDB. We rely on a combination of agents and scans to provide us with the system data.
Information Security Engineer at a educational organization with 10,001+ employees
Real User
Top 5
2023-06-12T18:29:00Z
Jun 12, 2023
Qualys VMDR is a vulnerability management and detection response tool. It belongs to the first generation of vulnerability assessment tools. It enables us to manually identify vulnerable keys and fix them. It is built as a cutting-edge continuous platform where we can detect and protect. With this product, we can respond to specific vulnerabilities, going beyond just using artificial intelligence features. We have implemented VMDR across our cloud, physical interfaces, endpoints, and log servers. It's a good digital product for our organization.
We use the solution for vulnerability management. It helps us identify potentially vulnerable assets. Thus, we can prioritize patching based on a risk score.
Security Expert at a insurance company with 10,001+ employees
Real User
Top 20
2023-01-05T15:26:43Z
Jan 5, 2023
Qualys VM is used for vulnerability scans for the internet and applications using application exchange. There are many applications. We also use the solution for asset management per team, and the network scan to discover the devices on our network.
This is a virtual scanner appliance. We have both physical and virtual options. I'm still in training and getting the hang of the solution. I do not know what features the company uses the most. They generally use it to scan all the AWS workloads and Azure workloads.
Qualys has many products. However, the prominent one is for scanning the vulnerabilities on endpoints, including servers and desktops. The other can be for using multiple other products, like taking the certificate, inventory, and software inventory of endpoints through scanning. Additionally, we use the solution for web application scanning. When they have web applications, they can scan applications for various vulnerabilities and give recommendations.
Our customers use Qualys for vulnerability management, it's a way for them to discover the kinds of vulnerabilities they have on their systems. We are a partner with Qualys and I'm an infrastructure security consultant. We currently have 20 clients using Qualys.
We use this solution to manage compliance and to verify the gap between the policy defined by the company and the ones that are implemented in the system. We also use Qualys for vulnerability management of assets in the cloud or on-prem.
Information Security Manager at a outsourcing company with 51-200 employees
Real User
Top 20
2022-07-09T00:00:49Z
Jul 9, 2022
We do vulnerability management mostly with the agents and sometimes with the scanner. We use it to install for around 20 or 30 clients right now so that we can remotely monitor their vulnerability status and help them improve their patch management processes. When certain critical things come up, we help clients with the Log4J, identifying where they need to remediate some of the super trendy critical things that come out and identifying end-of-life operating systems and software that need to be updated.
Assistant Manager Solutions at Mutex Systems Pvt. Ltd.
Real User
Top 20
2022-07-06T06:27:43Z
Jul 6, 2022
We're using the entire suite except for Patch Management. I use Qualys VM for my production environment on Amazon AWS. I also use it for my endpoints and some BDI solutions that require on-premise solutions, and I use it for both.
We use bother on-premise and cloud deployments of Qualys VM. For my clients in the cloud, we use a cloud solution, which is a bring your own license model. Additionally, We have our own deployment of Qualys VM. We are using Qualys VM to provide a VM service.
Manager, Info Security Planning & Architecture at a comms service provider with 10,001+ employees
Real User
Top 20
2022-05-05T12:49:37Z
May 5, 2022
I mainly use Qualys VM for vulnerability management to carry out vulnerability scans on IT assets to find out which are vulnerable and what is needed to patch them. We also use it for policy compliance scans and in tablet for web application scans.
It is for vulnerability management. I used it in my previous company, and I also used it for my home network. It is a SaaS platform. So, there is always the latest version.
We primarily use the solution for full enterprise visibility from both an asset detection perspective and vulnerability detection perspective. Basically, we are tracking all the devices over agents, including PCs and servers, et cetera. We are able to understand what our current situation is on the devices. At the second stage, we are able to catch the devices which do not have agents or which are not in the inventory, with on-premise scanners. We are running security configuration hardening assessments or compliance with CIA security benchmarks. In addition to that, we are also utilizing the cloud assessment solution of the Qualys, to ensure compliance with CIA security standards. For example, the Amazon cloud platform is configured compliantly with the CIA security benchmark. These are the four pillars utilized.
Senior Vice President | Information Security at a financial services firm with 1,001-5,000 employees
Real User
2021-07-26T16:19:46Z
Jul 26, 2021
I used this solution for one of my clients and the primary use case was for the compliance mode and scanning. We are customers of Qualys and I am senior vice president information security.
We are a solution provider and this is one of the products that we implement for our clients. We do a lot of work with containers. With respect to containerization, security is important for us and we regularly check the market to see what solutions are available in these areas. This solution is primarily used for container security and compliance. Moving into any environment, in particular, one that is cloud-based, our clients want to make sure that things are okay from a compliance perspective. We generate reports and they can see whether there are any violations. If they see violations or security breaches during the audit then they have to be addressed.
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk...
We use the product for enterprise network infrastructure scanning.
Our use cases are primarily on-premises vulnerability management and remediation, external attack surface management and vulnerability scanning.
We are managing hundreds of AWS and several on-premises accounts using Qualys agents and scanners to provide data inputs for Qualys. We are using several of the Qualys modules, VMDR, Cloud Agents, Connectors along with Global Asset View (GAV). GAV dynamic tagging is valuable for tracking owners of assets. Qualys' main function is to provide us with vulnerability management information for our end users and is a major input to our CMDB. We rely on a combination of agents and scans to provide us with the system data.
Qualys VMDR is a vulnerability management and detection response tool. It belongs to the first generation of vulnerability assessment tools. It enables us to manually identify vulnerable keys and fix them. It is built as a cutting-edge continuous platform where we can detect and protect. With this product, we can respond to specific vulnerabilities, going beyond just using artificial intelligence features. We have implemented VMDR across our cloud, physical interfaces, endpoints, and log servers. It's a good digital product for our organization.
We use the solution for vulnerability management. It helps us identify potentially vulnerable assets. Thus, we can prioritize patching based on a risk score.
We use the solution for vulnerability and policy scan.
We use the solution for vulnerability management.
Qualys VM is used for vulnerability scans for the internet and applications using application exchange. There are many applications. We also use the solution for asset management per team, and the network scan to discover the devices on our network.
This is a virtual scanner appliance. We have both physical and virtual options. I'm still in training and getting the hang of the solution. I do not know what features the company uses the most. They generally use it to scan all the AWS workloads and Azure workloads.
We use this solution to scan the servers on the network. It is used predominantly by our information security team.
Qualys VM is used for vulnerability scanning.
Qualys has many products. However, the prominent one is for scanning the vulnerabilities on endpoints, including servers and desktops. The other can be for using multiple other products, like taking the certificate, inventory, and software inventory of endpoints through scanning. Additionally, we use the solution for web application scanning. When they have web applications, they can scan applications for various vulnerabilities and give recommendations.
Qualys Container Security scans similar to a runtime container and it scans the entire cluster.
Qualys Container Security scans similar to a runtime container and it scans the entire cluster.
Our customers use Qualys for vulnerability management, it's a way for them to discover the kinds of vulnerabilities they have on their systems. We are a partner with Qualys and I'm an infrastructure security consultant. We currently have 20 clients using Qualys.
I mainly use Qualys VM for CSAM, to complement vulnerability management on our assets, and to check for intrusions through our email gateways.
I use Qualys VM for vulnerability scanning, enterprise management, web application scanning, and patch deployment.
We use this solution mainly for vulnerability management.
We use this solution to manage compliance and to verify the gap between the policy defined by the company and the ones that are implemented in the system. We also use Qualys for vulnerability management of assets in the cloud or on-prem.
We do vulnerability management mostly with the agents and sometimes with the scanner. We use it to install for around 20 or 30 clients right now so that we can remotely monitor their vulnerability status and help them improve their patch management processes. When certain critical things come up, we help clients with the Log4J, identifying where they need to remediate some of the super trendy critical things that come out and identifying end-of-life operating systems and software that need to be updated.
We're using the entire suite except for Patch Management. I use Qualys VM for my production environment on Amazon AWS. I also use it for my endpoints and some BDI solutions that require on-premise solutions, and I use it for both.
I primarily use Qualys VM to manage vulnerability tickets.
It is a SaaS solution with agents distributed at endpoints.
We use bother on-premise and cloud deployments of Qualys VM. For my clients in the cloud, we use a cloud solution, which is a bring your own license model. Additionally, We have our own deployment of Qualys VM. We are using Qualys VM to provide a VM service.
I primarily use Qualys VM for vulnerability management, security configuration, and management and asset inventory.
I mainly use Qualys VM for vulnerability management to carry out vulnerability scans on IT assets to find out which are vulnerable and what is needed to patch them. We also use it for policy compliance scans and in tablet for web application scans.
It is for vulnerability management. I used it in my previous company, and I also used it for my home network. It is a SaaS platform. So, there is always the latest version.
Qualys' main function is to scan IT systems. It does the scanning of computer systems.
It was responsible for vulnerability scanning. It enforces vulnerability management websites.
We primarily use the solution for full enterprise visibility from both an asset detection perspective and vulnerability detection perspective. Basically, we are tracking all the devices over agents, including PCs and servers, et cetera. We are able to understand what our current situation is on the devices. At the second stage, we are able to catch the devices which do not have agents or which are not in the inventory, with on-premise scanners. We are running security configuration hardening assessments or compliance with CIA security benchmarks. In addition to that, we are also utilizing the cloud assessment solution of the Qualys, to ensure compliance with CIA security standards. For example, the Amazon cloud platform is configured compliantly with the CIA security benchmark. These are the four pillars utilized.
I used this solution for one of my clients and the primary use case was for the compliance mode and scanning. We are customers of Qualys and I am senior vice president information security.
We use Qualys Virtual Scanner Appliance for the big scan.
We use Qualys Asset Inventory for doing infrastructure level scans or server inventory, or saving the server database or asset database.
We are a solution provider and this is one of the products that we implement for our clients. We do a lot of work with containers. With respect to containerization, security is important for us and we regularly check the market to see what solutions are available in these areas. This solution is primarily used for container security and compliance. Moving into any environment, in particular, one that is cloud-based, our clients want to make sure that things are okay from a compliance perspective. We generate reports and they can see whether there are any violations. If they see violations or security breaches during the audit then they have to be addressed.
Our primary use case is vulnerability assessment.
The primary use case is using this as the infrastructure scanner for an enterprise vulnerability programme in a customer organization.