QualysGuard Vulnerability Management v7.6
February 01, 2013
Subscription pricing starts at $2,495 for 32 IPs (including four external IPs), one Virtual Scanner Appliance, and unlimited scanning. Pricing for the same number of IPs with a physical Scanner Appliance is $2,995 per year. QualysGuard PCI is bundled at no additional cost for the external IP addresses.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Ease of use and a great ticketing system.
- Weaknesses: Did not find anything significant to report.
- Verdict: Well worth the cost. This is our choice for Recommended – cloud-based service.
The QualysGuard Vulnerability Management (VM) solution provides automated auditing and vulnerability management for small to large enterprises. The solution is a private cloud-based software-as-a-service. The easily accessible, web-based design makes it possible to operate the system via a browser from anywhere there is internet access. This functionality includes the operation of the Qualys virtual and hardware appliances used for addressing private network addresses. The tool includes network discovery, asset mapping, prioritization, vulnerability assessment, centralized reporting and remediation tracking. Qualys employs a trouble-ticketing feature to help in tracking and remediating vulnerabilities and other problems across the network. The remediation solution includes comprehensive reports on vulnerabilities, including severity levels, time-to-fix estimates, impact on business, and trend analysis on security issues. A robust set of reports provides status insight for business managers, as well as technical managers and staff. Vulnerability reporting includes the use of common references, such as the Common Vulnerabilities and Exposures (CVE) database, to help provide a common language for auditors and other reporting requirements. The intuitive graphical dashboards and menus made deployment and use of the product easy to get up and running.
Qualys provided access into the QualysGuard VM as well as a hardware appliance for this evaluation. The documentation included a 102-page Scanner Appliance User Guide and a three-step quick-start document. The user guide provided nice screen shots of various menus and workflow diagrams. As a first-time user of the product, we were pleasantly surprised in how easy it was to get the system up and running. While the user manual was close by, we did not need to open it during the setup. Configuration of the QualysGuard VM was equally easy. It literally took less than 20 minutes to set up scans (on-demand and scheduled), various reports, modification of policies (to fit our needs) and classifying asset information. The bright graphic screens helped with navigating around the various sections. A great "help" feature made it easy to learn how to use functions that were new. The system did a good job of recognizing the vulnerabilities that were on/in various systems and applications, including Windows Servers and desktops, as well as various other systems. The most impressive feature was the ticketing system. Not only was it easy to configure, inside the ticket there were step-by-step instructions on how to resolve the issue for various system platforms.
Qualys offers 24/7 phone and email support, including product updates, all at no cost. The company's website provides FAQ and community knowledge-sharing. The company also offers free instructor-led classroom or virtual training that includes hands-on lab exercises. There is also a worthwhile video series focused on the solution. This product is a good value for any organization looking for a vulnerability management system.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Government 'Cybersecurity Sprint' spurs agency authentication measures
- Report: News, entertainment websites serve majority of malvertisements
- UConn School of Engineering cyberintrusion originated in China
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries