Introducing G2.ai, the future of software buying.Try now

Compare Bitsight and Qualys VMDR

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Bitsight
Bitsight
Star Rating
(71)4.6 out of 5
Market Segments
Enterprise (73.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Bitsight
Qualys VMDR
Qualys VMDR
Star Rating
(166)4.4 out of 5
Market Segments
Enterprise (51.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Qualys VMDR

Bitsight vs Qualys VMDR

When assessing the two solutions, reviewers found Qualys VMDR easier to use. However, Bitsight is easier to set up and administer. Reviewers also preferred doing business with Bitsight overall.

  • Reviewers felt that Bitsight meets the needs of their business better than Qualys VMDR.
  • When comparing quality of ongoing product support, reviewers felt that Bitsight is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Bitsight over Qualys VMDR.
Pricing
Entry-Level Pricing
Bitsight
No pricing available
Qualys VMDR
No pricing available
Free Trial
Bitsight
No trial information available
Qualys VMDR
No trial information available
Ratings
Meets Requirements
8.9
56
8.7
116
Ease of Use
8.5
57
8.7
115
Ease of Setup
8.6
37
8.4
77
Ease of Admin
8.8
34
8.6
75
Quality of Support
9.3
56
8.1
111
Has the product been a good partner in doing business?
9.3
35
8.6
76
Product Direction (% positive)
9.1
53
8.2
101
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
7.8
9
Management
Not enough data
8.5
9
Not enough data
7.4
9
Not enough data
8.0
9
Operations
Not enough data
8.1
9
Not enough data
8.5
9
Not enough data
7.8
9
Security Controls
Not enough data
7.4
9
Not enough data
7.4
9
Not enough data
7.6
9
Not enough data
7.4
9
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.7
15
Security
Not enough data
7.5
14
Not enough data
7.9
12
Not enough data
7.5
12
Not enough data
7.0
14
Compliance
Not enough data
8.3
12
Not enough data
7.8
12
Not enough data
8.2
13
Administration
Not enough data
7.9
12
Not enough data
7.7
13
Not enough data
7.6
13
Not enough data
7.9
20
Performance
Not enough data
8.3
18
Not enough data
8.5
18
Not enough data
5.8
18
Not enough data
8.6
20
Network
Not enough data
8.2
19
Not enough data
8.1
18
Not enough data
8.4
16
Application
Not enough data
7.8
16
Not enough data
7.6
15
Not enough data
8.0
16
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
6.7
13
8.3
53
Risk Analysis
8.7
13
8.7
47
7.2
13
8.3
50
7.7
13
8.4
46
Vulnerability Assesment
6.9
13
8.7
50
7.2
13
8.7
50
7.3
13
8.2
49
7.4
13
8.5
50
Automation
5.8
13
7.7
42
5.7
12
7.9
42
5.1
12
8.4
45
5.1
12
8.1
42
ServiceNow Store AppsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
ServiceNow Apps
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - ServiceNow Store Apps
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vendor Security and Privacy AssessmentHide 10 FeaturesShow 10 Features
7.6
29
Not enough data
Functionality
8.1
25
Not enough data
8.0
25
Not enough data
7.6
26
Not enough data
8.7
25
Not enough data
Risk assessment
8.7
29
Not enough data
7.7
24
Not enough data
8.5
28
Not enough data
6.9
14
Not enough data
Generative AI - Vendor Security and Privacy Assessment
6.1
12
Not enough data
5.7
12
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
7.4
8
Not enough data
Asset Management
8.1
8
Not enough data
6.7
7
Not enough data
5.7
7
Not enough data
Monitoring
7.9
7
Not enough data
8.1
7
Not enough data
8.8
8
Not enough data
8.8
7
Not enough data
Risk Management
7.9
7
Not enough data
7.9
7
Not enough data
6.9
7
Not enough data
7.6
7
Not enough data
Generative AI
4.8
7
Not enough data
Third Party & Supplier Risk ManagementHide 13 FeaturesShow 13 Features
7.6
28
Not enough data
Risk Assessment
8.2
28
Not enough data
7.5
14
Not enough data
Risk Control
8.2
26
Not enough data
7.9
26
Not enough data
8.0
25
Not enough data
Monitoring
8.1
25
Not enough data
8.7
26
Not enough data
8.7
26
Not enough data
Reporting
8.2
24
Not enough data
7.5
24
Not enough data
8.3
24
Not enough data
Agentic AI - Third Party & Supplier Risk Management
6.7
13
Not enough data
7.1
14
Not enough data
Digital Risk Protection (DRP) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Vulnerability Management - Digital Risk Protection (DRP) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Response Digital Risk Protection (DRP) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Analytics - Digital Risk Protection (DRP) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
7.8
6
Not enough data
Generative AI - Exposure Management Platforms
6.4
6
Not enough data
7.2
6
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
8.3
6
Not enough data
8.1
6
Not enough data
Monitoring and Integration - Exposure Management Platforms
8.3
6
Not enough data
8.6
6
Not enough data
7.8
9
Not enough data
Orchestration
8.9
9
Not enough data
8.7
9
Not enough data
8.7
9
Not enough data
7.6
9
Not enough data
Information
9.3
9
Not enough data
7.9
8
Not enough data
9.0
8
Not enough data
Personalization
7.5
8
Not enough data
8.5
8
Not enough data
7.1
8
Not enough data
Generative AI
6.7
8
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
6.7
8
Not enough data
7.1
8
Not enough data
6.9
8
Not enough data
6.9
8
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Bitsight
Bitsight
Small-Business(50 or fewer emp.)
4.2%
Mid-Market(51-1000 emp.)
22.5%
Enterprise(> 1000 emp.)
73.2%
Qualys VMDR
Qualys VMDR
Small-Business(50 or fewer emp.)
20.4%
Mid-Market(51-1000 emp.)
27.8%
Enterprise(> 1000 emp.)
51.9%
Reviewers' Industry
Bitsight
Bitsight
Information Technology and Services
11.3%
Hospital & Health Care
11.3%
Financial Services
7.0%
Banking
7.0%
Computer Software
5.6%
Other
57.7%
Qualys VMDR
Qualys VMDR
Information Technology and Services
21.5%
Computer & Network Security
12.3%
Financial Services
9.2%
Computer Software
7.4%
Banking
4.9%
Other
44.8%
Alternatives
Bitsight
Bitsight Alternatives
UpGuard
UpGuard
Add UpGuard
Vanta
Vanta
Add Vanta
Recorded Future
Recorded Future
Add Recorded Future
AuditBoard
AuditBoard
Add AuditBoard
Qualys VMDR
Qualys VMDR Alternatives
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
Wiz
Wiz
Add Wiz
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Discussions
Bitsight
Bitsight Discussions
Monty the Mongoose crying
Bitsight has no discussions with answers
Qualys VMDR
Qualys VMDR Discussions
Free version
1 Comment
Official Response from Peanut Butter
Hi Nasrin, Peanut Butter helps companies offer Student Loan Assistance as a benefit. Leading employers across North America partner with Peanut Butter to...Read more
Given an asset, how do I run a vulnerability scan report on demand ad hoc?
1 Comment
Deb J.
DJ
You can do that easily by launching an on-demand scan in Qualys too. Thats a very basic feature. You could also drop an Qualys agent on the host OS (The...Read more
What does Qualys Vmdr do?
1 Comment
Balasubramaniya V.
BV
It does all the around like scanning, patching of devices using agents, real time monitoring of agents, threat feeds Read more