2026 Best Software Awards are here!See the list
Qualys PM

By Qualys

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Qualys PM and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.3 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Qualys PM?

It's been two months since this profile received a new review
Leave a Review

Qualys PM Reviews & Product Details

Product Avatar Image

Have you used Qualys PM before?

Answer a few questions to help the Qualys PM community

Qualys PM Reviews (3)

Reviews

Qualys PM Reviews (3)

4.3
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Vikram C.
VC
Security Operations Center Analyst
Enterprise (> 1000 emp.)
"Patch the Vulnerabilities and stop the exploit"
What do you like best about Qualys PM?

Qualys patch management is the best product to patch the Vulnerabilities. We can remediate the vulnerability by patching based on the asset tags. It is easy to implement over the schedule time. Review collected by and hosted on G2.com.

What do you dislike about Qualys PM?

While scanning the Vulnerabilities sometimes it will detect as a false positive, for that we have patch the Vulnerabilities depends. Sometimes we will get some exception from the user. Review collected by and hosted on G2.com.

IN
Help Desk
Small-Business (50 or fewer emp.)
"It's as easy as choosing your patches, and pressing "Enable"!"
What do you like best about Qualys PM?

Qualys Patch Management basically lets you set any number of qualifiers to select tagged/untagged devices, and then choose any patches (also based on criteria, or manually) you want to install, with a range of time. In the words of the immortal Todd Howard, "All of this just... works!" Review collected by and hosted on G2.com.

What do you dislike about Qualys PM?

Sometimes, it doesn't "just work". Qualys PM is pretty good at telling you what went wrong, but sometimes, it'll just say "Installer service crashed" without any additional info. Then, it's up to you to figure out what's wrong with your particular device. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
CI
Enterprise (> 1000 emp.)
"Smooth patch management"
What do you like best about Qualys PM?

Getting the most recent patches of all the assets. Review collected by and hosted on G2.com.

What do you dislike about Qualys PM?

at times failure during patch deployment. Review collected by and hosted on G2.com.

There are not enough reviews of Qualys PM for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Microsoft System Center Logo
Microsoft System Center
4.1
(585)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
2
NinjaOne Logo
NinjaOne
4.7
(3,701)
NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. Intelligent automation and human-centered AI gives employees a great technology experience.
3
Patch My PC Logo
Patch My PC
4.8
(724)
Patch My PC helps organizations using Microsoft Configuration Manager or Intune keep their third-party applications up-to-date.
4
Atera Logo
Atera
4.6
(1,063)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
5
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,297)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
6
ManageEngine Endpoint Central Logo
ManageEngine Endpoint Central
4.5
(1,061)
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
7
ESET PROTECT Logo
ESET PROTECT
4.6
(933)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
8
Action1 Logo
Action1
4.9
(894)
Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC and ISO 7001. The company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.
9
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(735)
Acronis Cyber Protect is an integrated solution that combines advanced cybersecurity, data protection, and endpoint management to safeguard businesses against modern cyber threats. By merging backup and anti-malware capabilities into a single platform, it simplifies IT operations, enhances system efficiency, and ensures comprehensive protection across physical, virtual, and cloud environments. Key Features and Functionality: - Integrated Cybersecurity and Backup: Combines AI-based anti-malware with reliable backup to streamline protection processes. - Vulnerability Assessments and Patch Management: Identifies security gaps and applies necessary patches to maintain system integrity. - Disaster Recovery: Ensures business continuity by enabling rapid recovery of data and systems in the event of a cyberattack or system failure. - Endpoint Management: Provides centralized control over all endpoints, facilitating efficient monitoring and management. - Continuous Data Protection: Safeguards critical data by continuously backing up changes, minimizing data loss risks. Primary Value and User Solutions: Acronis Cyber Protect addresses the growing complexity of managing multiple security and backup solutions by offering a unified platform. This integration reduces operational overhead, lowers total cost of ownership, and enhances protection against evolving cyber threats. Businesses benefit from streamlined operations, improved system reliability, and the assurance that their data and systems are secure and recoverable.
10
Datto RMM Logo
Datto RMM
4.5
(728)
A proactive remote monitoring & management (RMM) that maximizes productivity.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Qualys PM