You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Qualys
How would you rate your experience with Qualys VM?
Issue Tracking
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
Based on 10 Qualys VM reviews and verified by the G2 Product R&D team.
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
Runs pre-scripted vulnerability scans without requiring manual work.
Compliance Testing
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Manual Application Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Static Code Analysis
Scans application source code for security flaws without executing it.
Black Box Testing
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting