Try our new research platform with insights from 80,000+ expert users

DefectDojo vs Qualys CyberSecurity Asset Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

DefectDojo
Ranking in Vulnerability Management
42nd
Average Rating
8.0
Reviews Sentiment
6.6
Number of Reviews
1
Ranking in other categories
DevSecOps (10th)
Qualys CyberSecurity Asset ...
Ranking in Vulnerability Management
10th
Average Rating
9.0
Reviews Sentiment
7.0
Number of Reviews
35
Ranking in other categories
Patch Management (4th), Cyber Asset Attack Surface Management (CAASM) (3rd), Attack Surface Management (ASM) (2nd), Software Supply Chain Security (3rd)
 

Mindshare comparison

As of March 2026, in the Vulnerability Management category, the mindshare of DefectDojo is 0.9%, up from 0.4% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 1.4%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Qualys CyberSecurity Asset Management1.4%
DefectDojo0.9%
Other97.7%
Vulnerability Management
 

Featured Reviews

reviewer2267097 - PeerSpot reviewer
Integration and Solution Architect at a government with 501-1,000 employees
Easy to use with efficient vulnerability reporting and team collaboration
Use case, so all the reports from GitLeaks, DefectDojo, GitLeaks or dependency check or Trivy, they make reports, and we send this report to DefectDojo to have CVMs, Central Vulnerability Management. DefectDojo is Central Vulnerability Management. If you have a dashboard to set, we have…
AN
Cyber Security Specialist at UBS Financial
Customized dashboards and quick deployment support comprehensive asset management
We use the True Risk Score for vulnerability prioritization, though we do not solely rely upon it since some assets may be decommissioned soon or not in use. From Qualys CyberSecurity Asset Management, we primarily focus on internet-facing assets. We have created separate tasks for internet-facing assets and track the True Risk dashboard specifically for these assets. If the True Risk Score is higher for any internet-facing assets, then we take action accordingly. The True Risk Score is very helpful for prioritization. The initial setup was straightforward and easy. We needed to create customized tags, group them twice, and validate whether the operating system detection was true positive or false positive. We encountered some false positives, which required coordination with the IT team for verification. In six months, we had approximately 20-25 machines that needed verification on a weekly basis. We coordinated with the IT team to identify the exact operating system specifications.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With the pipeline of detection and DefectDojo, we are able to see the real vulnerabilities, and we fix them."
"Qualys CyberSecurity Asset Management provides accurate content that identifies all the endpoints, making it better in that way, and the review results for finding vulnerabilities and reporting also show that it identifies most of them, helping us complete tasks in 3.5 days instead of five."
"Qualys CyberSecurity Asset Management offers comprehensive features to cover our entire attack surface."
"The most valuable features of Qualys CSAM include the ability to manage authorized and unauthorized applications efficiently. This feature helps in validating applications and maintaining a secure environment."
"The most valuable aspect we receive from Qualys is the remediation."
"We have had zero attacks since we enabled all the features in Qualys CSAM."
"Authorized and unauthorized software visibility is the best feature for me. It helps me understand security controls on our network and where we lack visibility. With a single security tool, we are able to get an extensive list."
"The scanning results are pretty good, and some of the insights are quite valuable."
"The best features of Qualys CyberSecurity Asset Management include its ability to scan and consider each and every endpoint based on the target we have given. This makes it stand out."
 

Cons

"We need something to notify the team responsible for a product when vulnerabilities are found."
"Currently, whenever the agent is running, it consumes over ten percent of my CPU, indicating that CPU consumption is another area Qualys needs to address."
"As of now, the support, results, and low false positives do not necessitate changes."
"There can be further simplification to reduce the overall noise and provide ESAM-related data."
"Some areas that would be helpful are more comprehensive tagging and the ability to set up better dynamic rules."
"The scanning function could be improved."
"In our reporting, we faced a challenge syncing with cloud devices."
"With Qualys CyberSecurity Asset Management, it was very difficult to extract detections from the system."
"Qualys CyberSecurity Asset Management is moderately good, while Rapid7 is slightly much better."
 

Pricing and Cost Advice

Information not available
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"Though the solution is considered expensive, if bundled with other services such as VMDR or cloud agents, its value would significantly increase. It is currently a bit costly, but with bundling, it could become attractive to more customers."
"The cost for Qualys CyberSecurity Asset Management is high."
"The pricing is fair. I would love to see the price come down a little bit, but we do get a lot of value out of it. We are squeezing every ounce of value we can out of the tool."
"The pricing for Qualys CSAM is nominal."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"It is cost-effective because, in a single tool, we are getting everything. All the solutions come in a single license or price."
"Qualys is competitively priced for its features. Its pricing is suitable for large organizations with more than 4,000 assets, but for smaller organizations with few assets, such as banks, the costs might be high. They should come up with packages that are suitable for small organizations."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Comms Service Provider
12%
Financial Services Firm
12%
Manufacturing Company
9%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
8%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise2
Large Enterprise23
 

Questions from the Community

What is your experience regarding pricing and costs for DefectDojo?
The pricing is great. It is much cheaper compared to other solutions. We don't want to pay for things we are able to do on our own.
What needs improvement with DefectDojo?
We need something to notify the team responsible for a product when vulnerabilities are found. We are able to attach a team or a manager for a product, however, we are not able to send them a notif...
What is your primary use case for DefectDojo?
Use case, so all the reports from GitLeaks, DefectDojo, GitLeaks or dependency check or Trivy, they make reports, and we send this report to DefectDojo to have CVMs, Central Vulnerability Managemen...
What needs improvement with Qualys CyberSecurity Asset Management?
I think the one thing Qualys CyberSecurity Asset Management can do better is the package management and the updating process. Knowing that you can't update any of the packages until you've done the...
What is your primary use case for Qualys CyberSecurity Asset Management?
I primarily use it for a small, single-site, multi-source setup with multi-WAN inputs. I have a main fiber connection and a couple of failovers while managing different networks across different se...
 

Overview

Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management. Updated: February 2026.
884,933 professionals have used our research since 2012.