Try our new research platform with insights from 80,000+ expert users

NinjaOne vs Qualys CyberSecurity Asset Management comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Ranking in Vulnerability Management
18th
Average Rating
9.6
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (3rd)
NinjaOne
Ranking in Vulnerability Management
26th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
21
Ranking in other categories
Network Monitoring Software (24th), Server Monitoring (6th), IT Service Management (ITSM) (8th), Remote Access (14th), Mobile Device Management (MDM) (5th), IT Alerting and Incident Management (9th), Remote Monitoring and Management (RMM) (1st), Patch Management (7th), MSP Backup (2nd), Unified Endpoint Management (UEM) (6th)
Qualys CyberSecurity Asset ...
Ranking in Vulnerability Management
7th
Average Rating
9.0
Reviews Sentiment
7.0
Number of Reviews
35
Ranking in other categories
Patch Management (4th), Cyber Asset Attack Surface Management (CAASM) (3rd), Attack Surface Management (ASM) (2nd), Software Supply Chain Security (4th)
 

Mindshare comparison

As of January 2026, in the Vulnerability Management category, the mindshare of Zafran Security is 1.1%, up from 0.2% compared to the previous year. The mindshare of NinjaOne is 0.9%, up from 0.4% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 1.3%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Qualys CyberSecurity Asset Management1.3%
Zafran Security1.1%
NinjaOne0.9%
Other96.7%
Vulnerability Management
 

Featured Reviews

Reviewer6233 - PeerSpot reviewer
Works at a healthcare company with 10,001+ employees
Has become an indispensable tool in our cybersecurity arsenal
While Zafran Security is already a powerful tool, there are areas where it could be further improved to provide even greater value. One key area for enhancement is the searching capabilities within its vulnerabilities module. By incorporating the ability to create Boolean searches, users would gain the ability to apply more complex filters and customize their search criteria. This would greatly enhance the precision and efficiency with which security teams can identify and prioritize vulnerabilities. Having such tailored search capabilities would save time and resources by narrowing down vast lists of vulnerabilities to those that meet specific parameters relevant to our unique risk environment. Additionally, integrating more robust reporting and visualization tools would be advantageous. Enhanced dashboards that offer customizable visual representations of risk configurations and threat landscapes would facilitate better communication with stakeholders, making it easier to explain vulnerabilities and the rationale behind certain security measures. This would also aid in demonstrating the improvements and value derived from existing security investments to leadership and non-technical team members.
Not Joseph Pearson - PeerSpot reviewer
Assistant Vice President, Tech Solutions at LPL Financials
Has simplified remote software delivery and script management but needs improved reporting flexibility and better Mac support
NinjaOne's best features include ease of use regarding enablement and deployment, a broad selection and ability of software enablement, and API deliveries. Using CrowdStrike, we are able to tie in NinjaOne's API to have these automatically deliver to endpoints upon addition of those devices to a group with that policy deployed to it. NinjaOne has positively impacted our organization by making delivery easier for our end users and improving the ability to create scripts, manage scripts, and check status of devices and their compliance. This easier delivery with NinjaOne gives us oversight on devices without having to be on the call or remoted in directly to a device.
AN
Cyber Security Specialist at UBS Financial
Customized dashboards and quick deployment support comprehensive asset management
We use the True Risk Score for vulnerability prioritization, though we do not solely rely upon it since some assets may be decommissioned soon or not in use. From Qualys CyberSecurity Asset Management, we primarily focus on internet-facing assets. We have created separate tasks for internet-facing assets and track the True Risk dashboard specifically for these assets. If the True Risk Score is higher for any internet-facing assets, then we take action accordingly. The True Risk Score is very helpful for prioritization. The initial setup was straightforward and easy. We needed to create customized tags, group them twice, and validate whether the operating system detection was true positive or false positive. We encountered some false positives, which required coordination with the IT team for verification. In six months, we had approximately 20-25 machines that needed verification on a weekly basis. We coordinated with the IT team to identify the exact operating system specifications.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We saw benefits from Zafran Security almost immediately after deploying it."
"Zafran is an excellent tool."
"We are able to see the real risk of a vulnerability on our environment with our security tools."
"With Zafran Security, it integrates with your security controls, allowing you to take that risk score and reduce it based on the controls in place or increase the risk based on different factors, such as if the issue is internet reachable or if there's an exploit in the wild."
"Zafran has become an indispensable tool in our cybersecurity arsenal."
"Overall, we have seen about eighty-seven percent reduction of the number of vulnerabilities that require urgency to remediate, specifically the number of criticals."
"NinjaOne has a feature where we can create custom scripts that we can run on devices remotely."
"The installation is easy, it only took two minutes."
"Good at managing updates and for remote support."
"The tool's most valuable feature is third-party application updates."
"The most valuable feature we have found currently is probably patch management."
"The software's automation tools have solved critical deployment problems for small businesses."
"The standout feature of NinjaOne is that we do not have to open any ports for access, which is great for security."
"A significant feature of NinjaOne is its remote access capability, which is essential for my clients’ home office usage."
"The comprehensive view that Qualys CyberSecurity Asset Management gives us on our assets enables us to go to a single screen and get a good idea of our holistic asset count."
"Qualys CyberSecurity Asset Management provides accurate content that identifies all the endpoints, making it better in that way, and the review results for finding vulnerabilities and reporting also show that it identifies most of them, helping us complete tasks in 3.5 days instead of five."
"Authorized and unauthorized software visibility is the best feature for me."
"I would rate Qualys CyberSecurity Asset Management ten out of ten."
"The best feature is asset discovery through their cloud agent or IP-based scanning."
"Overall, I would give Qualys CyberSecurity Asset Management a nine out of ten."
"I appreciate the feature that simplifies cloud security posture, offering insights into vulnerabilities, and reducing the complexity of managing the security program."
"The support has been excellent; they are responsive and effectively bring in the appropriate resources to help solve problems."
 

Cons

"I think the ability to have some enhanced reporting capabilities is something they can improve on, as they have good reports but we have asked for some specific reporting enhancements."
"The dashboarding and reporting functionality of Zafran Security is an area that definitely could use some improvements."
"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"The inclusion of XENServer and Proxmox as virtual platforms in NinjaOne is currently missing."
"The remote connectivity could be better. It works most of the time, but sometimes, there are issues."
"NinjaOne's dashboard could be easier to use."
"I want NinjaOne to improve the reports."
"The ability to not have a NinjaOne agent or multiple NinjaOne agents on a singular device is a big pain point for the device, and secondly, the macOS support is also what keeps it from being a higher score."
"It can have more integrations with third-party providers, such as Deep Instinct. They do partner with certain antivirus or remote access tool partners, but they can increase their portfolio to have more choices."
"The graphical user interface could be improved."
"NinjaOne's pricing and user interface needs improvement."
"There can be further simplification to reduce the overall noise and provide ESAM-related data."
"Some areas that would be helpful are more comprehensive tagging and the ability to set up better dynamic rules."
"The UI and menu navigation has improved significantly, however, the menus could still be clunky, making navigation within the assets challenging."
"The activity log is terrible."
"Based on the company's budget, Qualys offers limited features, which can also be utilized in other environments."
"The product stability has notably declined over the last two months, and the performance to fulfill a page request is very slow compared to its previous performance."
"In my opinion, the area that needs improvement is the role-based access control (RBAC). The access privilege management needs to be more robust and streamlined to enhance user access management. Additionally, improvements to the user interface could be beneficial."
"They should address the false positives generated in EASM. It is fetching assets that have Infosys as the keyword. They should fix that."
 

Pricing and Cost Advice

Information not available
"NinjaOne's price is fine since my workplace is an educational institution, so we get the product at a really good price considering that we do not pay taxes, making the prices very fair and worth the product."
"Its pricing is great."
"We got a pretty good deal. It was fairly affordable."
"NinjaOne is a little expensive but is still cheaper than competitors like Acronis or Veeam."
"We currently pay $1.20 per device on a monthly basis."
"NinjaRMM uses a subscription model."
"I rate the solution’s pricing a five out of ten, where one is the lowest and ten is the most expensive."
"The product's pricing depends on the number of PCs or devices."
"The cost for Qualys CyberSecurity Asset Management is high."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"It is cost-effective because, in a single tool, we are getting everything. All the solutions come in a single license or price."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"The pricing for Qualys CSAM is nominal."
"Qualys offers excellent value for money."
"The pricing for Qualys Cybersecurity Asset Management is reasonable, with an annual subscription costing around $1,000 per year or a monthly subscription starting at approximately $72 per month, depending on the specific package and features included."
"The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
8%
Outsourcing Company
6%
Computer Software Company
12%
Government
8%
Manufacturing Company
7%
Financial Services Firm
7%
Computer Software Company
13%
Financial Services Firm
13%
Manufacturing Company
9%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise3
Large Enterprise2
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise2
Large Enterprise23
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
Since we stood Zafran Security up in our private cloud, we handle the maintenance on our side. As we opted not to use...
What needs improvement with Zafran Security?
In terms of areas for improvement, Zafran Security is doing a really great job as a new and emerging company. Oftenti...
What is your primary use case for Zafran Security?
My use cases for Zafran Security revolve around two primary areas. One is around vulnerability management and priorit...
What is your experience regarding pricing and costs for NinjaOne?
My experience with pricing, setup cost, and licensing for NinjaOne is fairly cheap and easy.
What needs improvement with NinjaOne?
One challenge I face with NinjaOne is that when remoting in, sometimes the end user has a resolution with very tiny t...
What is your primary use case for NinjaOne?
My main use case for NinjaOne is ticketing. I use NinjaOne for ticketing in my daily work to keep track of all the co...
What needs improvement with Qualys CyberSecurity Asset Management?
I think the one thing Qualys CyberSecurity Asset Management can do better is the package management and the updating ...
What is your primary use case for Qualys CyberSecurity Asset Management?
I primarily use it for a small, single-site, multi-source setup with multi-WAN inputs. I have a main fiber connection...
 

Overview

 

Sample Customers

Information Not Available
Status Pros, Mitchell and Company
Information Not Available
Find out what your peers are saying about NinjaOne vs. Qualys CyberSecurity Asset Management and other solutions. Updated: January 2026.
881,082 professionals have used our research since 2012.