Our primary use case is vulnerability assessment.
Technology Security Expert at T-Mobile Polska (Deutsche Telekom)
Identifies and helps to remedy vulnerabilities, has good certificate management
Pros and Cons
- "The most valuable feature is the certificate management."
- "The reporting in this solution can be improved."
What is our primary use case?
How has it helped my organization?
This solution has provided information about existing vulnerabilities, and helped with quick remediation in case of global malware attacks.
What is most valuable?
The most valuable feature is the certificate management. The reason is the limited license provided by the mother company.
What needs improvement?
The reporting in this solution can be improved.
Buyer's Guide
Qualys VMDR
June 2025

Learn what your peers think about Qualys VMDR. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,524 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this solution for five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Executive Officer at a consultancy with 1-10 employees
An excellent solution for vulnerability management that's highly scalable and very stable
Pros and Cons
- "Technical support is fantastic."
- "It's quite complex on the way it is set up, so it takes a fair bit of time in order to get your head around it in order to deploy it. Once you've deployed it, then you're never confident on the versions of the browsers and the SSL certificates, etc. You have to always go back into Qualys and check."
What is our primary use case?
The primary use for the solution is vulnerability management.
What is most valuable?
The way we can maintain a current actual registry of all the IP assets within it is very good. The scanning of software assets on the endpoint machine is also useful. I've tried the scanning of similar asset vulnerabilities throughout different servers, including Unix and Windows. Qualys maintains a good intervention database. We have a service line that updates to the newest software, or whenever you set it up. The second service line has denominated my nodes across the globe. It's easy to deploy the solution.
What needs improvement?
The server application scanning has room for improvement.
It's quite complex on the way it is set up, so it takes a fair bit of time in order to get your head around it in order to deploy it. Once you've deployed it, then you're never confident on the versions of the browsers and the SSL certificates, etc. You have to always go back into Qualys and check.
They do talk about an agent-based scanning for non-IP machines. It sort of sits between server scanning and endpoint scanning. That's not very clear. If they can improve that and deploy, then it'll be such a nice package.
The solution should help its vendors more with renewals. For example, we had deployed the solution as a reseller to a client and then somebody else came along and we didn't end up getting the renewal licenses for the servers. I wasn't very happy about that. We put all the hard work to get it in, but the following years we didn't get the benefit of our low pricing in the first year.
They should integrate with the dashboard and provide a plugins link for data that's coming into API on the dashboard. When the users buy the license, they can turn it items on. So, that way you know you've got the full solution. What you don't pay for is not switched on, and what you pay for can get switched on immediately.
For how long have I used the solution?
I've been using the solution for since 2005.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The solution is highly scalable.
How are customer service and technical support?
Technical support is fantastic.
What other advice do I have?
I would advise others to always have a proof of concept version of the solution put into play. Then spend a good two months on it. Stabilize the solution and check out the features and then deploy it into production. Otherwise, you will spend money during the real project for what could have been done as a POC. Deploy the core solution, get the scanning done and all the critical components put it in a proof of concept and then move it into production.
I would rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Buyer's Guide
Qualys VMDR
June 2025

Learn what your peers think about Qualys VMDR. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,524 professionals have used our research since 2012.
Information Security Officer at Zamil
Threat detection tells us which machines are infected with a vulnerability
Pros and Cons
- "They also have threat detection which maps threats. There is a feed that comes from Qualys when a new vulnerability is found. It tells us which machines are infected with that vulnerability."
- "What we have found is that the solution is not closely tied with the patch management. It is okay with newer ones, like Windows 10 machines; it gives the correct patch. But for Windows 7 or Windows Server 2008, it does not give us the correct patch so we have to manually identify the patches. This is a major problem."
What is most valuable?
The first thing we like is the scanner, the device which checks vulnerability management.
They also have threat detection which maps threats. There is a feed that comes from Qualys when a new vulnerability is found. It tells us which machines are infected with that vulnerability. If there is a new attack, we definitely know that it is happening, what is happening in our environment.
What needs improvement?
What we have found is that the solution is not closely tied with the patch management. It is okay with newer ones, like Windows 10 machines; it gives the correct patch. But for Windows 7 or Windows Server 2008, it does not give us the correct patch so we have to manually identify the patches. This is a major problem.
For how long have I used the solution?
This is the third year we are using Qualys. This year we included one more module, the patching module.
What do I think about the stability of the solution?
It's stable. Every month we scan more than 5,000 IP addresses and we are able to detect vulnerabilities.
How are customer service and technical support?
Our experience is that the problems we send them take too much time to resolve. For example, we opened a case for the problem I mentioned earlier, the vulnerabilities with Windows 7 and Server 2008 where it's trying the wrong patch. It took them a long time to even give us the correct explanation. So this is a problem.
How was the initial setup?
The initial setup was very easy. We just needed to download the virtual machine. There is a key and we just needed to provide a proxy setting. That's it.
We did all the configuration as a one-time job where we defined our subnet and mapped. We needed to schedule the scan and the map and we needed to schedule a group of, say, Windows. It was just a one-time job where needed to configure the query and run it. It created a report and sent it to the administrators. After that one-time job, everything happens automatically.
What about the implementation team?
We did it on our own.
What other advice do I have?
I would recommend Qualys because it's very easy to use. It does not require many specific skills. We are always on the latest version because Qualys provides automatic updates.
We have a virtual appliance in each site and that sends the logs to the cloud. We have the consoles on the cloud which enable us to query and scan. All this happens through the cloud.
We only have one administrator for the solution who monitors and checks if there is anything to be aware of. It sends the reports to all the different administrators, such as network, Linux, and Windows administrators and they take it from there.
We also have Qualys configuration management module. If there are any particular issues in any servers or in any network, it gives us a report to suggest and rectify the issues. It tells us what changes are needed to on that device.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Analyst at Tata Consultancy Services
Patch supersedence has been an invaluable feature
What is our primary use case?
Datacenters which are in different locations.
How has it helped my organization?
- Asset discovery
- Asset sanitization
- Scan scheduling
- Patch supersedence.
What is most valuable?
Patch supersedence.
What needs improvement?
Representation of the total number of vulnerabilities (with name) vs. the number of patches (with name).
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works at Tata Consultancy Services
Generated more complete coverage of assets and saved time
What is our primary use case?
The primary use case is using this as the infrastructure scanner for an enterprise vulnerability programme in a customer organization.
How has it helped my organization?
The customer was manually testing asset health by point-in-time audits. Using the policy compliance module allowed this to be automated and saved time as well as generated more complete coverage of assets leading to greater assurance.
What is most valuable?
The prebuilt CIS templates are very useful.
What needs improvement?
Expanding the template library would be very useful.
For how long have I used the solution?
Three to five years.
Disclosure: My company has a business relationship with this vendor other than being a customer. My company is a service provider that installs and operates solutions for customers.
Senior Information Security Engineer at a financial services firm with 501-1,000 employees
It is a stable product. Tech support is quick to respond to any inquiries.
Pros and Cons
- "There are fewer false positives when using this solution."
- "Tech support is helpful."
- "I do not like that all of the data is stored on the cloud."
What is our primary use case?
It mainly scans the model against all of our online websites.
How has it helped my organization?
There are fewer false positives when using this solution. We are also cutting the need for news monitoring with this solution.
What is most valuable?
We find all of the features useful.
What needs improvement?
One note for room for improvement is that all of the data is stored on the cloud. I think it would be better if they came up with a big box that could store the data and collect data from, it would be a huge improvement.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
It is an extremely impressive and stable product. I would give it a 99% out of 100%. It is very close to being perfect.
What do I think about the scalability of the solution?
I have had no issues with scalability. Initially, we had some issues with the dashboard, but eventually, it set and stabilized. There was an issue with the data dashing between the two models initially, but it was resolved.
How is customer service and technical support?
The tech support is helpful. When we initially open a ticket, we get response within five minutes. Then, they open a case and we receive input from tech support within 24-48 hours with a Q-ID.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Specialist at a manufacturing company with 10,001+ employees
This solution helps us fill out forms in a timely manner. It is more expensive than competitive products.
Pros and Cons
- "It is quite easy to implement."
- "When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself."
- "It is more expensive vs. other products on the market."
What is our primary use case?
My primary use case is to actually fill out forms, ensure that they are being closed in a timely manner. This is why we use these one point solutions.
What is most valuable?
I find most valuable to achieve a channel system and we can also use it to track when we actually close the ticketing of the sites.
In addition, it is quite easy to implement. We found it quite convenient.
What needs improvement?
I think it could improve asset imagery.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
I have not encountered issues with stability of the product.
What do I think about the scalability of the solution?
I have not encountered any issues of scalability function. We do have to pay extra according to the number we are placing on the scan. So, when you want to be covered for the scalability, you will have to pay more.
How was the initial setup?
The initial setup was straightforward. It was quite simple. We just needed to download the image from the website, and onto our service team.
What's my experience with pricing, setup cost, and licensing?
Qualys is considered more expensive versus other products on the market.
Which other solutions did I evaluate?
We were previously using McAfee. We had to switch because McAfee stopped producing the solution we needed. We considered Tenable Nessus, but we chose Qualys in the end.
What other advice do I have?
I advise that you see if this solution can fit your problems, and help your needs.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Engineer at a tech services company with 1,001-5,000 employees
The main purpose was to remove the granularity. It really helped us manage the security of our organization.
Pros and Cons
- "It is a simple solution that makes scanning easy. You just give it a scheduled task, and it will do everything for you."
- "The reporting is fine."
- "The only improvement I can think of is on the implementation side. At times it is a bit slow."
What is our primary use case?
My primary use case is for the web application scans of websites. I also made some new search profiles and other scanning profiles.
How has it helped my organization?
Before using Qualys, we had other security tools. And, the main purpose was to remove the granularity. We had so many attacks every day. Qualys really helped us manage the security for our operations.
What is most valuable?
The most valuable features are that it is a simple solution that makes scanning easy. You just give it a scheduled task, and it will do everything for you. The reporting is fine, too. And, the knowledge base is pretty good, too.
What needs improvement?
The only improvement I can think of is on the implementation side, otherwise the operation is fine. At times it is a bit slow.
Qualys is really nice, but people only use Qualys for the VM and web scan. They just file the report, and send the report to the customer or client. They don't do anything with the reports. They will get the report, and there are usually 30 to 40 vulnerabilities, not in the web servers. And, of those 30 vulnerabilities, 10 or 15 were usually the first cases. In case of those vulnerabilities are around 50, in which around 50-60% of vulnerabilities are usually found worse. So, for those cases, was pretty low and in Qualys we have to look for them also. Whenever the report comes, we just send the report from the client. And that was one of the biggest issues. So, in this area, we only have to actually check the vulnerabilities in the report. You just have to catch a little bit of this, when we do the type or not. That was one of the issues we had with Qualys.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No, we have not experienced any issues with stability of the product at all.
What do I think about the scalability of the solution?
I have not encountered issues with scalability of the solution. I had scanned 77 servers at a time, and found no issues with scalability while doing so.
How are customer service and technical support?
I have not had a need to deal with Qualys tech support.
Which solution did I use previously and why did I switch?
I have previous experience with Tenable Nessus. I like Qualys better because there are so many nice features, it builds better.
What's my experience with pricing, setup cost, and licensing?
I am not personally involved with the pricing or licensing of the solution for our organization.
Which other solutions did I evaluate?
I have prior experience with Alert Logic CloudDefender, RSA, Odyssey and Forcepoint Websense (formerly Raytheon Websense).
What other advice do I have?
A really nice feature of Qualys is the asset management. Some of the end users were using that function, and paid for that particular function. It is helpful to get a bit of history of all types of supports of scanning of particular servers.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Qualys VMDR Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Vulnerability Management IT Asset Management Configuration Management Databases Container Security Risk-Based Vulnerability ManagementPopular Comparisons
ServiceNow
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
SentinelOne Singularity Cloud Security
Tenable Nessus
Tanium
Tenable Security Center
CrowdStrike Falcon Cloud Security
Orca Security
Tenable Vulnerability Management
Rapid7 InsightVM
JFrog Xray
Acunetix
Buyer's Guide
Download our free Qualys VMDR Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Qualys VM vs Tenable Nessus: Comparison
- How does Tenable Nessus compare with Qualys VM?
- How does Pentera compare with Qualys VMDR?
- What are the main differences between Qualys VMDR and Tenable Nessus?
- How inadvisable is it to use a single vulnerability analysis tool?
- What are the benefits of continuous scanning for vulnerability management?
- When evaluating Vulnerability Management, what aspect do you think is the most important to look for?
- What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
- What are the main KPIs that need to be implemented to have better posture in vulnerability projects?
- Which is the best vulnerability scanner tool?
Publish!? Or