Overview
Product Information on Qualys Endpoint Detection & Response
What is Qualys Endpoint Detection & Response?
Qualys Endpoint Detection & Response Pricing
Qualys Endpoint Detection & Response Product Images


Overall experience with Qualys Endpoint Detection & Response
“Cloud-Based Deployment Eases Management Despite Less Mature Threat Detection Capabilities”
“EDR Implementation Easy but Platform Changes and Integration Require Additional Effort”
About Company
Company Description
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.
Company Details
Do You Manage Peer Insights at Qualys?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
Reviewer Insights for: Qualys Endpoint Detection & Response
Performance of Qualys Endpoint Detection & Response Across Market Features
Qualys Endpoint Detection & Response Likes & Dislikes
What I like most about the product is the integration with the broader Qualys platform.. Having vulnerability management, asset management, and EDR capabilities in one place helps security teams correlate vulnerabilities with active threats and respond faster, The agent-based approach is lightweight and easy to deploy across large environments !!
What I like most about the product is the integration with the broader Qualys platform.. Having vulnerability management, asset management, and EDR capabilities in one place helps security teams correlate vulnerabilities with active threats and respond faster, The agent-based approach is lightweight and easy to deploy across large environments !!
What I like most about the product is the integration with the broader Qualys platform.. Having vulnerability management, asset management, and EDR capabilities in one place helps security teams correlate vulnerabilities with active threats and respond faster, The agent-based approach is lightweight and easy to deploy across large environments !!
The EDR detection logs and graphs were sometimes hard to navigate. The integrations between EDR and their other offerings need to be turned on manually. Our Qualys portal changed locations a few times as well which at one point required us to set up new accounts.
The EDR detection logs and graphs were sometimes hard to navigate. The integrations between EDR and their other offerings need to be turned on manually. Our Qualys portal changed locations a few times as well which at one point required us to set up new accounts.
The EDR detection logs and graphs were sometimes hard to navigate. The integrations between EDR and their other offerings need to be turned on manually. Our Qualys portal changed locations a few times as well which at one point required us to set up new accounts.
Top Qualys Endpoint Detection & Response Alternatives
Peer Discussions
Qualys Endpoint Detection & Response Reviews and Ratings
- MANAGER, IT SECURITY AND RISK MANAGEMENT50M-1B USDFinance (non-banking)Review Source
Cloud-Based Deployment Eases Management Despite Less Mature Threat Detection Capabilities
Overall, our experience with Qualys Endpoint Detection & Response has been positive, Since we were already using the Qualys platform for vulnerability management, integrating EDR capabilities into the same ecosystem helped streamline security operations. The platform provides good visibility into endpoint activity and helps correlate vulnerabilities with real-time threat detection, which is valuable for prioritizing risks.. The cloud-based architecture also makes deployment and management relatively straightforward compared to traditional endpoint security tools



