Home/Vulnerability Management Software/InsightVM vs Qualys VMUpdated on: March 29, 2024

Compare InsightVM vs Qualys VM

Remove
Remove
Visit Website

Visit Website

ADD PRODUCT
Remove
Remove
Visit Website

Visit Website

Overview

Summary

Rapid7's Insight platform combines Rapid7's library of exposure analytics, global attacker behavior, vulnerability research, Internet-wide scanning data, exploit knowledge and real-time reporting to provide a fully efficient, scalable and smart way to collect and analyse your vulnerability data. It provides live vulnerability and endpoint analyses by collecting data from all of your endpoints, even those from distant employees and sensitive assets that can't be actively scanned or only join the corporate network on rare occasions. InsightVM offers smart tools and anyone, from system administrators to CISOs can simply design custom cards and customize dashboards, using easy language to monitor the progress of your security program. With threat feeds and business context to back it up, InsightVM allows you to prioritise vulnerabilities like an attacker would. With Insight VM, your security teams can use Remediation Projects to assign and track remediation tasks in real time, giving them constant visibility into how successfully issues are being resolved. Additionally, users can connect InsightVM with IT's ticketing systems, allowing remediation to be effortlessly integrated into their regular tasks. ..show more

Qualys VM is an appropriate vulnerability management software offering scalable, advanced and extensible solutions against threats. Enterprises can use the software to get a detailed view of their IT assets, their vulnerability position along with accurate protection options. The software when teamed with Continuous monitoring technology, sends proactive alerts to InfoSec teams, about potential threats before they get turned into breaches. It uses Six Sigma accuracy to run detailed and continuous scans protecting the IT assets of the enterprises located in the clouds, on-premises and mobile endpoints. An executive dashboard within, the software displays a detailed overview of the security postures along with comprehensive remediation options. Organizations can also use Qualys VM to detect forgotten devices and visualize their network map. They can uncover multiple access points, devices and web servers which can leave their network vulnerable to attacks. Admins can configure the hosts and their scanning options. The software also offers manual, scheduled and continuous vulnerability scanning options. ..show more

TECHNICAL DETAILS

Access Monitoring

24/7 (Live rep)

Business Hours

Online

Contact Number/Address

Boston, Massachusetts / +1-617-247-1717

Foster City, California / +1 800-745-4355

API

Deployment

SaaS/Web/Cloud

Mobile - Android

Mobile - iOS

Mobile - Windows

Mobile - BlackBerry

Installed - Windows

Installed - Mac

Customers

Individuals

Freelancers

Large Enterprises

Medium Business

Small Business

Pricing

Pricing Model

Free Trial

Freemium

One-time license

Open-source

Subscription

Quotation Based

Plans

InsightVM
$22 Others

$22 per asset

Features

  • On-Premises, Cloud, and Virtualized Infrastructure Assessment
  • Unlimited Discovery Scanning and Scan Engines
  • Risk Scoring Based on Attacker Analytics
  • Container Assessment
  • IT-Integrated Remediation Projects
  • Integrated Threat Feeds
  • Automation-Assisted Patching and Automated Containment
View Price Page
Qualys VM
Custom

Features

  • Organize your host assets
  • Scan for vulnerabilities
  • Identify and prioritize risks
  • Remediate vulnerabilities
  • Custom reports
  • Dashboards
View Price Page

SCREENSHOTS

InsightVM Screenshots
View 4 screenshot(s)
Qualys VM Screenshots
View 6 screenshot(s)

ALTERNATIVES

Top alternatives to InsightVM

Qualys VM
Qualys VM
Nessus
Nessus
SecPod SanerNow CVEM
SecPod SanerNow CVEM
Whitespots
Whitespots
RiskProfiler
RiskProfiler

Top alternatives to Qualys VM

Indusface WAS
Indusface WAS
SecPod SanerNow CVEM
SecPod SanerNow CVEM
Whitespots
Whitespots
RiskProfiler
RiskProfiler
Hacker AI
Hacker AI