Access "Vulnerability Management: QualysGuard Enterprise (2007)"
This article is part of the April 2007 issue of Security Products Readers' Choice Awards 2007
GOLD | QualysGuard Enterprise Qualys Price: $2,995 for an annual subscription Readers applauded vulnerability management gold medal winner QualysGuard Enterprise's ability to identify vulnerabilities quickly and accurately. QualysGuard--which identifies potential network exploits and audits networks for compliance--also received high marks for being easy to install, configure and administer. Respondents praised QualysGuard Enterprise for the breadth of applications and devices with which it works; vendor service and support; and ROI, which most respondents rated "excellent" or "good." Readers weren't as effusive about QualysGuard's ability to integrate with threat management systems, with many rating that feature "good" or "fair." QualysGuard Enterprise 5.0, which was announced in February at RSA Conference 2007 and went into general release last month, boasts a revamped GUI; accelerated scanning through parallelization of scanner appliances; enhanced reporting features; and the ability to track scanning usage by business unit, according to company officials... Access >>>
Premium Content for Free.
Vulnerability Management: QualysGuard Enterprise (2007)
2007 Readers' Choice Awards Vulnerability assessment, management
2007 Readers' Choice Awards Network intrusion detection/prevention appliances and software
Prospective Buyers Want Answers
SANS WhatWorks The SANS Institute's WhatWorks program identifies three critical areas of concern for security managers.
Database security, software appliances review: Readers Choice Awards
In this Readers Choice Award product review of database security products and software appliances, learn about pricing and ratings on Symantec, AppDetective and Imperva SecureSphere products and appliances.
Identity and Access Management product reviews: Readers Choice Awards
In this Reader's Choice Award product review of identity and access management and provisioning products, learn about security features and get pricing info on Novell, RSA and Oracle IAM and provisioning products.
Endpoint Security: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Pre- and post-connection network access control
Emerging Technologies: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Innovative and effective solutions to tough security problems
Risk and Policy Management
2007 Readers' Choice Awards Risk, policy, configuration and vulnerability management
2007 Readers' Choice Awards Unified threat management products
- Vulnerability Management: QualysGuard Enterprise (2007)
2007 Readers' Choice Awards Wireless security products
2007 Readers' Choice AwardsMethodology
Selecting the 2007 Readers' Choice Awards
Antimalware: McAfee VirusScan Enterprise and AntiSpyware Enterprise
2007 Readers' Choice Awards Desktop and gateway enterprise antimalware products.
Application Security: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Source code and web application scanners and appliances
Authentication: 2007 Readers' Choice Awards
2007 Readers' Choice Awards Digital identity verification
Secure Remote Access
2007 Readers' Choice Awards Secure remote access products
2007 Readers' Choice Awards Network firewall appliances and software
Security information, event management systems: Readers Choice Awards
Get the Information Security Readers Choice Award results for security information management system (SIMs) products from vendors like Archsight, Check Point and NetIQ.
2007 Readers' Choice Awards Email, IM and VoIP secuirty
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...