Contact Details

Qualys, Inc.

Located in United States, California, Foster City

Founded in 1999

Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Qualys

Lacework Container Security

Lacework Container Security

No ratings yet!
Docker Engine

Docker Engine

No ratings yet!
Snyk.

Snyk.

No ratings yet!
Sysdig

Sysdig

No ratings yet!
Wallarm API Security Platform

Wallarm API Security Platform

No ratings yet!
Anchore

Anchore

No ratings yet!
Aqua Container security

Aqua Container security

No ratings yet!
Datadog

Datadog

No ratings yet!
WhiteSource container security

WhiteSource container security

No ratings yet!
Red Hat

Red Hat

No ratings yet!
View all alternatives

What is Qualys?

Show Less

Contact Details

Qualys, Inc.

Located in United States, California, Foster City

Founded in 1999

Top Industries Represented

Data from Grid Report for Container Security Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Qualys Pricing

Check out our offers for each of our packages to get best out of the software

Visit us on our website to know more

Get a custom quote

Qualys Features

Primary Features

Access Controls/Permissions

Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.

Access Controls/Permissions

Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.

Container Scanning

Container security scanning can ensure that bugs and security vulnerabilities are not carried into production and that vulnerable images are not used to create production containers.

Container Scanning

Container security scanning can ensure that bugs and security vulnerabilities are not carried into production and that vulnerable images are not used to create production containers.

Continuous Integration

Continuous Integration implies that developers must gain a thorough understanding of the full spectrum of risks facing a container.

Continuous Integration

Continuous Integration implies that developers must gain a thorough understanding of the full spectrum of risks facing a container.

Policy Management

Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.

Policy Management

Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.

Runtime Container Security

With container runtime security, you get full, granular visibility into running containers, as well as the ability to enforce policies that govern containers' behavior.

Runtime Container Security

With container runtime security, you get full, granular visibility into running containers, as well as the ability to enforce policies that govern containers' behavior.

Security Auditing

Container security auditing is the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.

Security Auditing

Container security auditing is the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.

Vulnerability Scanning

It allows you to scan images for vulnerabilities and configuration issues before using them. The goal is to help you verify your containers' security and detect configuration issues or vulnerabilities before you deploy your application.

Vulnerability Scanning

It allows you to scan images for vulnerabilities and configuration issues before using them. The goal is to help you verify your containers' security and detect configuration issues or vulnerabilities before you deploy your application.

Monitoring

Container monitoring is the practice of collecting metrics and tracking the health of containerized applications and microservices architectures.

Monitoring

Container monitoring is the practice of collecting metrics and tracking the health of containerized applications and microservices architectures.

Third Party Integrations

A third-party integration is a connection between two or more apps that is built on an external platform.

Third Party Integrations

A third-party integration is a connection between two or more apps that is built on an external platform.

Audit Management

Audit management is an assessment of how well an organization's management team is applying its strategies and resources.

Audit Management

Audit management is an assessment of how well an organization's management team is applying its strategies and resources.

Real Time Monitoring

Real-time monitoring is a technique that allows you to determine the current state of queues and channels within a queue manager.

Real Time Monitoring

Real-time monitoring is a technique that allows you to determine the current state of queues and channels within a queue manager.

Secondary Features

  • Vulnerability Protection
  • Vulnerability Protection
  • Search/Filter
  • Search/Filter
  • Activity Dashboard
  • Activity Dashboard
  • Endpoint Management
  • Endpoint Management
  • Reporting & Statistics
  • Reporting & Statistics
  • Api
  • Api
  • Activity Tracking
  • Activity Tracking
  • Audit Trail
  • Audit Trail

Compare with Similar Products

Lacework Container Security

Lacework Container Security

Docker Engine

Docker Engine

Snyk.

Snyk.

Sysdig

Sysdig

Wallarm API Security Platform

Wallarm API Security Platform

Anchore

Anchore

Aqua Container security

Aqua Container security

Datadog

Datadog

WhiteSource container security

WhiteSource container security

Red Hat

Red Hat

Show Comparisons