What is Qualys?
Show LessContact Details
Qualys, Inc.
Located in United States, California, Foster City
Founded in 1999
- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Container Security Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Qualys Pricing
Check out our offers for each of our packages to get best out of the software
Visit us on our website to know more
Get a custom quote
Qualys Features
Primary Features
Access Controls/Permissions
Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.
Access Controls/Permissions
Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.
Container Scanning
Container security scanning can ensure that bugs and security vulnerabilities are not carried into production and that vulnerable images are not used to create production containers.
Container Scanning
Container security scanning can ensure that bugs and security vulnerabilities are not carried into production and that vulnerable images are not used to create production containers.
Continuous Integration
Continuous Integration implies that developers must gain a thorough understanding of the full spectrum of risks facing a container.
Continuous Integration
Continuous Integration implies that developers must gain a thorough understanding of the full spectrum of risks facing a container.
Policy Management
Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.
Policy Management
Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.
Runtime Container Security
With container runtime security, you get full, granular visibility into running containers, as well as the ability to enforce policies that govern containers' behavior.
Runtime Container Security
With container runtime security, you get full, granular visibility into running containers, as well as the ability to enforce policies that govern containers' behavior.
Security Auditing
Container security auditing is the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.
Security Auditing
Container security auditing is the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.
Vulnerability Scanning
It allows you to scan images for vulnerabilities and configuration issues before using them. The goal is to help you verify your containers' security and detect configuration issues or vulnerabilities before you deploy your application.
Vulnerability Scanning
It allows you to scan images for vulnerabilities and configuration issues before using them. The goal is to help you verify your containers' security and detect configuration issues or vulnerabilities before you deploy your application.
Monitoring
Container monitoring is the practice of collecting metrics and tracking the health of containerized applications and microservices architectures.
Monitoring
Container monitoring is the practice of collecting metrics and tracking the health of containerized applications and microservices architectures.
Third Party Integrations
A third-party integration is a connection between two or more apps that is built on an external platform.
Third Party Integrations
A third-party integration is a connection between two or more apps that is built on an external platform.
Audit Management
Audit management is an assessment of how well an organization's management team is applying its strategies and resources.
Audit Management
Audit management is an assessment of how well an organization's management team is applying its strategies and resources.
Real Time Monitoring
Real-time monitoring is a technique that allows you to determine the current state of queues and channels within a queue manager.
Real Time Monitoring
Real-time monitoring is a technique that allows you to determine the current state of queues and channels within a queue manager.
Secondary Features
- Vulnerability Protection
- Vulnerability Protection
- Search/Filter
- Search/Filter
- Activity Dashboard
- Activity Dashboard
- Endpoint Management
- Endpoint Management
- Reporting & Statistics
- Reporting & Statistics
- Api
- Api
- Activity Tracking
- Activity Tracking
- Audit Trail
- Audit Trail
Compare with Similar Products
Lacework Container Security
Docker Engine
Snyk.
Sysdig
Wallarm API Security Platform
Anchore
Aqua Container security
Datadog
WhiteSource container security
Red Hat