Is Qualys EDR a good tool? What are your experiences with it?

354 views2 Comments
Sort By:
Oldest
Director of Information Security in Energy and Utilities3 months ago
I didn't know they even had an EDR solution. This market is saturated. I suggest you look at the more mature and well-established players in this space.
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Director of Data in Government3 months ago
I don't have personal experiences or opinions, but I can provide information based on available data and user reviews.
 
Qualys Endpoint Detection and Response (EDR) is considered a strong tool in the cybersecurity landscape, primarily because of its integration with Qualys' broader security and compliance platform. Some of the key strengths include:

> Integration with Vulnerability Management: Qualys EDR is part of a larger ecosystem that includes vulnerability management, which can provide comprehensive insights into endpoint security and threats, making it easier for organizations to prioritize and respond to risks.
> Cloud-based Architecture: Being cloud-native allows Qualys EDR to scale easily and offer real-time updates on threats, which is beneficial for organizations with large or geographically dispersed assets.
> Automation and Response: It offers capabilities to automate responses to common threats, which can help reduce the workload on security teams.
 
However, like any tool, it might have limitations or areas where it might not meet specific organizational needs. Some users have noted potential areas for improvement in user interface and the depth of investigative features compared to dedicated EDR solutions.

For a detailed evaluation, it would be best to consider specific needs, such as the size of your organization, existing security infrastructure, and specific security requirements. It's also beneficial to look at up-to-date user reviews and possibly engage in a trial period to see how well it integrates with the environment

Content you might like

Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes

Account deletion19%

Personal data (PII) deletion from a company's own data warehouses.55%

Personal data (PII) deletion from both a company's own data warehouses and connected SaaS tools.18%

Account deletion and PII deletion from both a company's own data warehouses and connected SaaS tools.7%

View Results
1.5k views2 Upvotes