Best IT Security Software for Qualys WAS

Find and compare the best IT Security software for Qualys WAS in 2025

Use the comparison tool below to compare the top IT Security software for Qualys WAS on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,297 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    SaltStack Reviews
    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments. SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date. Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
  • 3
    Splunk Cloud Platform Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 4
    Forescout Reviews

    Forescout

    Forescout Technologies

    1 Rating
    It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
  • 5
    Skybox Security Reviews
    Skybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes
  • 6
    ImmuniWeb Reviews

    ImmuniWeb

    ImmuniWeb

    $499/month
    ImmuniWeb is a worldwide application security company. ImmuniWeb's headquarter is located in Geneva, Switzerland. Most of ImmuniWeb's customers come from banking, healthcare, and e-commerce. ImmuniWeb® AI Platform leverages award-winning AI and Machine Learning technology for acceleration and intelligent automation of Attack Surface Management and Dark Web Monitoring. ImmuniWeb also is a Key Player in the Application Penetration Testing market (according to MarketsandMarkets 2021 report). ImmuniWeb offers a contractual zero false-positives SLA with a money-back guarantee. ImmuniWeb’s AI technology is a recipient of numerous awards and recognitions, including Gartner Cool Vendor, IDC Innovator, and the winner of “SC Award Europe” in the “Best Usage of Machine Learning and AI” category. ImmuniWeb® Community Edition runs over 100,000 daily tests, being one of the largest application security communities. ImmuniWeb offers the following free tests: Website Security Test, SSL Security Test, Mobile App Security Test, Dark Web Exposure Test. ImmuniWeb SA is an ISO 27001 certified and CREST-accredited company.
  • 7
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 8
    NopSec Reviews
    Cyber defenders can now manage the complex processes that make cyber exposure impossible to manage. NopSec's platform provides cyber defenders with an end-to-end way to bring these processes together. It allows them to identify, prioritize, remediate and simulate cyber exposures and then report them. You can't protect what's in your environment if you don't know. To manage cyber risk, adaptive cyber management requires complete visibility of your IT assets. Nopsec helps you avoid potential blind spots caused by unmanaged cyber risk and cyber exposures.
  • 9
    LogRhythm SIEM Reviews
    We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost.
  • 10
    Phoenix Security Reviews

    Phoenix Security

    Phoenix Security

    $3,782.98 per month
    Phoenix Security helps security, developers and businesses speak the same language. We help security professionals focus their efforts on the most critical vulnerabilities across cloud, infrastructure and application security. Laser focuses only on the 10% of security vulnerabilities that are important today and reduces risk quicker with contextualized vulnerabilities. Automatically integrating threat intelligence into the risk increases efficiency and enables fast reaction. Automatically integrating threat intelligence into the risk increases efficiency and enables fast reactions. Aggregate, correlate, and contextualize data from multiple security tools, giving your business unprecedented visibility. Break down the silos that exist between application security, operations security, and business.
  • 11
    runZero Reviews

    runZero

    runZero

    $5,000 for 500 assets
    Active scanning, passive detection, and API integrations combine to create a powerful platform that delivers complete visibility across IT, OT and IoT environments, as well as cloud, mobile and remote environments. Some CAASM tools rely solely upon integrations to inventory the network. However, these other tools are notoriously insufficient because they rely on sources that already exist. runZero combines active scanning, passive discovery and integrations to give you a complete picture. Our unique, safe scanning tech collects data just like an attacker, extracting asset detail to deliver mind-blowing in-depth fingerprinting, insights, and OSs, Services, Hardware, and more. runZero reveals all kinds of things that you didn't know were on your network. These include unmanaged assets, unpatched software, misconfigured cloud resources, rogue OT-devices, and unknown subnets.
  • 12
    Cisco Vulnerability Management Reviews
    You can't fix all the vulnerabilities. Use extensive threat intelligence and patented prioritization techniques to reduce costs, save time and keep your team focused on reducing your biggest risks. This is Modern Risk-Based Vulnerability management. We developed Risk-Based Vulnerability Management and are now defining the modern model. Show your IT and security teams which infrastructure vulnerabilities need to be remedied, and when. Our latest version shows that exploitability is measurable, and accurately calculating exploitability will help you minimize it. Cisco Vulnerability Management, formerly Kenna.VM, combines real-world exploit and threat intelligence with advanced data science in order to determine which vulnerabilities are the most risky and which can be deprioritized. Spoiler alert! Your mega-list will shrink faster than the woolen sweater-vest on a hot wash cycle.
  • 13
    Imperva Advanced Bot Protection Reviews
    Protect your websites, mobile apps, and APIs against automated attacks without affecting business-critical traffic. Bad bots can cause serious damage to your business through online fraud, such as account takeovers and competitive price scraping. Imperva's Advanced Bot Protection can reduce negative business effects and eliminate bad bot traffic. Advanced Bot Protection will transform your online business performance. Flexible deployment options are available to meet your business needs. Use Imperva's Cloud Application Security platform, or a Connector for popular technology stacks. Advanced Bot Protection allows visibility and control over bot traffic, good and bad, without imposing any friction on legitimate users.
  • 14
    Quiver Reviews

    Quiver

    Castle Shield

    Quiver - Log Management Solutions That Are Advanced and Easy-To-Use Quiver™ helps you identify and mitigate threats, system breach, and policy violations. Quiver™, a cost-effective, flexible, and powerful log management and monitoring solution, combines complete log management, powerful correlation technology, log monitoring, real-time log correlation, and log monitoring - all in one appliance. Quiver™, offers organizations of all sizes, and industries. Quiver™, a comprehensive suite of log management, threat detection, and risk reduction tools, is available to all organizations.
  • 15
    MetricStream Reviews
    Forward-looking risk visibility helps to reduce losses and prevent future events. Modern integrated risk management with real-time aggregated data on risk and their impact on investments and business objectives. Protect brand reputation, reduce compliance costs, and gain the trust of regulators and boards. Keep up-to-date with evolving regulatory requirements and proactively manage compliance risk, policies, cases, controls assessments. By aligning audits with strategic imperatives, business goals and risks, you can drive risk-awareness and accelerate business performance. Provide timely insights into risks and improve collaboration between different functions. Reduce third-party risk exposure and make better sourcing decisions. Continuous third-party compliance, performance monitoring and continuous third-party risks monitoring can help prevent third-party incidents. All aspects of third-party risk management can be simplified and streamlined.
  • 16
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 17
    Brinqa Reviews
    Brinqa Cyber risk graph presents a complete and accurate picture about your IT and security ecosystem. All your stakeholders will receive timely notifications, intelligent tickets, and actionable insights. Solutions that adapt to your business will protect every attack surface. A strong, stable, and dynamic cybersecurity foundation will support and enable true digital transformation. Brinqa Risk Platform is available for free. Get instant access to unparalleled risk visibility and a better security posture. The Cyber Risk Graph shows the organization's infrastructure and apps in real-time. It also delineates interconnects between business services and assets. It is also the knowledge source for organizational cybersecurity risk.
  • 18
    Qualys WAF Reviews
    Qualys Web App Firewall (WAF), a virtual appliance-based service, reduces operational costs and simplifies application security. It uses a unified platform to continuously detect and patch web application vulnerabilities using inhouse inspection rulesets and logics. Its simple, adaptable, and adaptable approach allows you to quickly block web app attacks, prevent disclosure of sensitive data, and control where and when your applications are accessed. Qualys WAF is available as a standalone tool or in combination with Qualys Web Application Scanning. They make it easy to identify. You can easily mitigate web application risks, no matter how many apps you have. Qualys WAS scans your web applications and deploys virtual patches in a click for identified vulnerabilities in WAF. All this is done from a central cloud-based portal. Qualys WAF is easy to deploy and supports SSL/TLS.
  • 19
    ThreatConnect Risk Quantifier (RQ) Reviews
    ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level decisions by quantifying them based on the business, the technical environment, and industry data. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls. Automated outputs are generated in hours for reporting that is more current and relevant. By automating risk modelling, the vendor states customers get a fast start and can critique, or tune models over time instead of having to create their own. They use historical breach data and threat intelligence upfront in order to save months of data collection and remove the burden of continuous updating.
  • 20
    Citrix Analytics Reviews

    Citrix Analytics

    Cloud Software Group

    $3 per user per month
    You need to ensure that assets and employees are protected in real-time to protect sensitive data. Citrix Analytics for Security provides proactive security protection without compromising your employees' experience. Analytics intelligence provides security for your employees, IT environment, content, and assets. With proactive visibility throughout your organization, you can pinpoint threats to your data. Citrix is a leader in virtual client computing, according to the IDC MarketScape. You can quantify user experience and determine the health of your environment. Employees can enjoy a high-quality, virtual experience on any device. Intelligent workspace platforms can transform the employee experience. Our Customer Success Services (CSS Select) program is included with your subscription. It offers 24/7 support, expert guidance and flexible training. It also includes proactive monitoring. We are focused on one goal: your success.
  • 21
    Security Auditor Reviews

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management, file integrity monitoring software. Security Auditor centralizes security administration in your cloud, hybrid, or on-premise environment. Our agentless technology makes it easy to enforce security policies quickly and reduce the risk of security misconfigurations, which are a major cause of data breaches. Security Auditor automatically protects all new systems as they are created and monitors them continuously to identify any configuration settings that do not meet your requirements. An easy-to-use web-based console allows you to make changes and receive notifications about any policy exceptions. This simplifies compliance reporting requirements and simplifies tasks. You can also run the FixIt function to automate the process and let Security Auditor handle the rest. Security Auditor makes it easy to identify and configure security settings for your elastic cloud infrastructure.
  • 22
    Bugcrowd Reviews
    Crowdcontrol's advanced security automation and analytics connect and enhance human creativity. This allows you to find and fix higher priority vulnerabilities faster. Crowdcontrol offers the insight you need to increase impact, measure success and protect your business, from intelligent workflows to robust program monitoring and reporting. Crowdsource human intelligence on a large scale to quickly identify high-risk vulnerabilities. Engage with the Crowd to take a proactive, pay for results approach. A framework to identify vulnerabilities and meet compliance will help you reduce risk and meet compliance. Find, prioritize, manage, and reduce your unknown attack surface.
  • 23
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 24
    Hexway Pentest Suite Reviews
    Hexway Hive & Apiary allows you to efficiently collaborate with your team and generate detailed reports that can be used for action. It also helps you build better relationships with customers.
  • 25
    RedSeal Reviews

    RedSeal

    RedSeal Networks

    All your network environments, public clouds, private clouds, on premises, are secured in one dynamic visualization. All four branches of military trust this visualization. It includes the most trusted financial institutions and power grid companies in the world, as well as mission-critical government agencies. The digital transformation is driving cloud migration, especially with so many people working remotely. Security teams are trying to manage security for resources in both public clouds and on-premises resources. Security tools are limited to one of these environments. This leaves security teams with common concerns. Ensure security compliance with network segmentation policies and regulations by continuously validating and ensuring that they are being followed.
  • Previous
  • You're on page 1
  • 2
  • Next