Want instant access to real pricing data for 20k software products?

Vendr's purple icon logo
Vendr's purple icon logo

Qualys

Qualys, Inc. provides cloud security, compliance and related services and is based in Foster City, California.

|Visit qualys.com

How much does Qualys cost?

Median buyer pays
$36,374
per year
Based on data from 81 purchases, with buyers saving 13% on average.
Median: $36,374
$4,000
$82,668
LowHigh
See detailed pricing for your specific purchase

About Qualys

Qualys Overview

Qualys, Inc. provides cloud security, compliance and related services and is based in Foster City, California.

Qualys's 23 Products

Qualys Asset Management: Cyber Security Asset Management (CSAM) logo
Qualys Asset Management: Cyber Security Asset Management (CSAM)

Enables organizations to discover, inventory, and classify all IT, cloud, and IoT/OT assets across hybrid environments, providing continuous visibility into asset details and security posture. Integrates data from native sensors and third-party systems to unify asset inventories, assess business criticality, and expose security risks such as unauthorized software or unpatched vulnerabilities.

Qualys Asset Management: External Attack Surface Management logo
Qualys Asset Management: External Attack Surface Management

Organizations gain continuous, outside-in visibility of internet-facing assets to identify previously unknown or unmanaged exposures, enabling proactive security and risk mitigation. The solution automates discovery, attribution, and assessment of external digital assets, providing alerts on vulnerabilities, misconfigurations, certificate issues, and other compliance gaps to help IT and security teams reduce attack surface and prioritize remediation actions.

Qualys Cloud Security: Cloud Detection & Response (CDR) logo
Qualys Cloud Security: Cloud Detection & Response (CDR)

Continuous protection for cloud environments requires rapid detection and automated response to evolving threats. This solution leverages deep learning AI to monitor cloud workloads and network traffic, providing real-time identification of suspicious activity, malware, lateral movement, and advanced threats.

Qualys Cloud Security: Infrastructure as Code (IaC) Security logo
Qualys Cloud Security: Infrastructure as Code (IaC) Security

Detects and remediates security issues in cloud infrastructure by scanning Infrastructure as Code (IaC) templates for misconfigurations prior to deployment. Integrates with CI/CD pipelines and developer tools to provide real-time feedback, support compliance with global standards, and prevent security risks before cloud resources are provisioned.

Qualys Cloud Security: Posture Management (CSPM) logo
Qualys Cloud Security: Posture Management (CSPM)

Organizations address cloud security risks and compliance challenges by continuously monitoring cloud infrastructure for misconfigurations, policy violations, and regulatory compliance across multi-cloud environments. Automated workflows in this solution detect and remediate security issues in real time, providing unified visibility and simplifying the management of cloud security posture.

Qualys Cloud Security: SaaS Security Posture Management (SSPM) logo
Qualys Cloud Security: SaaS Security Posture Management (SSPM)

Minimizing the risk of data breaches and compliance violations in SaaS applications, this solution continuously monitors and manages security settings, user permissions, and configurations across connected SaaS environments. Core capabilities include real-time detection of misconfigurations, suspicious user activity, and excessive privileges, as well as automated compliance checks to ensure alignment with regulatory standards.

Qualys Cloud Security: Total Cloud (CNAPP) logo
Qualys Cloud Security: Total Cloud (CNAPP)

Organizations gain comprehensive visibility and control over risks across multi-cloud and container environments by unifying cloud security posture, workload protection, threat detection, and compliance monitoring in a single platform. The solution leverages AI-powered analytics to prioritize vulnerabilities, detect real-time threats—including malware—and automate remediation, enabling efficient risk management and accelerated security operations.

Qualys Compliance: File Integrity Monitoring (FIM) logo
Qualys Compliance: File Integrity Monitoring (FIM)

Continuous visibility into critical file changes enables organizations to detect unauthorized or suspicious activity, enforce change control policies, and support compliance with requirements such as PCI DSS, HIPAA, and GDPR. This solution monitors file and directory changes across global IT systems—including on-premises, cloud, and remote assets—logging contextual details about what changed, when, and by whom for investigation and reporting.

Qualys Compliance: Policy Compliance logo
Qualys Compliance: Policy Compliance

Automates the assessment of IT assets for compliance with internal security policies and external regulations, reducing manual audit preparation and evidence collection efforts. Delivers continuous monitoring, policy enforcement, and reporting across multiple regulatory frameworks, enabling organizations to identify misconfigurations, ensure adherence, and remediate compliance gaps efficiently.

Qualys PCI Complience logo
Qualys PCI Complience

Enables organizations to automate and streamline the process of meeting PCI DSS (Payment Card Industry Data Security Standard) compliance requirements by providing cloud-based network scanning, vulnerability detection, remediation guidance, and reporting. Businesses can perform required quarterly scans of internet-facing environments, monitor PCI compliance status, and generate reports for auditors and acquiring banks.

Qualys Risk Remediation: Custom Assessment and Remediation (CAR) logo
Qualys Risk Remediation: Custom Assessment and Remediation (CAR)

Automates the assessment and remediation of security risks by enabling organizations to create, manage, and execute custom scripts across their IT assets. Provides a centralized repository and execution framework for custom detections and remediations, supporting multiple scripting languages and platforms.

Qualys Risk Remediation: Patch Management (PM) logo
Qualys Risk Remediation: Patch Management (PM)

Addressing the need for timely, effective risk reduction, this product enables security and IT teams to prioritize, schedule, and automate patch deployment for operating systems and third-party applications across on-premises, cloud, and remote endpoints. Integrated with vulnerability detection and risk factors, it streamlines remediation workflows, helps ensure compliance, and reduces operational overhead through smart automation and direct patch sourcing.

Qualys Risk Remediation: Qualys TruRisk Eliminate (TE) logo
Qualys Risk Remediation: Qualys TruRisk Eliminate (TE)

Enables organizations to proactively reduce cyber risk by providing automated patch management, advanced mitigation, and targeted isolation capabilities that address vulnerabilities before exploitation. Facilitates unified workflows for security and IT teams to remediate issues across cloud, on-premises, and third-party environments—including cases where patching is not possible—thus minimizing exposure to ransomware and known exploited vulnerabilities.

Qualys Threat Detection & Response: Endpoint Detection Response (EDR, EPP) logo
Qualys Threat Detection & Response: Endpoint Detection Response (EDR, EPP)

Reduces the risk of endpoint compromise by providing real-time detection, investigation, and automated response to threats across enterprise devices. Enables security teams to monitor endpoints for suspicious activity, correlate threats with vulnerabilities and patches, and act on incidents using a unified cloud-based platform.

Qualys Threat Detection & Response: Extended Detection & Response (XDR) logo
Qualys Threat Detection & Response: Extended Detection & Response (XDR)

Enables security teams to quickly identify, prioritize, and respond to threats by unifying security telemetry from endpoints, networks, cloud assets, and third-party sources into a single view. Delivers contextual risk assessment, automated incident response, and actionable detection by integrating vulnerability management, asset inventory, and threat intelligence.

Qualys Vulnerability & Configuration Management: API Security logo
Qualys Vulnerability & Configuration Management: API Security

Unsecured APIs pose significant risks by exposing sensitive data and increasing the attack surface across cloud, on-premises, and hybrid environments. This solution automatically discovers and inventories all API assets, conducts AI-powered vulnerability testing against the OWASP API Top 10, and continuously monitors for compliance to industry standards and OpenAPI specifications.

Qualys Vulnerability & Configuration Management: Cloud Workload Protection logo
Qualys Vulnerability & Configuration Management: Cloud Workload Protection

Providing continuous security for cloud workloads across virtual machines, containers, and serverless environments, this solution enables organizations to detect vulnerabilities, unauthorized access, and misconfigurations in real time. Key capabilities include automated vulnerability management, behavioral monitoring, compliance enforcement, and integration with DevOps pipelines for improved visibility, risk mitigation, and operational efficiency in dynamic multi-cloud architectures.

Qualys Vulnerability & Configuration Management: Enterprise TruRisk Management (ETM) logo
Qualys Vulnerability & Configuration Management: Enterprise TruRisk Management (ETM)

Addressing the challenge of fragmented security data and lack of unified risk visibility, this platform aggregates, normalizes, and prioritizes cybersecurity risks across cloud, on-premises, and third-party environments. It enables organizations to quantify cyber risks in business and financial terms, orchestrate automated remediation workflows, and align security strategies with business objectives for more informed decision-making.

Qualys Vulnerability & Configuration Management: Kubernetes and Container Security (KCS) logo
Qualys Vulnerability & Configuration Management: Kubernetes and Container Security (KCS)

Modern containerized and Kubernetes environments face challenges such as vulnerability management, misconfiguration risks, and maintaining compliance across hybrid and multi-cloud deployments. This solution continuously discovers, monitors, and protects container infrastructure by scanning container images and runtime activities for vulnerabilities, misconfigurations, and compliance issues.

Qualys Vulnerability & Configuration Management: Vulnerability Management, Detection & Response (VMDR) logo
Qualys Vulnerability & Configuration Management: Vulnerability Management, Detection & Response (VMDR)

Enables organizations to identify, assess, prioritize, and remediate vulnerabilities across all IT, cloud, container, and OT assets from a single platform. Provides continuous asset discovery, risk-based vulnerability detection, threat prioritization, and automated remediation workflows to reduce exposure and streamline compliance reporting.

Qualys Vulnerability & Configuration Management: Web Application Firewall logo
Qualys Vulnerability & Configuration Management: Web Application Firewall

Addressing the need for immediate protection against web application threats, this solution blocks attacks, applies virtual patches to vulnerabilities, and enforces secure communication protocols. Key capabilities include customizable policies, out-of-the-box templates for popular platforms, integration with vulnerability scanning, and scalability through virtual appliances.

Qualys Vulnerability & Configuration Management: Web Application Scanning (WAS) logo
Qualys Vulnerability & Configuration Management: Web Application Scanning (WAS)

Organizations use this solution to automatically identify vulnerabilities, misconfigurations, and sensitive data exposures in web applications and APIs across diverse environments. It provides dynamic application security testing (DAST), AI-powered API security scanning, and compliance monitoring, enabling efficient discovery, inventory, and risk prioritization to streamline remediation and support regulatory requirements.

Qualys Web Application Scanning logo
Qualys Web Application Scanning

Organizations can address the risk of vulnerabilities and data exposures across their web applications and APIs with automated discovery, scanning, and prioritization. This solution supports detection of OWASP Top 10 vulnerabilities, misconfigurations, personally identifiable information (PII) exposures, compliance issues, and advanced threats using dynamic application security testing (DAST), API security scanning, and AI-powered techniques.

Compare prices for similar companies

Supplier
Qualys
CrowdStrike
Median Contract Value$36,374$51,073
Avg Savings12.58%14.21%

Vendr community insights for Qualys

Company with 201-1000 employeesThis year
"We were able to negotiate the removal of the 5% YOY increase while simultaneously reducing the license count to better support the team's needs and budget constraints."
Company with 201-1000 employeesThis year
"Because of how Qualys packages, it was more cost effective to purchase the package of 5 WAS vs 4 a la cart. "
Company with 201-1000 employeesThis year
"Qualys initially included a 5% uplift at renewal but we were able to get this removed via firm budget, implying competition, and executing the renewal early."
Company with 201-1000 employeesA while ago
"Qualys offers scaled pricing but you may need to ask about it. When we descoped WAS's, they gave us list pricing instead of the scaled pricing. "
Company with 201-1000 employeesA while ago
"Qualys said their pricing is standardized and based on volume and that they don't negotiate beyond that. We made several attempts to negotiate lower rates and tried to leverage an early renewal in exchange but were unsuccessful."
Company with 201-1000 employeesA while ago
"Qualys would not bend on pricing beyond standard volume discount for a new purchase on a 12 month agreement. We decreased seat count to secure ~6,000 in savings."
Company with 201-1000 employeesA while ago
"Qualys provided us with net-60 payment terms with little pushback. "
Company with 201-1000 employeesA while ago
"Qualys doesn’t increase prices, operate on VDP (volume discount pricing) model. If you add users, the price will decrease per user. If you remove users, the price will increase per user. "
Company with 201-1000 employeesA while ago
"We were able to remove the 5% price increase by citing service issues and budget constraints."
Company with 201-1000 employeesA while ago
"We were able to get a 5% renewal uplift waived by leveraging budget restrictions."
Think we got something wrong? Let’s make it right — contact us at support@vendr.com

AI Quote Analysis

Upload your quote to check if you’re getting a fair price, under 2 minutes and completely free.Chart showing an example of a price range
Chart showing an example of a price range

Other companies you might be interested in