Try our new research platform with insights from 80,000+ expert users

Axonius vs Qualys CyberSecurity Asset Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 20, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Axonius
Ranking in Cyber Asset Attack Surface Management (CAASM)
2nd
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
7
Ranking in other categories
IT Vendor Risk Management (5th)
Qualys CyberSecurity Asset ...
Ranking in Cyber Asset Attack Surface Management (CAASM)
3rd
Average Rating
9.2
Reviews Sentiment
7.7
Number of Reviews
22
Ranking in other categories
Vulnerability Management (8th), Patch Management (6th), Attack Surface Management (ASM) (3rd), Software Supply Chain Security (4th)
 

Mindshare comparison

As of June 2025, in the Cyber Asset Attack Surface Management (CAASM) category, the mindshare of Axonius is 35.2%, down from 40.0% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 7.5%, up from 2.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

Ashok Gunnia - PeerSpot reviewer
Integrates with ServiceNow and provides alerts for deviations
The most valuable feature of Axonius is its ability to deduplicate records and identify which ones are old and stale versus those more relevant. For example, if you haven't logged in today but a system somewhere else mentions you have, Axonius can detect this through various logs like Active Directory, file logging, or Wi-Fi connections. Traditionally, someone would have to make numerous calls and spend a lot of time to find out if you are on-site or connected to a Wi-Fi network. The tool simplifies this process. From my experience, onboarding and adding connectors was pretty easy, especially when integrating with the ServiceNow environment. It worked well for my use case, but the ease of use can depend on the customer's specific needs and what they are trying to achieve.
Scott Frederick - PeerSpot reviewer
Well-integrated with our vulnerability scanning utilities and efficient in asset tagging and identification
Our favorite features are the tagging and the ability to quickly find assets in the portal. Additionally, I do like the fact that Qualys CSAM is integrated with the rest of our vulnerability scanning utilities. We use the full suite from Qualys. The fact that it is integrated makes it very easy to understand. It shares tagging information with VMDR. That is very nice. Qualys CSAM has discovered assets not previously covered by our vulnerability management program. Primarily, if we have assets without vulnerabilities, they become less visible, but Qualys CSAM alerts us to them because they have IP addresses and are attached to our network. It could discover everything from printers to servers to endpoints. It could discover UPSs, network devices, and across all operating systems. It discovers our security badge readers and digital signage. We have to feed that the IP address ranges, but beyond that, it finds everything in our internal network. We were able to realize its benefits within the first quarter of installing it. We did have to take some time to learn it and understand how to operationally leverage what it was telling us, but it was very quick. In addition to vulnerabilities, Qualys CSAM helps identify other risk factors to a degree. For instance, we can see if servers or assets have incorrect naming standards. We have our network segmented into development model, test, and production, and we have server naming standards that identify which management they should be in. If a production server has the naming standard of a development model server, we can find that. That is one area we have used it for. We are not fully using TruRisk, but we are using the Qualys detection score that is central to our corporate risk prioritization approach. It has completely replaced our homegrown one.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The automation capabilities in Axonius have streamlined our security operations."
"I like that the tool has a user-friendly interface. It helps organizations and big companies improve business requirements and control processes."
"Overall, I would rate Axonius an eight out of ten."
"he best feature I found in Axonius is that it shows us the duration of eCheck, and it shows us what device is down and in which part of the system life cycle or the checking part the system is down in."
"The solution's technical support was good...The product's initial setup phase is pretty straightforward."
"Axonius provides preconfigured dashboards that can be customized to your needs."
"The most valuable feature is the real-time visibility Qualys CyberSecurity Asset Management provides into all assets across our development and operational environments."
"The most valuable feature is the Management sensor, which helps identify gaps in policy agent availability, thereby improving agent utilization."
"The most valuable features of Qualys CSAM include the ability to manage authorized and unauthorized applications efficiently. This feature helps in validating applications and maintaining a secure environment."
"The best feature is asset discovery through their cloud agent or IP-based scanning."
"The integration with different third-party tools, such as cloud providers like Azure and AWS, and asset management tools like CMDB systems, is valuable."
"I would rate Qualys CSAM a ten out of ten."
"Our favorite features are the tagging and the ability to quickly find assets in the portal."
"Authorized and unauthorized software visibility is the best feature for me. It helps me understand security controls on our network and where we lack visibility. With a single security tool, we are able to get an extensive list."
 

Cons

"Axonius could improve by increasing their integrations with more technology vendors."
"Adding more detailed descriptions or YouTube videos about specific features would help improve the application."
"We can have fetch cycle issues."
"For Axonius, I would suggest supporting more ticketing platforms and enhancing API integration directly into the platform rather than just the connector. This would allow for better integration from different systems, possibly into workflows, which I think is currently lacking."
"Regarding the improvement of Axonius, it goes halfway for both the tool and the user. If we set it up quickly from our end, and if the AD groups and all other groups assigned to tag the assets have been tagged correctly, Axonius could not show an error."
"Axonius can improve on delivering compliance-related features."
"For us, the product's deployment phase was a little challenging because we had to deal with other departments and business units."
"The main aspect that needs improvement is the user interface, which should be more intuitive."
"Based on the company's budget, Qualys offers limited features, which can also be utilized in other environments."
"In my opinion, the area that needs improvement is the role-based access control (RBAC). The access privilege management needs to be more robust and streamlined to enhance user access management."
"In our reporting, we faced a challenge syncing with cloud devices."
"In my opinion, the area that needs improvement is the role-based access control (RBAC). The access privilege management needs to be more robust and streamlined to enhance user access management. Additionally, improvements to the user interface could be beneficial."
"They should address the false positives generated in EASM. It is fetching assets that have Infosys as the keyword. They should fix that."
"Some areas that would be helpful are more comprehensive tagging and the ability to set up better dynamic rules."
"There can be further simplification to reduce the overall noise and provide ESAM-related data."
 

Pricing and Cost Advice

"Axonius is quite a bit cheaper compared to other solutions."
"We are on a subscription model with them."
"The cost for Qualys CyberSecurity Asset Management is high."
"Though the solution is considered expensive, if bundled with other services such as VMDR or cloud agents, its value would significantly increase. It is currently a bit costly, but with bundling, it could become attractive to more customers."
"The pricing is market-competitive."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"The pricing is fair. I would love to see the price come down a little bit, but we do get a lot of value out of it. We are squeezing every ounce of value we can out of the tool."
"The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution."
"Qualys offers excellent value for money."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
857,162 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Government
10%
Computer Software Company
9%
Manufacturing Company
7%
Computer Software Company
19%
Financial Services Firm
14%
Government
9%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Axonius?
Axonius is somewhat costly and has a price above average. It provides great value, but obtaining significant discounts can be challenging. As the tools are unique, they have limited direct competit...
What needs improvement with Axonius?
Axonius could improve by increasing their integrations with more technology vendors. There are cases where Axonius doesn't have full compatibility with some newer solutions that have recently appea...
What is your primary use case for Axonius?
The general use case for Axonius ( /products/axonius-reviews ) is cybersecurity asset management. My company, an IT solution provider, works with Axonius ( /products/axonius-reviews ) to offer both...
What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management?
The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution.
What needs improvement with Qualys CyberSecurity Asset Management?
Qualys CyberSecurity Asset Management helps us prioritize assets according to operating system, kernel version, installed software, and current version information. The ASM assists with attack surf...
What is your primary use case for Qualys CyberSecurity Asset Management?
We are using Qualys CyberSecurity Asset Management for daily activities such as identifying new assets through network scanning and agent-based scanning for newly provisioned assets. When any new a...
 

Overview

 

Sample Customers

Extreme Engineering Solutions, AppsFlyer, Landmark Health, Natera
Information Not Available
Find out what your peers are saying about Axonius vs. Qualys CyberSecurity Asset Management and other solutions. Updated: April 2025.
857,162 professionals have used our research since 2012.