Software Alternatives & Reviews

OWASP Dependency-Track VS Qualys

Compare OWASP Dependency-Track VS Qualys and see what are their differences

OWASP Dependency-Track logo OWASP Dependency-Track

OWASP Dependency-Track is an intelligent Software Composition Analysis (SCA) platform that allows...

Qualys logo Qualys

Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.
  • OWASP Dependency-Track Landing page
    Landing page //
    2023-02-03
  • Qualys Landing page
    Landing page //
    2023-09-23

OWASP Dependency-Track videos

No OWASP Dependency-Track videos yet. You could help us improve this page by suggesting one.

+ Add video

Qualys videos

Qualys Review by SecNetlab

More videos:

  • Review - Introduction to QualysGuard Vulnerability Management
  • Review - Qualys Security Assessment Questionnaire

Category Popularity

0-100% (relative to OWASP Dependency-Track and Qualys)
Security
15 15%
85% 85
Code Analysis
100 100%
0% 0
Monitoring Tools
0 0%
100% 100
Web Application Security
10 10%
90% 90

User comments

Share your experience with using OWASP Dependency-Track and Qualys. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare OWASP Dependency-Track and Qualys

OWASP Dependency-Track Reviews

We have no reviews of OWASP Dependency-Track yet.
Be the first one to post

Qualys Reviews

7 Best Container Security Tools & Solutions 2022
Qualys Container Security is one of 21 applications that fall under the Qualys Cloud Platform umbrella. The Cloud Platform is available for the cloud and on-premises container deployments. Qualys’ Container Runtime Security (CRS) feature is an add-on that allows enterprises to monitor container runtime; administrators set policies that govern container behavior, and CRS...
10 Best Tenable Nessus Alternatives For 2021 [Updated List]
Qualys is a cloud-based application security scanner that is known for its ability to crawl every corner of your IT network’s portfolio to detect all types of web assets. It grants users full 24/7 visibility of their entire network. It can automatically detect and catalog those assets based on how important they are. This helps security teams prioritize their response to...
Best Nessus Alternatives (Free and Paid) for 2021
Qualys is a cloud platform that continuously detects and protects against attacks anytime, anywhere. It is next-generation vulnerability management for hybrid IT environments. Qualys’ integrated approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively.
16 Tresorit Alternatives
Qualys’s Guard has also deployed security on-demand platforms in the world, performing more than 150 million IP audits per year with no software to install and maintain. It is a simple yet powerful security solution that comes with a powerful dashboard where you can easily access all features, tracks threats, analyses data, and generates reports, etc. It also has a list of a...

Social recommendations and mentions

Based on our record, OWASP Dependency-Track seems to be more popular. It has been mentiond 19 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

OWASP Dependency-Track mentions (19)

  • Show HN: Pre-alpha tool for analyzing spdx SBOMs generated by GitHub
    I've become interested in SBOM recently, and found there were great tools like https://dependencytrack.org/ for CycloneDX SBOMs, but all I have is SPDX SBOMs generated by GitHub. I decided to have a go at writing my own dependency track esque tool aiming to integrate with the APIs GitHub provides. It's pretty limited in functionality so far, but can give a high level summary of the types of licenses your... - Source: Hacker News / 12 days ago
  • SQL Injection Isn't Dead Yet
    To detect these types of vulnerabilities, we should first and foremost know our dependencies and versions, and which of them have vulnerabilities. The OWASP Top 10 2021 identifies this need as A06:2021-Vulnerable and Outdated Components. OWASP has several tools for this, including Dependency Check and Dependency Track. These tools will warn about the use of components with vulnerabilities. - Source: dev.to / 22 days ago
  • Krita fund has 0 corporate support
    Https://dependencytrack.org/ You just need to use one of the various tools out there to scan. - Source: Hacker News / 7 months ago
  • Friends - needs help choosing solution for SBOM vulnerability
    OWASP Dependency Track - https://dependencytrack.org/. Source: 11 months ago
  • software inventory of my ECS tasks
    I actually want to build the same thing you are after, and I think I’ll go for the setup you describe in idea 2. The tool you can use for this is Trivy (https://trivy.dev), have it generate a SBOM and send it to Dependencytrack (https://dependencytrack.org). Source: over 1 year ago
View more

Qualys mentions (0)

We have not tracked any mentions of Qualys yet. Tracking of Qualys recommendations started around Mar 2021.

What are some alternatives?

When comparing OWASP Dependency-Track and Qualys, you can also consider the following products

Snyk - Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.

Nessus - Nessus Professional is a security platform designed for businesses who want to protect the security of themselves, their clients, and their customers.

FOSSA - Open source license compliance and dependency analysis

AlienVault USM (from AT&T Cybersecurity) - AlienVault USM Anywhere delivers powerful threat detection, incident response, and compliance management for cloud, on-premises, and hybrid environments.

WhiteSource - Find & fix security and compliance issues in open source libraries in real-time.

Tenable.io - Tenable.io Cyber Exposure platform helps to protect any asset on any computing platform and eliminate blind spots.