Try our new research platform with insights from 80,000+ expert users

D3 Security vs ServiceNow Security Operations comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 5, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Torq
Sponsored
Ranking in Security Orchestration Automation and Response (SOAR)
6th
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
6
Ranking in other categories
AI-SOC (7th), AI-Powered Security Automation (2nd)
D3 Security
Ranking in Security Orchestration Automation and Response (SOAR)
16th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
Security Incident Response (6th), AI-Powered Security Automation (4th)
ServiceNow Security Operations
Ranking in Security Orchestration Automation and Response (SOAR)
9th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Security Incident Response (1st), Risk-Based Vulnerability Management (11th)
 

Featured Reviews

Nimrod Vardi - PeerSpot reviewer
Global IT Director at OpenWeb
Automation workflows have transformed our IT, enabling secure just-in-time access control
We work with them quite often, so we have a direct line regarding areas in Torq that have room for improvement. If we have a feature request, we can request it. I do not have anything in mind at the moment. We were a design partner for a short while, so we feel that they listen and that users of the system have an impact on the way the system is designed for the better. They have a new community, which is something that I personally suggested years ago. There are many people like me in different places and they might have already built the workflow that I need. Having the option to share workflows or to jump on a thread and say I have this need, did anyone ever build a workflow for it, is amazing. Someone would jump in and say yes, sure, here, take this workflow. I think this is an amazing thing and I really hope that the community will come alive because I think this is really powerful. This is something that I already suggested and it did happen eventually, and I am quite happy with it. I do not have any specific feature in mind that I have a need for at the moment.
Muhammad Aamir Riaz - PeerSpot reviewer
Senior Manager Security Operation Center at The Bank of Punjab
Useful for automation and reporting and has open API for seamless integration
It was easy to integrate the tool with our infrastructure because all the APIs are pre-built. We just created a drag-and-drop prompt to integrate the solution with our infrastructure. I rate the overall solution a ten out of ten. Everyone needs to evaluate this solution according to their organization's needs because it can integrate well, but this depends on the technology you already have in your organization. It is an automation tool for detection and response, and while integration is possible, using legacy products could create issues. Some legacy products are closed systems and do not expose their APIs to other vendors. In such cases, you could run into problems. If you are considering this solution, check which APIs are available before you proceed. Otherwise, you may get the solution, but you must spend time on integrations. They provide integration support, but it's not automatic; it will take time.
KK
Associate Vice President at Wissen infotech
Effectively manages vulnerabilities and reduces false positives
ServiceNow Security Operations provides significant control over vulnerabilities, allowing users to mark false alarms as false positives and ignore them, which is important because many vulnerabilities are not real but appear as such. There are many aspects that we could handle. For certain vulnerabilities, remediation requires spending extra on hardware or OS upgrades, or purchasing new versions, which implies a cost. For that reason, we can take an exception for a couple of months or days, and once that exception expires, that vulnerability automatically reappears. These features help us ensure that everything is under control, and when we discuss vulnerabilities, we can consolidate them into one central category, which means working on one vulnerability automatically resolves the rest, making it efficient with the features provided.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Using that one piece of AI, we auto-closed 511 cases in quarter four alone."
"What I appreciate most about Torq is that it is an essential part of our system."
"Any request that comes in, regardless of how complex it is, I can accomplish it with Torq."
"As an analyst, it has demonstrated potential to reduce workforce requirements and time needed for related activities."
"If I review about 100 vendors that I might work with, Torq is definitely in the top five that gave me personally investment back, just because every bit of effort I put into Torq eventually became a workflow that gave it back to me."
"Once I started to use the system and I saw the potential, it changed all of our work in IT."
"The solution's valuable feature is its GUI. It has more than 450 connectors, which are excellent for connecting devices and automating integration. The solution has all the features we need. We deployed it in our environment, and it's fully integrated. Thanks to their open APIs, the seamless integration makes everything work well together."
"It is an out-of-the-box automated integration with our 20 departments. We perform L1 LiveOps automatically through the portal."
"​Integration to other security tools allows for a consolidated view of all vulnerabilities, incidents, etc. for all sorts of leverage in a single platform to assess governance risk and compliance as well as an enhanced, enriched intelligence.​"
"The ease of use is great."
"The "follow" feature is really good. If the user is not responding, there's an option to "follow". Just click on the button, and it will automatically trigger an email to the end user."
"We refer to the setup and installation guide provided by ServiceNow. They have good documentation, which makes it easier to handle the process."
"My favorite feature is the application vulnerability scanner."
"ServiceNow is a convenient platform to raise tickets, and the respective support team will contact us to resolve any issues."
"I will recommend it to others as it is an enterprise application used by large companies for ticketing purposes."
"The most valuable aspect of working with ServiceNow is its meaningful and feature-rich product."
 

Cons

"It was able to capture data but was unable to differentiate between the agent hostname we are using and the hostname that resides on the back end of the Internet."
"The initial deployment of Torq was not easy."
"Regarding the pricing of Torq, I would say it is expensive."
"Even now, we have workflows that are in production that use AI steps and I get different results, making it unusable to some degree."
"Regarding stability, I have noticed some lagging, crashing, and downtime, which is one of my largest gripes."
"Reporting needs improvement. MTTR and MTTD metrics aren't directly available in playbooks and require manual effort to achieve."
"The reporting, especially custom reporting, needs to be improved. Additionally, it would be better if it could be hosted on Linux."
"The product is called SecOps, but it is not security operations in terms of SIEM solutions."
"Customer awareness and understanding of ServiceNow's SecOps capabilities could be improved."
"Visibility and transitions between teams present significant challenges in the SecOps space, indicating that substantial training and hand-holding are required to improve usability, which is one observation I have had."
"It is challenging for the customers to understand the processes for SecOps. It needs to be simplified."
"An area for improvement I observed in ServiceNow Security Operations is the need to maintain correct CMDB data because if you're unable to do this, you can't perfectly maintain the vulnerability data. CMDB data in ServiceNow Security Operations needs to be accurate. As I've been working on ServiceNow Security Operations for only seven months, I still need more time to try all its modules before I can give recommendations regarding additional features I'd like to see in the solution."
"There is room for improvement in terms of developer support and documentation."
"The solution needs to make customization easier. You cannot do much customization immediately. It requires an extensive workload. If the customization process was user-friendly, it would be much better."
"Report generation within ServiceNow can take some time."
 

Pricing and Cost Advice

Information not available
Information not available
"Compared to competitor tools, ServiceNow Security Operations is more affordable"
"The product is more expensive than other solutions."
"The solution is more expensive than BMC Remedy, the other ITSM tool available in the market."
"This product is a good value for the money."
"It is an expensive product."
"If you're going to implement it on your own, there would be internal costs. If you're going to implement it through a contractor or consultant, you have to pay for that."
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
882,479 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Comms Service Provider
8%
Manufacturing Company
8%
Computer Software Company
7%
Comms Service Provider
26%
Computer Software Company
18%
University
10%
Outsourcing Company
8%
Financial Services Firm
16%
Manufacturing Company
13%
Computer Software Company
7%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Midsize Enterprise3
Large Enterprise4
No data available
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise15
 

Questions from the Community

What needs improvement with Torq?
We do not utilize the AI features that much. When it comes to general AI features of Torq, we are just slowly startin...
What is your primary use case for Torq?
Torq markets itself as a security tool, and we do use them for security, but not in the traditional sense they market...
What advice do you have for others considering Torq?
I would rate Torq an eight overall. I feel that Torq is as good as the effort you put into it. The limitations are ve...
What needs improvement with D3 Security?
The reporting, especially custom reporting, needs to be improved. Additionally, it would be better if it could be hos...
What is your primary use case for D3 Security?
We use the tool for automation and reporting. It helps to automate our playbooks.
What advice do you have for others considering D3 Security?
It was easy to integrate the tool with our infrastructure because all the APIs are pre-built. We just created a drag-...
What needs improvement with ServiceNow Security Operations?
ServiceNow Security Operations is not specifically a vulnerability management or incident tool, but rather a data agg...
What advice do you have for others considering ServiceNow Security Operations?
Initially, acquire basic knowledge about the system and understand how ServiceNow Security Operations operates with o...
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

Information Not Available
S&P Global, Scotiabank, Cybereason, Cummins
DXC Technology, Freedom Security Alliance, Prime Therapeutics, Seton Hall University, York Risk Services
Find out what your peers are saying about D3 Security vs. ServiceNow Security Operations and other solutions. Updated: February 2026.
882,479 professionals have used our research since 2012.