We performed a comparison between Microsoft Defender Vulnerability Management and ServiceNow Security Operations based on real PeerSpot user reviews.
Find out in this report how the two Risk-Based Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product’s most valuable features are compliance, recommendations, and inventories."
"The product's stability is very high...The scalability of the product is amazing."
"The solution helps identify threats and vulnerabilities."
"The solution is up-to-date and helps prevent zero-day attacks."
"One valuable feature is the Microsoft Security Scorecard."
"We refer to the setup and installation guide provided by ServiceNow. They have good documentation, which makes it easier to handle the process."
"It's stable."
"It gives you the ability to bring data into the system. The workflows are out of the box, and it gives you the ability to auto-assign the incidents based on criteria and vulnerabilities."
"ServiceNow Security Operations also takes care of GRC, governance, risk and compliance, enabling it to provide risk assessment."
"My favorite feature is the application vulnerability scanner."
"The "follow" feature is really good. If the user is not responding, there's an option to "follow". Just click on the button, and it will automatically trigger an email to the end user."
"Integration to other security tools allows for a consolidated view of all vulnerabilities, incidents, etc. for all sorts of leverage in a single platform to assess governance risk and compliance as well as an enhanced, enriched intelligence."
"The ease of use is great."
"The general support could be improved."
"Integration can be improved."
"The technical support takes too much time to resolve tickets."
"It is challenging to extract and customize reports from the system."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"The product is called SecOps, but it is not security operations in terms of SIEM solutions."
"It doesn't interact with things very well."
"It is challenging for the customers to understand the processes for SecOps. It needs to be simplified."
"In future releases, I would like to add a follow-up and reminder feature. For the tickets in our queue, we could set reminders. This would help us prioritize older tickets before moving on to new ones."
"There are limitations for the third-parties that are providing the inputs. They should increase the robustness of the solution."
"The solution needs to make customization easier. You cannot do much customization immediately. It requires an extensive workload. If the customization process was user-friendly, it would be much better."
"The threat intelligence module needs a better dashboard."
"We'd like customization to be easier in terms of the UI and using the dashboards."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
More ServiceNow Security Operations Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 8th in Risk-Based Vulnerability Management with 5 reviews while ServiceNow Security Operations is ranked 6th in Risk-Based Vulnerability Management with 14 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while ServiceNow Security Operations is rated 8.0. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of ServiceNow Security Operations writes "Mature with nice UI and customizable workflows". Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Tenable Nessus, Rapid7 InsightVM, Tenable Vulnerability Management and Microsoft Sentinel, whereas ServiceNow Security Operations is most compared with Palo Alto Networks Cortex XSOAR, Splunk SOAR, Microsoft Sentinel, IBM Resilient and Swimlane. See our Microsoft Defender Vulnerability Management vs. ServiceNow Security Operations report.
See our list of best Risk-Based Vulnerability Management vendors.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.