Skip to main content
TrustRadius
ServiceNow Security Operations

ServiceNow Security Operations

Overview

What is ServiceNow Security Operations?

Built on the Now Platform, the ServiceNow Security Operations application bundle, available in the Standard, Professional, and Enterprise bundles, supports SecOps with security orchestration, automation and response (SOAR) platform. Higher tier plans integrating ServiceNow's own proactive vulnerability management capabilities, and…

Read more
Recent Reviews

TrustRadius Insights

Configurable Interface: Users have praised the highly configurable and intuitive user interface of ServiceNow Security Operations. It has …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is ServiceNow Security Operations?

Built on the Now Platform, the ServiceNow Security Operations application bundle, available in the Standard, Professional, and Enterprise bundles, supports SecOps with security orchestration, automation and response (SOAR) platform. Higher tier plans integrating ServiceNow's own proactive…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

25 people also want pricing

Alternatives Pricing

What is TheHive?

TheHive is an open source and free cybersecurity incident response platform.

Return to navigation

Product Demos

Respond Faster with ServiceNow Security Operations and MITRE ATT&CK Framework

YouTube

Servicenow Security Operation Demo | Introduction of SecOps | Servicenow SecOps Tutorial |IT Canvass

YouTube
Return to navigation

Product Details

What is ServiceNow Security Operations?

ServiceNow Security Operations Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(5)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Configurable Interface: Users have praised the highly configurable and intuitive user interface of ServiceNow Security Operations. It has been noted by several reviewers that this feature makes it easy to access and resolve incidents quickly.

Range of Features: Many users appreciate the wide range of features available in ServiceNow Security Operations, including assignment rules, risk calculator, vulnerability group rules, and UI supporting both mobile and desktop for handling security incidents. Several reviewers have mentioned this as a significant advantage when using the platform.

Centralized Records Maintenance: The centralized maintenance of complete records in one place is another common positive aspect noted by several reviewers. They appreciate how it is auditable for compliance purposes while being cross-referenced for historical reference.

Difficult Navigation: Several users have found the user interface of ServiceNow Security Operations difficult to navigate, especially when starting off with the software.

Automation Component Needs Improvement: Some customers have reported that the automation component of the software needs improvement as it can be slow and lagging.

Significant Investment Required for Configuration: A few reviewers have mentioned that a significant investment is required to configure and integrate ServiceNow Security Operations, which can be a challenge for businesses without sufficient resources.

Users have made several recommendations for ServiceNow's Security Operations tool. The three most common recommendations are as follows:

  1. Implementing a strong team after the initial implementation: Many users suggest having a dedicated and knowledgeable team in place to ensure the effectiveness of the Security Operations tool. They believe that this tool requires a high level of maturity in processing and systems, and having a skilled team can help maximize its potential.

  2. Enhancing integration capabilities: Some users recommend improving the integration capabilities of the Security Operations tool. They suggest making it easier to integrate with other security tools and platforms to enhance automation and streamline workflows. This would enable seamless collaboration between different security processes and ultimately improve overall efficiency.

  3. Providing more comprehensive reporting and analytics functionalities: Another common recommendation is to enhance the reporting and analytics capabilities of the Security Operations tool. Users would like more robust reporting features, including customizable dashboards and advanced analytics capabilities. This would allow them to gain deeper insights into their security operations, identify trends, and make data-driven decisions to strengthen their overall security posture.

In summary, users recommend implementing a strong team after initial implementation, enhancing integration capabilities, and providing more comprehensive reporting and analytics functionalities for ServiceNow's Security Operations tool. These recommendations aim to optimize its effectiveness, improve collaboration with other security tools, and enable better decision-making through insightful data analysis.

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are using a service now security operations center to monitor our network resources, since my team works in the cloud it can detect any performance or abuse of our network resources. An incident is automatically logged on to service now from which we can check and resolve the incident. We have the option to perform a complete root cause analysis of the problem and also threat intelligence provides us a scope to gain more knowledge about the security incidents.
  • Automatically creates a ticket for security incidents.
  • Complete root cause Analysis of the problem.
  • Ability to provide more knowledge because of threat intelligence.
  • Integration with other third party applications.
Well suited to monitor all the network resources and create incidents automatically. We can check a complete root cause analysis to see if the problem is with the network or just the software performance.
  • Threat analysis.
  • Ability to create automatic incidents.
  • Positive ROI since most of the security incidents can be closed via a security centre.
Return to navigation