Security Operations

4.3
(2)

ServiceNow Security Operations is an Enterprise Security Response engine offering security incident response, vulnerability response, configuration compliance, and threat intelligence. It’s built on the intelligent workflows, automation, orchestration, and deep connection with IT of the ServiceNow platform.

Work for Security Operations?

Learning about Security Operations?

We can help you find the solution that fits you best.

Security Operations Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 2 Security Operations reviews
LinkedIn Connections
Security Operations review by Richard M.
Richard M.
Validated Reviewer
Review Source
content

"This application is perfect to keep the information of the different servers and clients of the comp"

What do you like best?

What I like most about this application is that it provides a summary of the vulnerabilities from the point of view of the infrastructure security of the company, allowing to identify and quickly correct the technical weaknesses of the technological platforms of the departments.

What do you dislike?

What I do not like very much is that it does not provide an intermediate version for small companies, the most basic version seems too advanced for SMEs.

Recommendations to others considering the product

I recommend to the entire community that if you need an application to increase security and find the possible technological failures of your company use this without a doubt, it is great highly professional and scalable!

What business problems are you solving with the product? What benefits have you realized?

Thanks to this application we are able to unify the services of the company to offer our clients a quality product backed by the best vulnerability-free technology infrastructure and in the best possible time. Simply great, I recommend them to everyone! .

Sign in to G2 to see what your connections have to say about Security Operations
Security Operations review by Consultant
Consultant
Validated Reviewer
Review Source
content

"Service Now, all from one tool, not just ITSM"

What do you like best?

all is integrated in the software with many possbilities and you can develop own software

What do you dislike?

begin is very hard, f you come from LANdesk or ServiceDesk, you have to try a lot abd then it works

Recommendations to others considering the product:

have a look at the vendor solution and in parallel to Service Now to compare all features

What problems are you solving with the product? What benefits have you realized?

converge many tools to one

What Security Information and Event Management (SIEM) solution do you use?

Thanks for letting us know!

There are not enough reviews of Security Operations for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sumo Logic Logo
Sumo Logic
4.3
(213)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
2
Splunk Enterprise Security Logo
Splunk Enterprise Security
4.0
(98)
Splunk Enterprise Security (ES) is a SIEM software that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information to enables security teams to quickly detect and respond to internal and external attacks to simplify threat management while minimizing risk and safeguarding business
3
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(96)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
4
Logz.io Logo
Logz.io
4.6
(58)
Logz.io provides a popular open-source log analysis platform - ELK (Elasticsearch, Logstash and Kibana), as a simple, secured and scalable service on the cloud. Logz.io also provides advanced enterprise-grade enhancements and features on top of the ELK stack, such as alerting, user control, archiving and pre-made Kibana visualizations tailored for specific log types. Extremely easy to set up, Logz.io allows you to ship as many logs as you like, securing the data and providing high-availability and accessibility.
5
Graylog Logo
Graylog
4.4
(36)
Graylog is an open source, centralized log management alternative to Splunk. Graylog captures, stores, and enables real-time search and analysis against terabytes of machine data from any component in the IT infrastructure.
6
SolarWinds Log & Event Manager Logo
SolarWinds Log & Event Manager
4.2
(33)
Log & Event Manager is an affordable, easy-to-use SIEM solution that helps you detect and respond to security threats and demonstrate compliance.
7
InsightIDR Logo
InsightIDR
4.4
(30)
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
8
LogRhythm Logo
LogRhythm
3.7
(24)
LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats
9
OSSIM (Open Source) Logo
OSSIM (Open Source)
4.0
(27)
Alienvault OSSIM is an open source SIEM tool that contribute and receive real-time information about malicious hosts to help user increase security visibility and control in network.
10
Solarwinds SIEM Logo
Solarwinds SIEM
3.7
(23)
SolarWinds SIEM is a Log & Event Manager software that Eliminate threats faster with instantaneous detection of suspicious activity and automated responses for mitigation and compliance.
Show more
Kate from G2

Learning about Security Operations?

I can help.
* We monitor all Security Operations reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.