Try our new research platform with insights from 80,000+ expert users

Microsoft Defender Vulnerability Management vs ServiceNow Security Operations comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Average Rating
9.6
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Vulnerability Management (18th), Continuous Threat Exposure Management (CTEM) (3rd)
Microsoft Defender Vulnerab...
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
16
Ranking in other categories
Vulnerability Management (12th), Advanced Threat Protection (ATP) (18th), Microsoft Security Suite (19th), Risk-Based Vulnerability Management (6th)
ServiceNow Security Operations
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Security Incident Response (1st), Security Orchestration Automation and Response (SOAR) (7th), Risk-Based Vulnerability Management (11th)
 

Featured Reviews

Reviewer6233 - PeerSpot reviewer
Works at a healthcare company with 10,001+ employees
Has become an indispensable tool in our cybersecurity arsenal
While Zafran Security is already a powerful tool, there are areas where it could be further improved to provide even greater value. One key area for enhancement is the searching capabilities within its vulnerabilities module. By incorporating the ability to create Boolean searches, users would gain the ability to apply more complex filters and customize their search criteria. This would greatly enhance the precision and efficiency with which security teams can identify and prioritize vulnerabilities. Having such tailored search capabilities would save time and resources by narrowing down vast lists of vulnerabilities to those that meet specific parameters relevant to our unique risk environment. Additionally, integrating more robust reporting and visualization tools would be advantageous. Enhanced dashboards that offer customizable visual representations of risk configurations and threat landscapes would facilitate better communication with stakeholders, making it easier to explain vulnerabilities and the rationale behind certain security measures. This would also aid in demonstrating the improvements and value derived from existing security investments to leadership and non-technical team members.
OB
Microsoft Solutions Manager at Self-Employed
Ensures strong threat and vulnerability management with continuous risk assessment
The major priority is identity, which is crucial; we have lots of companies in manufacturing, energy, or various sectors, and it varies from one to another. I assess Microsoft Defender Vulnerability Management as very effective in continuously assessing vulnerabilities without requiring scans. We use automatic investigation and remediation features, safe attachments, safe links, and real-time reports, which are also very effective. For Active Directory, Defender has threat intelligence, and we are using that. The risk-based prioritization within Vulnerability Management affects my ability to manage vulnerabilities, particularly in relation to the Zero Trust Model utilized by our customers. The end-users often do as they please in their systems.
KK
Associate Vice President at Wissen infotech
Effectively manages vulnerabilities and reduces false positives
ServiceNow Security Operations provides significant control over vulnerabilities, allowing users to mark false alarms as false positives and ignore them, which is important because many vulnerabilities are not real but appear as such. There are many aspects that we could handle. For certain vulnerabilities, remediation requires spending extra on hardware or OS upgrades, or purchasing new versions, which implies a cost. For that reason, we can take an exception for a couple of months or days, and once that exception expires, that vulnerability automatically reappears. These features help us ensure that everything is under control, and when we discuss vulnerabilities, we can consolidate them into one central category, which means working on one vulnerability automatically resolves the rest, making it efficient with the features provided.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Zafran has become an indispensable tool in our cybersecurity arsenal."
"Zafran is an excellent tool."
"We are able to see the real risk of a vulnerability on our environment with our security tools."
"Overall, we have seen about eighty-seven percent reduction of the number of vulnerabilities that require urgency to remediate, specifically the number of criticals."
"We saw benefits from Zafran Security almost immediately after deploying it."
"With Zafran Security, it integrates with your security controls, allowing you to take that risk score and reduce it based on the controls in place or increase the risk based on different factors, such as if the issue is internet reachable or if there's an exploit in the wild."
"The solution is up-to-date and helps prevent zero-day attacks."
"Microsoft Defender Vulnerability Management is versatile and assesses vulnerabilities, providing detailed information on CVEs, their categories, and exploit statuses."
"One valuable feature is the Microsoft Security Scorecard."
"Microsoft Defender Vulnerability Management provides regular advisories and recommendations that help improve our security posture."
"The integration with Sentinel has been one of the most valuable features for my organization."
"The solution is highly scalable."
"The integration with Sentinel has been one of the most valuable features for my organization."
"The integration with SIEM is the best, specifically the native integration with Microsoft SIEM."
"ServiceNow Security Operations provides significant control over vulnerabilities, allowing users to mark false alarms as false positives and ignore them, which is important because many vulnerabilities are not real but appear as such."
"Reduces time to closure and closure metrics for vulnerabilities."
"Multiple projects use the ServiceNow tool because it is a low-cost and open-source tool."
"It has helped optimize security costs by consolidating multiple tools into one platform."
"The SOAR module of ServiceNow Security Operations is the most valuable feature"
"What I found most valuable in ServiceNow Security Operations is that it's very useful for any incoming vulnerability. For example, if my team finds any vulnerability on servers such as the CA and CMDB integrated with ServiceNow Security Operations, my team can make some changes. My team can map the vulnerabilities found on the CA server, make the changes required, and resolve the vulnerabilities before the system is attacked. You can avoid vulnerability attacks through ServiceNow Security Operations, so this is the best feature of the solution. ServiceNow Security Operations is beneficial mainly for vulnerability response and engagement purposes."
"It's stable."
"The ease of use is great."
 

Cons

"The dashboarding and reporting functionality of Zafran Security is an area that definitely could use some improvements."
"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"I think the ability to have some enhanced reporting capabilities is something they can improve on, as they have good reports but we have asked for some specific reporting enhancements."
"The worst aspect is the refresh rate of the dashboard."
"There is a good solution from Microsoft, however, there is a gap between Windows and Linux management."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"Sometimes the stability of the agents could be improved."
"The documentation from Microsoft needs significant improvement. The documents are disorganized, with one document linking to another, making the steps unclear and difficult to follow."
"The general support could be improved."
"They may need to improve the portal refresh rate for Microsoft Defender Vulnerability Management because it takes time for recommendations to disappear after mitigation; sometimes, it takes one week, when it should ideally take only one to two hours."
"We have experienced some logging issues, including a few hours of downtime initially. Despite this, I would rate the overall stability as an eight."
"Report generation within ServiceNow can take some time."
"There is room for improvement in terms of developer support and documentation."
"The dashboard and playbook creation will need to improve"
"In future releases, I would like to add a follow-up and reminder feature. For the tickets in our queue, we could set reminders. This would help us prioritize older tickets before moving on to new ones."
"The threat intelligence module needs a better dashboard."
"It's very slow. When you click a button or update a field, it takes forever to actually react."
"We'd like customization to be easier in terms of the UI and using the dashboards."
"They should stick to the roadmap and continue to build plugins and integrations with other third parties, enhance the UI, and enhance the reporting. It's all good. They should just continue enhancing the releases."
 

Pricing and Cost Advice

Information not available
"The product’s pricing is medium."
"The licensing model follows a per-user per-month structure."
"The tool is a bit costly."
"The licensing costs are reasonable."
"I rate the product's price a three on a scale of one to ten, where one is a low price, and ten is a high price."
"The product is more expensive than other solutions."
"This product is a good value for the money."
"It is an expensive product."
"The solution is more expensive than BMC Remedy, the other ITSM tool available in the market."
"Compared to competitor tools, ServiceNow Security Operations is more affordable"
"If you're going to implement it on your own, there would be internal costs. If you're going to implement it through a contractor or consultant, you have to pay for that."
report
Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
8%
Outsourcing Company
6%
Financial Services Firm
12%
Computer Software Company
10%
Manufacturing Company
8%
Government
8%
Financial Services Firm
17%
Manufacturing Company
14%
Computer Software Company
7%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise2
Large Enterprise5
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise15
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
Since we stood Zafran Security up in our private cloud, we handle the maintenance on our side. As we opted not to use...
What needs improvement with Zafran Security?
In terms of areas for improvement, Zafran Security is doing a really great job as a new and emerging company. Oftenti...
What is your primary use case for Zafran Security?
My use cases for Zafran Security revolve around two primary areas. One is around vulnerability management and priorit...
What needs improvement with Microsoft Defender Vulnerability Management?
The documentation from Microsoft needs significant improvement. The documents are disorganized, with one document lin...
What needs improvement with ServiceNow Security Operations?
ServiceNow Security Operations is not specifically a vulnerability management or incident tool, but rather a data agg...
What advice do you have for others considering ServiceNow Security Operations?
Initially, acquire basic knowledge about the system and understand how ServiceNow Security Operations operates with o...
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
DXC Technology, Freedom Security Alliance, Prime Therapeutics, Seton Hall University, York Risk Services
Find out what your peers are saying about Microsoft Defender Vulnerability Management vs. ServiceNow Security Operations and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.