

Find out what your peers are saying about Qualys, Tenable, Horizon3.ai and others in Risk-Based Vulnerability Management.
| Product | Mindshare (%) |
|---|---|
| ServiceNow Security Operations | 1.8% |
| Cisco Vulnerability Management (formerly Kenna.VM) | 2.5% |
| Other | 95.7% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 2 |
| Large Enterprise | 16 |
Cisco Vulnerability Management (formerly Kenna.VM) provides a comprehensive approach to identifying, prioritizing, and mitigating vulnerabilities in IT environments, helping organizations to manage risk effectively.
Designed with advanced analytics, Cisco Vulnerability Management supports risk-based vulnerability management, enabling IT teams to focus on the most critical threats. This platform integrates seamlessly with existing security tools, offering a centralized solution for prioritizing vulnerabilities based on risk level. By aligning security efforts with business objectives, it ensures that resources are directed towards the most impactful areas of risk reduction.
What are the key features of Cisco Vulnerability Management?In industries like finance and healthcare, Cisco Vulnerability Management is crucial for maintaining stringent compliance standards. Its ability to integrate within complex IT ecosystems allows for flexible adaptation across sectors, ensuring that industry-specific vulnerabilities are effectively managed and mitigated.
ServiceNow Security Operations enhances vulnerability management with integrations, automation, and a user-friendly interface. It supports security incident management, governance risk, and cloud availability, reducing infrastructure needs.
ServiceNow Security Operations integrates with tools such as Qualys, Tenable, Splunk, and Microsoft Defender, streamlining the management of security incidents and threat intelligence. The platform automates processes like false positive marking and vulnerability remediation, facilitating efficient operations. It provides a customizable interface that unifies the security view, enabling organizations to enhance governance risk and compliance. With its cloud availability, it reduces the need for extensive infrastructure, supporting both cloud and hybrid environments. However, challenges like slow report generation, integration difficulties, and complex customization remain, alongside desires for improved AI capabilities, intuitive interfaces, and better documentation. Pricing, customer awareness, and dashboard configurations are areas needing attention.
What are the key features of ServiceNow Security Operations?In sectors requiring robust security defenses, such as finance and healthcare, ServiceNow Security Operations is implemented to manage security incidents, vulnerability assessments, and threat intelligence. The platform's integration with tools like Microsoft Defender allows for efficient data exchange and automated incident response, assisting companies in resolving issues such as phishing incidents, IP address whitelisting, and vulnerability management, enhancing their cybersecurity measures.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.