No more typing reviews! Try our Samantha, our new voice AI agent.

Proofpoint Threat Response vs ServiceNow Security Operations comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Proofpoint Threat Response
Ranking in Security Incident Response
3rd
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
5
Ranking in other categories
No ranking in other categories
ServiceNow Security Operations
Ranking in Security Incident Response
1st
Average Rating
8.0
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (9th), Risk-Based Vulnerability Management (11th)
 

Mindshare comparison

As of April 2026, in the Security Incident Response category, the mindshare of Proofpoint Threat Response is 7.4%, down from 17.2% compared to the previous year. The mindshare of ServiceNow Security Operations is 8.5%, down from 19.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Incident Response Mindshare Distribution
ProductMindshare (%)
ServiceNow Security Operations8.5%
Proofpoint Threat Response7.4%
Other84.1%
Security Incident Response
 

Featured Reviews

reviewer2460363 - PeerSpot reviewer
Chief Engineer at a healthcare company with 10,001+ employees
Automatically remove threats from mailboxes once identified, reducing manual intervention but on-premise version doesn't scale well for large companies
Auto pull and auto restore are valuable features. Auto restore isn't quite what it should be, but it's a lot better than someone having to manually release mail back to everyone. If something's pulled and then it's later declared a false positive, it will automatically restore. They also take automatic feeds from their advanced threat detection modules. Anytime Advanced Threat Protection finds something that was allowed to go through, either a URL or attachment, it will send out a signal, and Threat Response will automatically pull all of that out of the mail files. The automation is the big thing for us. Integration capabilities: There's an API, but most of it is around how you handle incidents. We're also not using the whole Threat Response suite, just the subset. So, we've never had to or could integrate anything else. We're limited to the Exchange portion only. The whole Threat Response should be labeled as a SOAR tool. The portion we have, I would call it "SOAR-lite." I know there are a couple of others that offer a SOAR-lite, but we're just starting to look at them.
SH
Freelancer at a media company with 1,001-5,000 employees
Gaining unified control over vulnerabilities has improved governance but pricing and support need work
The market price is slightly high. The pricing should be a little lower because this is a SaaS-based product. Everyone using ServiceNow might be getting many modules, but the overall module cost becomes high with license consumption one by one. I personally see that if ServiceNow is to grow over the next decade, they need to work on the pricing part. Cheap providers are emerging, and in the age of AI, it is evident that the chatbot and the virtual agent features, which are prominent features of ServiceNow, could be completely compromised and replaced by people choosing other tools. If ServiceNow develops a strategy to lower the price and increase the customer base, it could help ServiceNow to grow for another decade. I encountered one issue in ServiceNow Security Operations. The different tools, for example, Tenable and TVM, discovered vulnerabilities that had very limited information when imported. However, the same vulnerabilities from different sources, the TVM and Tenable, had shorter descriptions than what was present in the common vulnerabilities or CVE. If this depends on the implementer, such as Tenable or how other security operations implement them, the text was very limited. Customers were asking questions about why this was happening and if ServiceNow was working properly. The vulnerability information should be updated and the common text should be displayed every time, regardless of how many different tools are used for integration. The vulnerability database should be consistent when it comes to the description to avoid confusion for customers implementing it for the first time. This is an improvement that ServiceNow can make.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"If something's pulled and then it's later declared a false positive, it will automatically restore. They also take automatic feeds from their advanced threat detection modules."
"Support is very responsive."
"Our ROI is100%. Our entire management and decision makers are very impressed and happy with this product."
"This is truly a top-notch feature, and I have not seen such good functionality from the same kind of feature in any other tool so far."
"The platform's most valuable include the ability to check emails and block potential spam."
"The best part of Proofpoint Threat Response is the Auto-Pull feature. Being able to pull an email back from a user's mailbox is very useful, yet I have noticed that not a lot of organizations use this kind of feature."
"It has reduced our manual efforts to remove emails from each user's inbox, and in this case we do not have to ask our IT department or users to do so."
"Proofpoint has reduced the number of major attacks on our systems."
"It has helped optimize security costs by consolidating multiple tools into one platform."
"The solution is available over the cloud and is easy to manage."
"Multiple projects use the ServiceNow tool because it is a low-cost and open-source tool."
"The solution is available over the cloud and is easy to manage."
"The most valuable features are service management and case management, and ServiceNow Security Operations also takes care of problem management as well as GRC, governance, risk, and compliance, enabling it to provide risk assessment."
"Reduces time to closure and closure metrics for vulnerabilities."
"The most valuable aspect of working with ServiceNow is its meaningful and feature-rich product."
"What I found most valuable in ServiceNow Security Operations is that it's very useful for any incoming vulnerability. For example, if my team finds any vulnerability on servers such as the CA and CMDB integrated with ServiceNow Security Operations, my team can make some changes. My team can map the vulnerabilities found on the CA server, make the changes required, and resolve the vulnerabilities before the system is attacked. You can avoid vulnerability attacks through ServiceNow Security Operations, so this is the best feature of the solution. ServiceNow Security Operations is beneficial mainly for vulnerability response and engagement purposes."
 

Cons

"If the reporting gets improved then it would be better, but the product is running amazing as it is."
"The on-premise version doesn't scale well for large companies."
"The interface within Threat Response could be made simpler."
"If the reporting gets improved then it would be better, but the product is running amazing as it is."
"The platform's technical support services and pricing need improvement."
"The product has some quirks that could be improved."
"The interface within Threat Response could be made simpler."
"Has some quirks."
"There are limitations for the third-parties that are providing the inputs. They should increase the robustness of the solution."
"One area for improvement for the product is the need to tailor and alter some codes for customization, which can cause issues during upgrades. It does not support customized operations."
"The threat intelligence module needs a better dashboard."
"​Process framework and best practices for ease of integration between IT and security teams via incident, problem, and change.​"
"The solution needs to make customization easier. You cannot do much customization immediately. It requires an extensive workload. If the customization process was user-friendly, it would be much better."
"Process framework and best practices for ease of integration between IT and security teams via incident, problem, and change."
"The solution needs to make customization easier. You cannot do much customization immediately. It requires an extensive workload."
"It doesn't interact with things very well."
 

Pricing and Cost Advice

"The way most big companies work with Proofpoint is that they try to tie everything into an enterprise license. I can't comment on the actual costs, however I do know that alternative solutions such as Abnormal Security can be much more expensive than Proofpoint Threat Response."
"It's quite affordable to have it with this much functionality and ease to administrate."
"If you're going to implement it on your own, there would be internal costs. If you're going to implement it through a contractor or consultant, you have to pay for that."
"This product is a good value for the money."
"It is an expensive product."
"Compared to competitor tools, ServiceNow Security Operations is more affordable"
"The product is more expensive than other solutions."
"The solution is more expensive than BMC Remedy, the other ITSM tool available in the market."
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
889,955 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Healthcare Company
10%
Comms Service Provider
9%
Construction Company
8%
Financial Services Firm
16%
Manufacturing Company
13%
Government
6%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise16
 

Questions from the Community

What is your experience regarding pricing and costs for Proofpoint Threat Response?
The pricing it's a bit expensive, setup and licensing are simpples
What needs improvement with Proofpoint Threat Response?
The platform's technical support services and pricing need improvement.
What is your primary use case for Proofpoint Threat Response?
We use the product to verify and manage emails sent and received through our Microsoft Exchange server, focusing on blocking potential spam emails.
What needs improvement with ServiceNow Security Operations?
The market price is slightly high. The pricing should be a little lower because this is a SaaS-based product. Everyone using ServiceNow might be getting many modules, but the overall module cost be...
What advice do you have for others considering ServiceNow Security Operations?
ServiceNow Security Operations integrates very easily with third-party security tools. I am involved mostly with ServiceNow and not with other vendors.
 

Overview

 

Sample Customers

University of Waterloo, Akorn, Fenwick and West LLP
DXC Technology, Freedom Security Alliance, Prime Therapeutics, Seton Hall University, York Risk Services
Find out what your peers are saying about Proofpoint Threat Response vs. ServiceNow Security Operations and other solutions. Updated: April 2026.
889,955 professionals have used our research since 2012.