Best Software for 2025 is now live!

Best Security Orchestration, Automation, and Response (SOAR) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Security orchestration, automation, and response (SOAR) software products are tools used to help integrate security technologies and automate incident-related tasks. These tools integrate with a company’s existing security solutions to help users build and automate workflows, simplifying the incident response process and reducing the amount of human intervention necessary to handle security incidents. Companies use these tools to create a centralized system complete with visibility into a company’s security software and operational processes. These tools also reduce the time it takes to respond to incidents, as well as the potential for human error in remediating security threats and vulnerabilities.

SOAR platforms combine aspects of vulnerability management, incident response, and security information and event management (SIEM) solutions. SOAR products are designed to provide some of each tool’s respective functionality or integrate with third-party tools. Once integrated, processes can be designed to identify incidents and automate remediation tasks.

To qualify for inclusion in the Security Orchestration, Automation, and Response (SOAR) category, a product must:

Integrate security information and incident response tools
Allow security professionals to build response workflows
Automate incident management and response tasks within workflows
Provide formalized incident, workflow, and performance reports

Best Security Orchestration, Automation, and Response (SOAR) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
63 Listings in Security Orchestration, Automation, and Response (SOAR) Available
(483)4.6 out of 5
1st Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:$0.75
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KnowBe4, the provider of the world’s largest security awareness and compliance training and simulated social engineering platform, created PhishER to help your InfoSec and Security Operations teams cu

    Users
    • IT Manager
    • IT Director
    Industries
    • Financial Services
    • Primary/Secondary Education
    Market Segment
    • 75% Mid-Market
    • 12% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KnowBe4 PhishER/PhishER Plus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Phishing Prevention
    92
    Email Security
    76
    Ease of Use
    64
    Security
    50
    Automation
    43
    Cons
    Ineffective Email Security
    24
    False Positives
    17
    Difficult Setup
    14
    Poor Accuracy
    12
    Poor Reporting
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KnowBe4 PhishER/PhishER Plus features and usability ratings that predict user satisfaction
    8.8
    Automated Remediation
    Average: 8.8
    9.2
    Quality of Support
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.5
    8.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Clearwater, FL
    Twitter
    @KnowBe4
    16,214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,934 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KnowBe4, the provider of the world’s largest security awareness and compliance training and simulated social engineering platform, created PhishER to help your InfoSec and Security Operations teams cu

Users
  • IT Manager
  • IT Director
Industries
  • Financial Services
  • Primary/Secondary Education
Market Segment
  • 75% Mid-Market
  • 12% Small-Business
KnowBe4 PhishER/PhishER Plus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Phishing Prevention
92
Email Security
76
Ease of Use
64
Security
50
Automation
43
Cons
Ineffective Email Security
24
False Positives
17
Difficult Setup
14
Poor Accuracy
12
Poor Reporting
12
KnowBe4 PhishER/PhishER Plus features and usability ratings that predict user satisfaction
8.8
Automated Remediation
Average: 8.8
9.2
Quality of Support
Average: 8.9
9.0
Ease of Admin
Average: 8.5
8.7
Workflow Automation
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Clearwater, FL
Twitter
@KnowBe4
16,214 Twitter followers
LinkedIn® Page
www.linkedin.com
1,934 employees on LinkedIn®
(289)4.4 out of 5
11th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Microsoft Sentinel
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Sentinel lets you see and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and lar

    Users
    • Senior Software Engineer
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Sentinel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    35
    Security
    34
    Threat Detection
    30
    Ease of Use
    29
    Integrations
    24
    Cons
    Expensive
    23
    Complexity
    15
    Difficult Learning
    13
    Integration Issues
    13
    Cloud Dependency
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Sentinel features and usability ratings that predict user satisfaction
    8.6
    Automated Remediation
    Average: 8.8
    8.5
    Quality of Support
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.5
    8.4
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Sentinel lets you see and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and lar

Users
  • Senior Software Engineer
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 31% Mid-Market
Microsoft Sentinel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
35
Security
34
Threat Detection
30
Ease of Use
29
Integrations
24
Cons
Expensive
23
Complexity
15
Difficult Learning
13
Integration Issues
13
Cloud Dependency
10
Microsoft Sentinel features and usability ratings that predict user satisfaction
8.6
Automated Remediation
Average: 8.8
8.5
Quality of Support
Average: 8.9
8.3
Ease of Admin
Average: 8.5
8.4
Workflow Automation
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(240)4.8 out of 5
4th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tines is the smart, secure workflow builder for your whole team. You can use Tines to build any workflow or process – regardless of complexity. Get up and running in minutes, not days or weeks. Ther

    Users
    • Security Engineer
    • Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tines Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Automation
    49
    Customer Support
    31
    Features
    24
    Automation Ease
    23
    Cons
    Learning Curve
    15
    Lack of Features
    12
    Difficult Learning
    11
    Missing Features
    11
    Poor Interface Design
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tines features and usability ratings that predict user satisfaction
    9.3
    Automated Remediation
    Average: 8.8
    9.7
    Quality of Support
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.5
    9.6
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tines
    Company Website
    Year Founded
    2018
    HQ Location
    Dublin, IE
    LinkedIn® Page
    www.linkedin.com
    359 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tines is the smart, secure workflow builder for your whole team. You can use Tines to build any workflow or process – regardless of complexity. Get up and running in minutes, not days or weeks. Ther

Users
  • Security Engineer
  • Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 36% Mid-Market
Tines Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Automation
49
Customer Support
31
Features
24
Automation Ease
23
Cons
Learning Curve
15
Lack of Features
12
Difficult Learning
11
Missing Features
11
Poor Interface Design
10
Tines features and usability ratings that predict user satisfaction
9.3
Automated Remediation
Average: 8.8
9.7
Quality of Support
Average: 8.9
9.2
Ease of Admin
Average: 8.5
9.6
Workflow Automation
Average: 8.8
Seller Details
Seller
Tines
Company Website
Year Founded
2018
HQ Location
Dublin, IE
LinkedIn® Page
www.linkedin.com
359 employees on LinkedIn®
By torq
(90)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and pre

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Torq Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    77
    Automation
    70
    Easy Integrations
    47
    Security
    42
    Customer Support
    40
    Cons
    Learning Curve
    25
    Difficult Learning
    20
    Expensive
    11
    Poor User Interface
    9
    Complexity
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Torq features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.5
    Quality of Support
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.5
    9.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    torq
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @torq_io
    1,838 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    219 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and pre

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 32% Enterprise
Torq Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
77
Automation
70
Easy Integrations
47
Security
42
Customer Support
40
Cons
Learning Curve
25
Difficult Learning
20
Expensive
11
Poor User Interface
9
Complexity
8
Torq features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.5
Quality of Support
Average: 8.9
9.4
Ease of Admin
Average: 8.5
9.3
Workflow Automation
Average: 8.8
Seller Details
Seller
torq
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@torq_io
1,838 Twitter followers
LinkedIn® Page
www.linkedin.com
219 employees on LinkedIn®
(19)4.5 out of 5
6th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Palo Alto Networks Cortex XSOAR
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The industry’s first extended security orchestration, automation and response platform with native threat intel management is now available.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 58% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Cortex XSOAR features and usability ratings that predict user satisfaction
    9.0
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.5
    8.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

The industry’s first extended security orchestration, automation and response platform with native threat intel management is now available.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 58% Enterprise
  • 21% Mid-Market
Palo Alto Networks Cortex XSOAR features and usability ratings that predict user satisfaction
9.0
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 8.9
8.8
Ease of Admin
Average: 8.5
8.7
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,110 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ServiceNow Security Operations is an Enterprise Security Response engine offering security incident response, vulnerability response, configuration compliance, and threat intelligence. It’s built on t

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 56% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ServiceNow Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Implementation Ease
    2
    Integration Capabilities
    2
    Customer Support
    1
    Easy Integrations
    1
    Cons
    Dashboard Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Security Operations features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    9.1
    Quality of Support
    Average: 8.9
    8.1
    Ease of Admin
    Average: 8.5
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    50,962 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29,567 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ServiceNow Security Operations is an Enterprise Security Response engine offering security incident response, vulnerability response, configuration compliance, and threat intelligence. It’s built on t

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 56% Enterprise
  • 25% Small-Business
ServiceNow Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Implementation Ease
2
Integration Capabilities
2
Customer Support
1
Easy Integrations
1
Cons
Dashboard Issues
1
Slow Performance
1
ServiceNow Security Operations features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
9.1
Quality of Support
Average: 8.9
8.1
Ease of Admin
Average: 8.5
10.0
Workflow Automation
Average: 8.8
Seller Details
Company Website
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
50,962 Twitter followers
LinkedIn® Page
www.linkedin.com
29,567 employees on LinkedIn®
(17)4.6 out of 5
3rd Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    No email defense technology can protect against increasingly advanced email threats 100 percent of the time. Some advanced social engineering attacks like business email compromise will reach users’ m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Incident Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Cybersecurity
    4
    Email Security
    3
    Incident Management
    3
    Automation
    2
    Cons
    Expensive
    1
    Inefficient Alerts
    1
    Insufficient Information
    1
    Lack of Features
    1
    Limited Accessibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Incident Response features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.3
    Quality of Support
    Average: 8.9
    9.7
    Ease of Admin
    Average: 8.5
    9.6
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,724 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,153 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

No email defense technology can protect against increasingly advanced email threats 100 percent of the time. Some advanced social engineering attacks like business email compromise will reach users’ m

Users
No information available
Industries
No information available
Market Segment
  • 41% Mid-Market
  • 24% Small-Business
Barracuda Incident Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Cybersecurity
4
Email Security
3
Incident Management
3
Automation
2
Cons
Expensive
1
Inefficient Alerts
1
Insufficient Information
1
Lack of Features
1
Limited Accessibility
1
Barracuda Incident Response features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.3
Quality of Support
Average: 8.9
9.7
Ease of Admin
Average: 8.5
9.6
Workflow Automation
Average: 8.8
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,724 Twitter followers
LinkedIn® Page
www.linkedin.com
2,153 employees on LinkedIn®
Ownership
Private
(38)4.4 out of 5
7th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chronicle’s cloud-native security, orchestration, automation and response (SOAR) product empowers security teams to respond to cyber threats in minutes - not hours or days. Chronicle SOAR fuses a uniq

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 45% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Alerting System
    1
    Easy Integrations
    1
    Features
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Security Operations features and usability ratings that predict user satisfaction
    9.7
    Automated Remediation
    Average: 8.8
    7.9
    Quality of Support
    Average: 8.9
    7.5
    Ease of Admin
    Average: 8.5
    9.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,520,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Chronicle’s cloud-native security, orchestration, automation and response (SOAR) product empowers security teams to respond to cyber threats in minutes - not hours or days. Chronicle SOAR fuses a uniq

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 45% Enterprise
  • 39% Mid-Market
Google Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Alerting System
1
Easy Integrations
1
Features
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
Google Security Operations features and usability ratings that predict user satisfaction
9.7
Automated Remediation
Average: 8.8
7.9
Quality of Support
Average: 8.9
7.5
Ease of Admin
Average: 8.5
9.7
Workflow Automation
Average: 8.8
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,520,271 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(40)4.4 out of 5
View top Consulting Services for Splunk SOAR (Security Orchestration, Automation and Response)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Consulting
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    4
    Features
    4
    Ease of Use
    3
    Implementation Ease
    3
    Security
    3
    Cons
    Expensive
    3
    Poor Customer Support
    3
    Complexity
    1
    Lack of Guidance
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
    8.6
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 8.9
    8.1
    Ease of Admin
    Average: 8.5
    8.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

Users
No information available
Industries
  • Information Technology and Services
  • Consulting
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
4
Features
4
Ease of Use
3
Implementation Ease
3
Security
3
Cons
Expensive
3
Poor Customer Support
3
Complexity
1
Lack of Guidance
1
Learning Curve
1
Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
8.6
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 8.9
8.1
Ease of Admin
Average: 8.5
8.7
Workflow Automation
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,873 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(44)4.6 out of 5
13th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Swimlane
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit fro

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Swimlane Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Automation
    5
    Easy Integrations
    5
    Integrations
    5
    Customization
    4
    Cons
    Learning Curve
    3
    Poor Interface Design
    2
    System Errors
    2
    Update Issues
    2
    Bug Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Swimlane features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.1
    Quality of Support
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.5
    9.4
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Swimlane
    Year Founded
    2014
    HQ Location
    Boulder, US
    Twitter
    @swimlane
    1,653 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    258 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit fro

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Mid-Market
  • 32% Small-Business
Swimlane Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Automation
5
Easy Integrations
5
Integrations
5
Customization
4
Cons
Learning Curve
3
Poor Interface Design
2
System Errors
2
Update Issues
2
Bug Issues
1
Swimlane features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.1
Quality of Support
Average: 8.9
8.6
Ease of Admin
Average: 8.5
9.4
Workflow Automation
Average: 8.8
Seller Details
Seller
Swimlane
Year Founded
2014
HQ Location
Boulder, US
Twitter
@swimlane
1,653 Twitter followers
LinkedIn® Page
www.linkedin.com
258 employees on LinkedIn®
(474)4.3 out of 5
15th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    28
    Cybersecurity
    26
    Easy Integrations
    26
    Cons
    Expensive
    26
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    14
    High Resource Usage
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    7.8
    Automated Remediation
    Average: 8.8
    8.2
    Quality of Support
    Average: 8.9
    8.2
    Ease of Admin
    Average: 8.5
    7.8
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
28
Cybersecurity
26
Easy Integrations
26
Cons
Expensive
26
Difficult Learning
17
Integration Issues
16
Complexity
14
High Resource Usage
10
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
7.8
Automated Remediation
Average: 8.8
8.2
Quality of Support
Average: 8.9
8.2
Ease of Admin
Average: 8.5
7.8
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,110 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
Ownership
NYSE: PANW
(39)4.9 out of 5
Optimized for quick response
9th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for n8n
Save to My Lists
Entry Level Price:€20.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    n8n is a workflow automation platform that uniquely combines AI capabilities with business process automation. Built for technical teams, it offers 400+ integrations, custom code flexibility, and self

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 74% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • n8n Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    11
    Ease of Use
    8
    Automation
    7
    Integrations
    7
    Easy Integrations
    6
    Cons
    Learning Curve
    11
    Difficult Learning
    6
    Complexity
    3
    Integration Issues
    3
    Missing Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • n8n features and usability ratings that predict user satisfaction
    8.5
    Automated Remediation
    Average: 8.8
    9.0
    Quality of Support
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.5
    9.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    n8n GmbH
    Company Website
    Year Founded
    2019
    HQ Location
    Berlin, Berlin
    Twitter
    @n8n_io
    14,887 Twitter followers
    LinkedIn® Page
    linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

n8n is a workflow automation platform that uniquely combines AI capabilities with business process automation. Built for technical teams, it offers 400+ integrations, custom code flexibility, and self

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 74% Small-Business
  • 23% Mid-Market
n8n Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
11
Ease of Use
8
Automation
7
Integrations
7
Easy Integrations
6
Cons
Learning Curve
11
Difficult Learning
6
Complexity
3
Integration Issues
3
Missing Features
3
n8n features and usability ratings that predict user satisfaction
8.5
Automated Remediation
Average: 8.8
9.0
Quality of Support
Average: 8.9
8.3
Ease of Admin
Average: 8.5
9.7
Workflow Automation
Average: 8.8
Seller Details
Seller
n8n GmbH
Company Website
Year Founded
2019
HQ Location
Berlin, Berlin
Twitter
@n8n_io
14,887 Twitter followers
LinkedIn® Page
linkedin.com
75 employees on LinkedIn®
(89)4.3 out of 5
14th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:Starting at €1.67
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint Converged SIEM is an end-to-end security operations platform with a data-centric approach that accelerates threat detection and response while protecting your entire business, no matter the s

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerting System
    1
    Alerts
    1
    Customer Support
    1
    Dashboard Customization
    1
    Cons
    Difficult Setup
    2
    Difficulty
    2
    Poor Customer Support
    2
    Alert Management
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.5
    Automated Remediation
    Average: 8.8
    9.1
    Quality of Support
    Average: 8.9
    8.0
    Ease of Admin
    Average: 8.5
    8.9
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    994 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    270 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint Converged SIEM is an end-to-end security operations platform with a data-centric approach that accelerates threat detection and response while protecting your entire business, no matter the s

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 29% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerting System
1
Alerts
1
Customer Support
1
Dashboard Customization
1
Cons
Difficult Setup
2
Difficulty
2
Poor Customer Support
2
Alert Management
1
Complex Setup
1
Logpoint features and usability ratings that predict user satisfaction
8.5
Automated Remediation
Average: 8.8
9.1
Quality of Support
Average: 8.9
8.0
Ease of Admin
Average: 8.5
8.9
Workflow Automation
Average: 8.8
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
994 Twitter followers
LinkedIn® Page
www.linkedin.com
270 employees on LinkedIn®
(323)4.3 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sumo Logic Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    31
    Log Management
    16
    Monitoring
    15
    Real-time Monitoring
    15
    Easy Integrations
    13
    Cons
    Difficult Learning
    11
    Learning Curve
    10
    Learning Difficulty
    10
    Difficult Setup
    8
    Slow Performance
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sumo Logic features and usability ratings that predict user satisfaction
    9.0
    Automated Remediation
    Average: 8.8
    8.7
    Quality of Support
    Average: 8.9
    8.4
    Ease of Admin
    Average: 8.5
    8.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, CA
    Twitter
    @SumoLogic
    6,583 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    908 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 40% Enterprise
Sumo Logic Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
31
Log Management
16
Monitoring
15
Real-time Monitoring
15
Easy Integrations
13
Cons
Difficult Learning
11
Learning Curve
10
Learning Difficulty
10
Difficult Setup
8
Slow Performance
7
Sumo Logic features and usability ratings that predict user satisfaction
9.0
Automated Remediation
Average: 8.8
8.7
Quality of Support
Average: 8.9
8.4
Ease of Admin
Average: 8.5
8.3
Workflow Automation
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, CA
Twitter
@SumoLogic
6,583 Twitter followers
LinkedIn® Page
www.linkedin.com
908 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Demisto is a platform that provides automated and collaborative security solutions.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Demisto Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Ease of Use
    1
    Easy Integrations
    1
    Integrations
    1
    Slack Integration
    1
    Cons
    Query Issues
    1
    Search Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Demisto features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.5
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Demisto is a platform that provides automated and collaborative security solutions.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Demisto Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Ease of Use
1
Easy Integrations
1
Integrations
1
Slack Integration
1
Cons
Query Issues
1
Search Difficulty
1
Demisto features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 8.9
8.7
Ease of Admin
Average: 8.5
10.0
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,110 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
Ownership
NYSE: PANW

Learn More About Security Orchestration, Automation, and Response (SOAR) Software

What is Security, Orchestration, Automation, and Response (SOAR) Software?

Security orchestration, automation, and response (SOAR) software helps coordinate, execute, and automate tasks between various IT workers and tools. SOAR tools allow organizations to respond quickly to cybersecurity attacks and observe, understand, and prevent future incidents.

SOAR software gives organizations a comprehensive view of their existing security systems while centralizing the security data. By automating security responses and reducing manual tasks, SOAR helps to generate a faster and more accurate response to security attacks. It also helps better coordinate and route incident response to the most appropriate IT worker in real time.

What Does SOAR Stand For?

SOAR stands for security orchestration, automation, and response. SOAR software significantly contributes to identifying potential future security threats.

What are the Common Features of Security, Orchestration, Automation, and Response (SOAR) Software?

Usually, a SOAR software offering operates under three primary software capabilities:

Threat and vulnerability management: Threat and vulnerability management examines key assets and prioritizes efforts to reduce risk. Working with other security teams, threat and vulnerability management helps prevent attacks by threat actors.

Security incident response: Security incident response addresses and manages the aftermath of a security breach, cyberattack, computer incident, or security incident. Security incident response is to handle the aftermath of a security breach in a way that limits damage, reduces recovery time, and reduces cost.

Security operations automation: Security operations automation is the technology that enables the automation and orchestration of security tasks. This can include both administrative duties and incident detection and response.

What are the Benefits of Security, Orchestration, Automation, and Response (SOAR) Software?

The benefits of using a SOAR tool are that it lessens the impact of security incidents and reduces the risk of legal liability. SOAR software helps companies’ security teams by enabling them to:

Maintain a central view: One of the benefits of SOAR software is that it gives security staff a central view and enables control of existing security systems while centralizing data collection to improve a company's security posture, operational efficiency, and productivity. 

Automate manual tasks: As with most software today, users are looking for help in terms of automation. SOAR software helps to manage and automate all aspects of a security incident lifecycle. This removes manual tasks, gives security staff more time to be productive, and allows them to focus on more mission-critical security tasks that do not require manual tasks.

Define incident and response procedures: SOAR software helps security systems define incident and response procedures. This helps to route security incidents to the correct security staff. SOAR can also prioritize and standardize the security response processes in a consistent, transparent, and documented way. 

Optimize incident response: Because SOAR software helps security staff define incident and response procedures, incident response is more accurate. This accuracy enables security systems and staff to have improved responses where they may have to contain, eradicate, or recover crucial data. 

Identify and assign incident severity levels: SOAR software helps to identify and assign incident severity levels. Severity levels in cybersecurity measure how severely a security incident impacts various parts of the organization. SOAR software automatically identifies and assigns severity levels, enabling the right security system and staff to respond appropriately. This means both can respond immediately to security incidents that may negatively affect an organization, such as networks, software, employee or customer data, etc.

Support collaboration and unstructured investigations: SOAR software supports collaboration and unstructured investigations in real time, helping route each security incident to the security system and security staff best suited to respond. Collaboration with other IT teams for tasks such as remediation or other departments such as legal is possible. 

Streamline operations: By using SOAR software, organizations can streamline security operations for threat and vulnerability management, security incident response, and security operations automation. SOAR software connects these security elements while integrating disparate security systems. SOAR software’s playbooks allow users to orchestrate, streamline and automate tasks. Playbooks also codify the process workflows that streamline the SOAR software functions.

Who Uses Security, Orchestration, Automation, and Response (SOAR) Software?

IT and cybersecurity staff: They use SOAR software to handle security alerts such as phishing, which includes looking for threat feed data from endpoints, failed user logins, logins from unusual locations, malicious VPN access attempts, and so on. It's also used to hunt for threats and respond to incidents from attached files for malware analysis, cloud-aware incident response, and automate data enrichment. Cybersecurity staff who assign incident severity and check other products for vulnerability scores also use SOAR platforms.

Challenges with Security, Orchestration, Automation, and Response (SOAR) software

There are a number of challenges with SOAR software that IT teams can encounter.

Skill gaps: While there is the misconception that SOAR software could replace security staff, the tool is meant to augment security teams, allowing them to work efficiently and effectively but not replacing them. However, there still may be a skills gap as the security team must be able to create detailed workflows of their processes.

Effective deployment: Another challenge of SOAR software is that it must be deployed to the enterprise but also connected to the other applications and technologies, which can be very complicated. An organization must also have staff with enough skills to deploy and maintain the platform. The applications and technologies used by the enterprise must also be able to support or be integrated into the SOAR software. One of SOAR software’s greatest strengths is to connect and orchestrate other technologies; however, if each technology is unable to be integrated, it hampers the benefits of deploying SOAR software.

How to Buy Security, Orchestration, Automation, and Response Software

Requirements Gathering (RFI/RFP) for Security, Orchestration, Automation, and Response (SOAR) Software

If an organization is just starting out and looking to purchase SOAR software, g2.com can help select the best one.

Most business pain points might be related to all of the manual work that must be completed. If the company is large and has a lot of networks, data, or devices in its organization, they may need to shop for a SOAR software that can grow with its organization. Users should think about the pain points in security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use the SOAR software and if they currently have the skills to administer it. 

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The checklist serves as a detailed guide that includes both necessary and nice-to-have features, including budget, features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the scope of the deployment, it might be helpful to produce an RFI, a one-page list with a few bullet points describing what is needed from SOAR software.

Compare Security, Orchestration, Automation, and Response (SOAR) Software

Create a long list

Vendor evaluations are an essential part of the software buying process from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

Create a short list

From the long list of vendors, it is helpful to narrow down the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list in hand, businesses can produce a matrix to compare the features and pricing of the various solutions.

Conduct demos

To ensure the comparison is comprehensive, the user should demo each solution on the shortlist with the same use cases. This will allow the business to evaluate like for like and see how each vendor stacks up against the competition. 

Selection of Security, Orchestration, Automation, and Response (SOAR) Software

Choose a selection team

Before getting started, creating a winning team that will work together throughout the entire process, from identifying pain points to implementation, is crucial. The software selection team should consist of organization members with the right interest, skills, and time to participate in this process. A good starting point is to aim for three to five people who fill roles such as the main decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. In smaller companies, the vendor selection team may be smaller, with fewer participants multitasking and taking on more responsibilities.

Compare notes

The selection team should compare notes and facts and figures which they noted during the process, such as costs, security capabilities, and alert and incident response times.

Negotiation

Just because something is written on a company’s pricing page does not mean it's final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

Final decision

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct. If not, it might be time to go back to the drawing board.

What does Security, Orchestration, Automation, and Response (SOAR) Software cost?

SOAR is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization's specific requirements. Once a SOAR solution is purchased, deployed, and integrated into an organization’s security system, the cost could be high, which is why the evaluation stage of selecting SOAR software is so crucial. The notion of rip-and-replace cost can be high. The SOAR vendor chosen should continue to provide support for the SOAR solution with flexibility and open integration.

Return on Investment (ROI)

Organizations decide to purchase SOAR software with some type of return on investment (ROI). As they want to recoup the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency.

SOAR software saves security staff costs by eliminating manual tasks. For example, SOAR software automatically investigates the scenario of email phishing attacks which is very common, so this task can be very repetitive and consumes security staff time if it is done manually. A large enterprise used actual data from its SOAR software deployment and compared it to the cost of handling email phishing investigations automatically using SOAR software versus handling them manually. The enterprise found that the reduction in staff time required to handle phishing emails equated to savings of over $680,000 per year.