Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Security Orchestration, Automation & Response Alternatives

Security Orchestration, Automation & Response Reviews & Product Details

Security Orchestration, Automation & Response Overview

What is Security Orchestration, Automation & Response?

A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments at machine speeds.

Security Orchestration, Automation & Response Details
Show LessShow More
Product Description

A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments at machine speeds.


Seller Details
Seller
Cyware
Year Founded
2016
HQ Location
Jersey City, New Jersey
Twitter
@CywareCo
4,715 Twitter followers
LinkedIn® Page
www.linkedin.com
267 employees on LinkedIn®

Recent Security Orchestration, Automation & Response Reviews

Verified User
U
Verified UserEnterprise (> 1000 emp.)
5.0 out of 5
"As SOAR used for both SIEM and CTIX"
Automation evidence collection Automatic incident closure
Manzar A.
MA
Manzar A.Enterprise (> 1000 emp.)
3.5 out of 5
"Cyware CSOL Review"
Most of the automation can be achieved without writing any code. The best part is support for different programming languages to achieve custom i...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Security Orchestration, Automation & Response Media

Answer a few questions to help the Security Orchestration, Automation & Response community
Have you used Security Orchestration, Automation & Response before?
Yes

2 Security Orchestration, Automation & Response Reviews

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Security Orchestration, Automation & Response Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
G2 reviews are authentic and verified.
Verified User in Banking
UB
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Security Orchestration, Automation & Response?

Automation

evidence collection

Automatic incident closure Review collected by and hosted on G2.com.

What do you dislike about Security Orchestration, Automation & Response?

Reports creation

Need better UI

Need more playbooks Review collected by and hosted on G2.com.

What problems is Security Orchestration, Automation & Response solving and how is that benefiting you?

Handling the SOC Incidents and advisory automation processing Review collected by and hosted on G2.com.

Manzar A.
MA
Software Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Security Orchestration, Automation & Response?

Most of the automation can be achieved without writing any code.

The best part is support for different programming languages to achieve custom integrations and automation which is not out-of-the-box supported.

MITRE ATT&CK-based framework. Review collected by and hosted on G2.com.

What do you dislike about Security Orchestration, Automation & Response?

The orchestration part is lacking here. Needs to integrate with any ITSM tool.

Also, it works best with the Cyware suite of products, CTIX and CFTR.

Need to buy CSOL and CFTR as a whole package. Review collected by and hosted on G2.com.

What problems is Security Orchestration, Automation & Response solving and how is that benefiting you?

Co-relation of related security alerts into one incident to reduce alert fatigue.

Automated response with playbooks and automation to reduce the time, effort, and budget of SOC.

Overall SOC maturity enhancement. Review collected by and hosted on G2.com.

There are not enough reviews of Security Orchestration, Automation & Response for G2 to provide buying insight. Below are some alternatives with more reviews:

1
KnowBe4 PhishER/PhishER Plus Logo
KnowBe4 PhishER/PhishER Plus
4.6
(486)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
2
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
3
Sumo Logic Logo
Sumo Logic
4.3
(323)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
4
Microsoft Sentinel Logo
Microsoft Sentinel
4.4
(289)
Microsoft Azure Sentinel is a cloud-native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI.
5
Tines Logo
Tines
4.8
(240)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action.
6
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
7
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(107)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
8
Torq Logo
Torq
4.7
(92)
Torq hyperautomates on-premise and hybrid environments at elastic scale. Torq offers immense extensibility that goes far beyond APIs, delivering the security automation industry’s only cloud-native, SaaS-based multi-tenant, zero-trust architecture. In addition, it provides horizontal scaling and parallelism with guaranteed SLAs. And it does it all in the simplest, more straightforward way possible, with instant workflow development featuring intuitive smart steps to guide users at any technical level. Customers also benefit from the industry’s most powerful visual data transformation capabilities.
9
Logpoint Logo
Logpoint
4.3
(89)
Logpoint Converged SIEM platform combines SIEM, SOAR, UEBA and SAP security monitoring to consolidate your tech stack and remove complexity. With a data-centric approach, it accelerates threat detection and response to make your Security Operations Center more efficient to protect the entirety of your organization.
10
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
Show More