Top Rated Security Orchestration, Automation & Response Alternatives
(323)
4.3 out of 5
Visit Website
Sponsored
UB
Verified User in Banking
Enterprise(> 1000 emp.)
What do you like best about Security Orchestration, Automation & Response?
Automation
evidence collection
Automatic incident closure Review collected by and hosted on G2.com.
What do you dislike about Security Orchestration, Automation & Response?
Reports creation
Need better UI
Need more playbooks Review collected by and hosted on G2.com.
1 out of 2 Total Reviews for Security Orchestration, Automation & Response
4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.

MA
Manzar A.
Software Engineer
Enterprise(> 1000 emp.)
What do you like best about Security Orchestration, Automation & Response?
Most of the automation can be achieved without writing any code.
The best part is support for different programming languages to achieve custom integrations and automation which is not out-of-the-box supported.
MITRE ATT&CK-based framework. Review collected by and hosted on G2.com.
What do you dislike about Security Orchestration, Automation & Response?
The orchestration part is lacking here. Needs to integrate with any ITSM tool.
Also, it works best with the Cyware suite of products, CTIX and CFTR.
Need to buy CSOL and CFTR as a whole package. Review collected by and hosted on G2.com.
There are not enough reviews of Security Orchestration, Automation & Response for G2 to provide buying insight. Below are some alternatives with more reviews:
1
KnowBe4 PhishER/PhishER Plus
4.6
(486)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
2

Palo Alto Cortex XSIAM
4.3
(474)
3
Sumo Logic
4.3
(323)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
4
Microsoft Sentinel
4.4
(289)
Microsoft Azure Sentinel is a cloud-native SIEM that provides intelligent
security analytics for your entire enterprise, powered by AI.
5
Tines
4.8
(240)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action.
6
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
7
Blumira Automated Detection & Response
4.6
(107)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
8
Torq
4.7
(92)
Torq hyperautomates on-premise and hybrid environments at elastic scale. Torq offers immense extensibility that goes far beyond APIs, delivering the security automation industry’s only cloud-native, SaaS-based multi-tenant, zero-trust architecture. In addition, it provides horizontal scaling and parallelism with guaranteed SLAs. And it does it all in the simplest, more straightforward way possible, with instant workflow development featuring intuitive smart steps to guide users at any technical level. Customers also benefit from the industry’s most powerful visual data transformation capabilities.
9
Logpoint
4.3
(89)
Logpoint Converged SIEM platform combines SIEM, SOAR, UEBA and SAP security monitoring to consolidate your tech stack and remove complexity. With a data-centric approach, it accelerates threat detection and response to make your Security Operations Center more efficient to protect the entirety of your organization.
10
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
Security Orchestration, Automation & Response Categories on G2