Introducing G2.ai, the future of software buying.Try now

Best Security Orchestration, Automation, and Response (SOAR) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Security orchestration, automation, and response (SOAR) software products are tools used to help integrate security technologies and automate incident-related tasks. These tools integrate with a company’s existing security solutions to help users build and automate workflows, simplifying the incident response process and reducing the amount of human intervention necessary to handle security incidents. Companies use these tools to create a centralized system complete with visibility into a company’s security software and operational processes. These tools also reduce the time it takes to respond to incidents, as well as the potential for human error in remediating security threats and vulnerabilities.

SOAR platforms combine aspects of vulnerability management, incident response, and security information and event management (SIEM) solutions. SOAR products are designed to provide some of each tool’s respective functionality or integrate with third-party tools. Once integrated, processes can be designed to identify incidents and automate remediation tasks.

To qualify for inclusion in the Security Orchestration, Automation, and Response (SOAR) category, a product must:

Integrate security information and incident response tools
Allow security professionals to build response workflows
Automate incident management and response tasks within workflows
Provide formalized incident, workflow, and performance reports

Best Security Orchestration, Automation, and Response (SOAR) Software At A Glance

Highest Performer:
Best Free Software:
Top Trending:
Show LessShow More
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
63 Listings in Security Orchestration, Automation, and Response (SOAR) Available
(524)4.6 out of 5
1st Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:$0.75
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PhishER Plus is a FedRAMP Moderate certified, lightweight SOAR product that automatically analyzes and prioritizes reported email messages to identify and quarantine malicious emails across your organ

    Users
    • IT Manager
    • IT Director
    Industries
    • Financial Services
    • Primary/Secondary Education
    Market Segment
    • 75% Mid-Market
    • 13% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KnowBe4 PhishER/PhishER Plus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Phishing Prevention
    92
    Email Security
    72
    Ease of Use
    62
    Automation
    45
    Security
    40
    Cons
    Ineffective Email Security
    20
    False Positives
    17
    Difficult Setup
    15
    Poor Accuracy
    11
    Setup Difficulty
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KnowBe4 PhishER/PhishER Plus features and usability ratings that predict user satisfaction
    8.7
    Automated Remediation
    Average: 8.8
    9.2
    Quality of Support
    Average: 9.0
    9.0
    Ease of Admin
    Average: 8.6
    8.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Clearwater, FL
    Twitter
    @KnowBe4
    16,179 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,071 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PhishER Plus is a FedRAMP Moderate certified, lightweight SOAR product that automatically analyzes and prioritizes reported email messages to identify and quarantine malicious emails across your organ

Users
  • IT Manager
  • IT Director
Industries
  • Financial Services
  • Primary/Secondary Education
Market Segment
  • 75% Mid-Market
  • 13% Enterprise
KnowBe4 PhishER/PhishER Plus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Phishing Prevention
92
Email Security
72
Ease of Use
62
Automation
45
Security
40
Cons
Ineffective Email Security
20
False Positives
17
Difficult Setup
15
Poor Accuracy
11
Setup Difficulty
11
KnowBe4 PhishER/PhishER Plus features and usability ratings that predict user satisfaction
8.7
Automated Remediation
Average: 8.8
9.2
Quality of Support
Average: 9.0
9.0
Ease of Admin
Average: 8.6
8.7
Workflow Automation
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Clearwater, FL
Twitter
@KnowBe4
16,179 Twitter followers
LinkedIn® Page
www.linkedin.com
2,071 employees on LinkedIn®
(289)4.4 out of 5
12th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Microsoft Sentinel
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Sentinel lets you see and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and lar

    Users
    • Senior Software Engineer
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Sentinel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    29
    Ease of Use
    23
    Security
    23
    Threat Detection
    23
    Integration Support
    21
    Cons
    Expensive
    21
    Complexity
    12
    Difficult Learning
    12
    Integration Issues
    10
    Complex Setup
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Sentinel features and usability ratings that predict user satisfaction
    8.6
    Automated Remediation
    Average: 8.8
    8.5
    Quality of Support
    Average: 9.0
    8.3
    Ease of Admin
    Average: 8.6
    8.4
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Sentinel lets you see and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and lar

Users
  • Senior Software Engineer
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 31% Mid-Market
Microsoft Sentinel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
29
Ease of Use
23
Security
23
Threat Detection
23
Integration Support
21
Cons
Expensive
21
Complexity
12
Difficult Learning
12
Integration Issues
10
Complex Setup
8
Microsoft Sentinel features and usability ratings that predict user satisfaction
8.6
Automated Remediation
Average: 8.8
8.5
Quality of Support
Average: 9.0
8.3
Ease of Admin
Average: 8.6
8.4
Workflow Automation
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(254)4.8 out of 5
2nd Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Build, run, and monitor your most important workflows with Tines. Tines’ AI-enabled, secure workflow platform empowers your whole team regardless of their coding abilities, environment complexities, o

    Users
    • Security Engineer
    • Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tines Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Automation
    47
    Customer Support
    33
    Features
    27
    Time-saving
    23
    Cons
    Missing Features
    12
    Lack of Features
    11
    Learning Curve
    11
    Poor Interface Design
    9
    Complexity
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tines features and usability ratings that predict user satisfaction
    9.3
    Automated Remediation
    Average: 8.8
    9.7
    Quality of Support
    Average: 9.0
    9.2
    Ease of Admin
    Average: 8.6
    9.6
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tines
    Company Website
    Year Founded
    2018
    HQ Location
    Dublin, IE
    LinkedIn® Page
    www.linkedin.com
    403 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Build, run, and monitor your most important workflows with Tines. Tines’ AI-enabled, secure workflow platform empowers your whole team regardless of their coding abilities, environment complexities, o

Users
  • Security Engineer
  • Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 38% Mid-Market
Tines Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Automation
47
Customer Support
33
Features
27
Time-saving
23
Cons
Missing Features
12
Lack of Features
11
Learning Curve
11
Poor Interface Design
9
Complexity
8
Tines features and usability ratings that predict user satisfaction
9.3
Automated Remediation
Average: 8.8
9.7
Quality of Support
Average: 9.0
9.2
Ease of Admin
Average: 8.6
9.6
Workflow Automation
Average: 8.8
Seller Details
Seller
Tines
Company Website
Year Founded
2018
HQ Location
Dublin, IE
LinkedIn® Page
www.linkedin.com
403 employees on LinkedIn®
(101)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and pre

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Torq Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    63
    Ease of Use
    63
    Easy Integrations
    39
    Security
    38
    Customer Support
    36
    Cons
    Learning Curve
    23
    Difficult Learning
    22
    Expensive
    10
    Poor Customer Support
    9
    Improvement Needed
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Torq features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.5
    Quality of Support
    Average: 9.0
    9.5
    Ease of Admin
    Average: 8.6
    9.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    torq
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @torq_io
    1,869 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    286 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and pre

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 32% Enterprise
Torq Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
63
Ease of Use
63
Easy Integrations
39
Security
38
Customer Support
36
Cons
Learning Curve
23
Difficult Learning
22
Expensive
10
Poor Customer Support
9
Improvement Needed
8
Torq features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.5
Quality of Support
Average: 9.0
9.5
Ease of Admin
Average: 8.6
9.3
Workflow Automation
Average: 8.8
Seller Details
Seller
torq
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@torq_io
1,869 Twitter followers
LinkedIn® Page
www.linkedin.com
286 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ServiceNow Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integration Capabilities
    8
    Integration Support
    7
    Ease of Use
    5
    Implementation Ease
    5
    Incident Management
    5
    Cons
    Difficult Setup
    3
    Integration Issues
    3
    Expensive
    2
    Learning Curve
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Security Operations features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    9.1
    Quality of Support
    Average: 9.0
    8.1
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    51,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30,776 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 21% Small-Business
ServiceNow Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integration Capabilities
8
Integration Support
7
Ease of Use
5
Implementation Ease
5
Incident Management
5
Cons
Difficult Setup
3
Integration Issues
3
Expensive
2
Learning Curve
2
Licensing Issues
2
ServiceNow Security Operations features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
9.1
Quality of Support
Average: 9.0
8.1
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Company Website
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
51,662 Twitter followers
LinkedIn® Page
www.linkedin.com
30,776 employees on LinkedIn®
(21)4.6 out of 5
8th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Palo Alto Networks Cortex XSOAR
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The industry’s first extended security orchestration, automation and response platform with native threat intel management is now available.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Cortex XSOAR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Incident Management
    3
    Automation
    1
    Customer Support
    1
    Features
    1
    Integration Support
    1
    Cons
    Learning Curve
    2
    Limited Customization
    1
    Poor Reporting
    1
    Time Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Cortex XSOAR features and usability ratings that predict user satisfaction
    9.1
    Automated Remediation
    Average: 8.8
    8.7
    Quality of Support
    Average: 9.0
    8.9
    Ease of Admin
    Average: 8.6
    8.8
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

The industry’s first extended security orchestration, automation and response platform with native threat intel management is now available.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 24% Small-Business
Palo Alto Networks Cortex XSOAR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Incident Management
3
Automation
1
Customer Support
1
Features
1
Integration Support
1
Cons
Learning Curve
2
Limited Customization
1
Poor Reporting
1
Time Consumption
1
Palo Alto Networks Cortex XSOAR features and usability ratings that predict user satisfaction
9.1
Automated Remediation
Average: 8.8
8.7
Quality of Support
Average: 9.0
8.9
Ease of Admin
Average: 8.6
8.8
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(82)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for n8n
Save to My Lists
Entry Level Price:€20.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    n8n is a workflow automation platform that uniquely combines AI capabilities with business process automation. Built for technical teams, it offers 400+ integrations, custom code flexibility, and self

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 80% Small-Business
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • n8n Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    24
    Features
    19
    Ease of Use
    17
    Automation Features
    15
    Integrations
    12
    Cons
    Learning Curve
    20
    Difficult Learning
    9
    Integration Issues
    6
    Limited Integrations
    5
    Coding Difficulty
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • n8n features and usability ratings that predict user satisfaction
    8.3
    Automated Remediation
    Average: 8.8
    8.6
    Quality of Support
    Average: 9.0
    8.5
    Ease of Admin
    Average: 8.6
    9.4
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    n8n GmbH
    Company Website
    Year Founded
    2019
    HQ Location
    Berlin, Berlin
    Twitter
    @n8n_io
    39,985 Twitter followers
    LinkedIn® Page
    linkedin.com
    184 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

n8n is a workflow automation platform that uniquely combines AI capabilities with business process automation. Built for technical teams, it offers 400+ integrations, custom code flexibility, and self

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 80% Small-Business
  • 18% Mid-Market
n8n Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
24
Features
19
Ease of Use
17
Automation Features
15
Integrations
12
Cons
Learning Curve
20
Difficult Learning
9
Integration Issues
6
Limited Integrations
5
Coding Difficulty
4
n8n features and usability ratings that predict user satisfaction
8.3
Automated Remediation
Average: 8.8
8.6
Quality of Support
Average: 9.0
8.5
Ease of Admin
Average: 8.6
9.4
Workflow Automation
Average: 8.8
Seller Details
Seller
n8n GmbH
Company Website
Year Founded
2019
HQ Location
Berlin, Berlin
Twitter
@n8n_io
39,985 Twitter followers
LinkedIn® Page
linkedin.com
184 employees on LinkedIn®
(14)4.5 out of 5
3rd Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    No email defense technology can protect against increasingly advanced email threats 100 percent of the time. Some advanced social engineering attacks like business email compromise will reach users’ m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Incident Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Cybersecurity
    4
    Email Security
    3
    Incident Management
    3
    Automation
    2
    Cons
    Expensive
    1
    Inefficient Alerts
    1
    Insufficient Information
    1
    Lack of Features
    1
    Limited Accessibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Incident Response features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.3
    Quality of Support
    Average: 9.0
    9.6
    Ease of Admin
    Average: 8.6
    9.6
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

No email defense technology can protect against increasingly advanced email threats 100 percent of the time. Some advanced social engineering attacks like business email compromise will reach users’ m

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 29% Small-Business
Barracuda Incident Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Cybersecurity
4
Email Security
3
Incident Management
3
Automation
2
Cons
Expensive
1
Inefficient Alerts
1
Insufficient Information
1
Lack of Features
1
Limited Accessibility
1
Barracuda Incident Response features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.3
Quality of Support
Average: 9.0
9.6
Ease of Admin
Average: 8.6
9.6
Workflow Automation
Average: 8.8
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
(474)4.3 out of 5
16th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    7.8
    Automated Remediation
    Average: 8.8
    8.2
    Quality of Support
    Average: 9.0
    8.2
    Ease of Admin
    Average: 8.6
    7.8
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
7.8
Automated Remediation
Average: 8.8
8.2
Quality of Support
Average: 9.0
8.2
Ease of Admin
Average: 8.6
7.8
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(41)4.5 out of 5
11th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Chronicle’s cloud-native security, orchestration, automation and response (SOAR) product empowers security teams to respond to cyber threats in minutes - not hours or days. Chronicle SOAR fuses a uniq

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 41% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Alerting System
    1
    Easy Integrations
    1
    Features
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Security Operations features and usability ratings that predict user satisfaction
    9.7
    Automated Remediation
    Average: 8.8
    8.1
    Quality of Support
    Average: 9.0
    7.7
    Ease of Admin
    Average: 8.6
    9.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Chronicle’s cloud-native security, orchestration, automation and response (SOAR) product empowers security teams to respond to cyber threats in minutes - not hours or days. Chronicle SOAR fuses a uniq

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 41% Enterprise
  • 37% Mid-Market
Google Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Alerting System
1
Easy Integrations
1
Features
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
Google Security Operations features and usability ratings that predict user satisfaction
9.7
Automated Remediation
Average: 8.8
8.1
Quality of Support
Average: 9.0
7.7
Ease of Admin
Average: 8.6
9.7
Workflow Automation
Average: 8.8
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(40)4.4 out of 5
View top Consulting Services for Splunk SOAR (Security Orchestration, Automation and Response)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Consulting
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    3
    Automation
    2
    Ease of Use
    2
    Implementation Ease
    2
    Security
    2
    Cons
    Complexity
    1
    Expensive
    1
    Learning Curve
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
    8.6
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 9.0
    8.1
    Ease of Admin
    Average: 8.6
    8.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

Users
No information available
Industries
  • Information Technology and Services
  • Consulting
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
3
Automation
2
Ease of Use
2
Implementation Ease
2
Security
2
Cons
Complexity
1
Expensive
1
Learning Curve
1
Poor Customer Support
1
Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
8.6
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 9.0
8.1
Ease of Admin
Average: 8.6
8.7
Workflow Automation
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(44)4.6 out of 5
15th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
View top Consulting Services for Swimlane
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit fro

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Swimlane Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Easy Integrations
    6
    Features
    6
    Integrations
    6
    Automation
    5
    Cons
    Complexity
    2
    Learning Curve
    2
    Poor Customer Support
    2
    Poor Interface Design
    2
    Update Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Swimlane features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.1
    Quality of Support
    Average: 9.0
    8.6
    Ease of Admin
    Average: 8.6
    9.4
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Swimlane
    Year Founded
    2014
    HQ Location
    Boulder, US
    Twitter
    @swimlane
    1,643 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    258 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit fro

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Mid-Market
  • 32% Small-Business
Swimlane Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Easy Integrations
6
Features
6
Integrations
6
Automation
5
Cons
Complexity
2
Learning Curve
2
Poor Customer Support
2
Poor Interface Design
2
Update Issues
2
Swimlane features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.1
Quality of Support
Average: 9.0
8.6
Ease of Admin
Average: 8.6
9.4
Workflow Automation
Average: 8.8
Seller Details
Seller
Swimlane
Year Founded
2014
HQ Location
Boulder, US
Twitter
@swimlane
1,643 Twitter followers
LinkedIn® Page
www.linkedin.com
258 employees on LinkedIn®
(89)4.3 out of 5
13th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:Starting at €1.67
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Learning
    1
    Ease of Management
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Information Deficiency
    1
    Lack of Features
    1
    Limited Accessibility
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.5
    Automated Remediation
    Average: 8.8
    9.1
    Quality of Support
    Average: 9.0
    8.0
    Ease of Admin
    Average: 8.6
    8.9
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 29% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Learning
1
Ease of Management
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Expensive
1
Information Deficiency
1
Lack of Features
1
Limited Accessibility
1
Limited Features
1
Logpoint features and usability ratings that predict user satisfaction
8.5
Automated Remediation
Average: 8.8
9.1
Quality of Support
Average: 9.0
8.0
Ease of Admin
Average: 8.6
8.9
Workflow Automation
Average: 8.8
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
996 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
(342)4.3 out of 5
Optimized for quick response
14th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sumo Logic Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Log Management
    23
    Monitoring
    23
    Real-time Monitoring
    21
    Easy Integrations
    19
    Cons
    Difficult Learning
    13
    Learning Curve
    10
    Learning Difficulty
    10
    UX Improvement
    9
    Expensive
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sumo Logic features and usability ratings that predict user satisfaction
    8.8
    Automated Remediation
    Average: 8.8
    8.6
    Quality of Support
    Average: 9.0
    8.4
    Ease of Admin
    Average: 8.6
    8.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, CA
    Twitter
    @SumoLogic
    6,569 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    935 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
Sumo Logic Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Log Management
23
Monitoring
23
Real-time Monitoring
21
Easy Integrations
19
Cons
Difficult Learning
13
Learning Curve
10
Learning Difficulty
10
UX Improvement
9
Expensive
8
Sumo Logic features and usability ratings that predict user satisfaction
8.8
Automated Remediation
Average: 8.8
8.6
Quality of Support
Average: 9.0
8.4
Ease of Admin
Average: 8.6
8.3
Workflow Automation
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, CA
Twitter
@SumoLogic
6,569 Twitter followers
LinkedIn® Page
www.linkedin.com
935 employees on LinkedIn®
(18)4.7 out of 5
6th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seller Details
    Expand/Collapse Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Demisto is a platform that provides automated and collaborative security solutions.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Demisto features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 9.0
    8.7
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Demisto is a platform that provides automated and collaborative security solutions.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 40% Small-Business
Demisto features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 9.0
8.7
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    8.6
    Quality of Support
    Average: 9.0
    8.8
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
8.6
Quality of Support
Average: 9.0
8.8
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    9.8
    Quality of Support
    Average: 9.0
    10.0
    Ease of Admin
    Average: 8.6
    8.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    72 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
9.8
Quality of Support
Average: 9.0
10.0
Ease of Admin
Average: 8.6
8.3
Workflow Automation
Average: 8.8
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
72 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
(87)4.7 out of 5
10th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    9.1
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 9.0
    8.8
    Ease of Admin
    Average: 8.6
    7.8
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
9.1
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 9.0
8.8
Ease of Admin
Average: 8.6
7.8
Workflow Automation
Average: 8.8
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,694 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(15)4.8 out of 5
7th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Shuffle is an open source automation platform for security professionals (SOAR). Run it locally: https://github.com/frikky/shuffle Try it out here: https://shuffler.io/register Join the community: h

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Shuffle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    No Coding
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Shuffle features and usability ratings that predict user satisfaction
    9.5
    Automated Remediation
    Average: 8.8
    9.4
    Quality of Support
    Average: 9.0
    9.4
    Ease of Admin
    Average: 8.6
    9.8
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Shuffle is an open source automation platform for security professionals (SOAR). Run it locally: https://github.com/frikky/shuffle Try it out here: https://shuffler.io/register Join the community: h

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Shuffle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
No Coding
1
Security
1
Cons
This product has not yet received any negative sentiments.
Shuffle features and usability ratings that predict user satisfaction
9.5
Automated Remediation
Average: 8.8
9.4
Quality of Support
Average: 9.0
9.4
Ease of Admin
Average: 8.6
9.8
Workflow Automation
Average: 8.8
Seller Details
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
(117)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Security Orchestration, Automation, and Response (SOAR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    17
    Setup Ease
    15
    Deployment Ease
    13
    Easy Setup
    12
    Cons
    Limited Customization
    7
    Expensive
    4
    Lack of Customization
    4
    Limited Reporting
    4
    Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    7.5
    Automated Remediation
    Average: 8.8
    9.5
    Quality of Support
    Average: 9.0
    9.0
    Ease of Admin
    Average: 8.6
    9.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
17
Setup Ease
15
Deployment Ease
13
Easy Setup
12
Cons
Limited Customization
7
Expensive
4
Lack of Customization
4
Limited Reporting
4
Alert System
3
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
7.5
Automated Remediation
Average: 8.8
9.5
Quality of Support
Average: 9.0
9.0
Ease of Admin
Average: 8.6
9.7
Workflow Automation
Average: 8.8
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    D3 stands at the forefront of AI-powered security, providing real-time, autonomous SOC solutions that help organizations stay ahead of cyber threats. By merging autonomous investigation and triage wit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • D3 Security features and usability ratings that predict user satisfaction
    8.3
    Automated Remediation
    Average: 8.8
    9.0
    Quality of Support
    Average: 9.0
    8.2
    Ease of Admin
    Average: 8.6
    6.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Vancouver, British Columbia
    Twitter
    @D3Security
    1,123 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    173 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

D3 stands at the forefront of AI-powered security, providing real-time, autonomous SOC solutions that help organizations stay ahead of cyber threats. By merging autonomous investigation and triage wit

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Enterprise
  • 41% Mid-Market
D3 Security features and usability ratings that predict user satisfaction
8.3
Automated Remediation
Average: 8.8
9.0
Quality of Support
Average: 9.0
8.2
Ease of Admin
Average: 8.6
6.7
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2012
HQ Location
Vancouver, British Columbia
Twitter
@D3Security
1,123 Twitter followers
LinkedIn® Page
www.linkedin.com
173 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Try our Free SOAR today! https://info.logichub.com/soar-free-edition-2022 About us: Founded in 2016 by seasoned cybersecurity veterans from ArcSight and Sumo Logic, LogicHub is built on the principl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogicHub features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    9.4
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devo
    Year Founded
    2011
    HQ Location
    Boston, US
    Twitter
    @devo_Inc
    6,240 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Try our Free SOAR today! https://info.logichub.com/soar-free-edition-2022 About us: Founded in 2016 by seasoned cybersecurity veterans from ArcSight and Sumo Logic, LogicHub is built on the principl

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 27% Mid-Market
LogicHub features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
9.4
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Seller
Devo
Year Founded
2011
HQ Location
Boston, US
Twitter
@devo_Inc
6,240 Twitter followers
LinkedIn® Page
www.linkedin.com
604 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Cloud Pak for Security is a platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritize your team’s time

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Cloud Pak for Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Ease of Use
    2
    Easy Integrations
    1
    Implementation Ease
    1
    Integrations
    1
    Cons
    Integration Issues
    2
    Expensive
    1
    Limitations
    1
    Microsoft Dependency
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Cloud Pak for Security features and usability ratings that predict user satisfaction
    8.9
    Automated Remediation
    Average: 8.8
    9.2
    Quality of Support
    Average: 9.0
    8.9
    Ease of Admin
    Average: 8.6
    8.9
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Cloud Pak for Security is a platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritize your team’s time

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
IBM Cloud Pak for Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Ease of Use
2
Easy Integrations
1
Implementation Ease
1
Integrations
1
Cons
Integration Issues
2
Expensive
1
Limitations
1
Microsoft Dependency
1
IBM Cloud Pak for Security features and usability ratings that predict user satisfaction
8.9
Automated Remediation
Average: 8.8
9.2
Quality of Support
Average: 9.0
8.9
Ease of Admin
Average: 8.6
8.9
Workflow Automation
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Threat Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    2
    Automated Response
    1
    Phishing Prevention
    1
    Security
    1
    Threat Detection
    1
    Cons
    Email Management
    1
    False Positives
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response features and usability ratings that predict user satisfaction
    9.0
    Automated Remediation
    Average: 8.8
    8.8
    Quality of Support
    Average: 9.0
    9.2
    Ease of Admin
    Average: 8.6
    8.8
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 24% Enterprise
Proofpoint Threat Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
2
Automated Response
1
Phishing Prevention
1
Security
1
Threat Detection
1
Cons
Email Management
1
False Positives
1
Learning Curve
1
Proofpoint Threat Response features and usability ratings that predict user satisfaction
9.0
Automated Remediation
Average: 8.8
8.8
Quality of Support
Average: 9.0
9.2
Ease of Admin
Average: 8.6
8.8
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(12)4.3 out of 5
View top Consulting Services for Microsoft Security Copilot
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Security Copilot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    5
    Security Protection
    5
    Threat Detection
    5
    Automation
    4
    Cons
    Complexity
    3
    Expensive
    3
    Difficult Learning Curve
    2
    False Positives
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Security Copilot features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.5
    Quality of Support
    Average: 9.0
    7.8
    Ease of Admin
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
Microsoft Security Copilot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
5
Security Protection
5
Threat Detection
5
Automation
4
Cons
Complexity
3
Expensive
3
Difficult Learning Curve
2
False Positives
2
Access Control
1
Microsoft Security Copilot features and usability ratings that predict user satisfaction
0.0
No information available
8.5
Quality of Support
Average: 9.0
7.8
Ease of Admin
Average: 8.6
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Helix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Support
    2
    Log Management
    2
    Cons
    Information Deficiency
    1
    Information Overload
    1
    Insufficient Information
    1
    Limited Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Helix features and usability ratings that predict user satisfaction
    8.3
    Automated Remediation
    Average: 8.8
    8.5
    Quality of Support
    Average: 9.0
    8.9
    Ease of Admin
    Average: 8.6
    8.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Small-Business
Trellix Helix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Support
2
Log Management
2
Cons
Information Deficiency
1
Information Overload
1
Insufficient Information
1
Limited Information
1
Trellix Helix features and usability ratings that predict user satisfaction
8.3
Automated Remediation
Average: 8.8
8.5
Quality of Support
Average: 9.0
8.9
Ease of Admin
Average: 8.6
8.3
Workflow Automation
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DNIF HYPERCLOUD Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Ease of Use
    1
    Easy Implementation
    1
    Features
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Limited Compatibility
    1
    Limited Integration
    1
    Limited Third-Party Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    8.9
    Quality of Support
    Average: 9.0
    8.9
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DNIF
    Year Founded
    2002
    HQ Location
    Mountain View, California
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
DNIF HYPERCLOUD Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Ease of Use
1
Easy Implementation
1
Features
1
Implementation Ease
1
Cons
Expensive
1
Integration Issues
1
Limited Compatibility
1
Limited Integration
1
Limited Third-Party Integration
1
DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
8.9
Quality of Support
Average: 9.0
8.9
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Seller
DNIF
Year Founded
2002
HQ Location
Mountain View, California
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetWitness Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetWitness Platform features and usability ratings that predict user satisfaction
    9.2
    Automated Remediation
    Average: 8.8
    7.4
    Quality of Support
    Average: 9.0
    7.4
    Ease of Admin
    Average: 8.6
    9.2
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Bedford, MA
    Twitter
    @Netwitness
    1,639 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
NetWitness Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation
1
Threat Detection
1
Cons
Integration Issues
1
NetWitness Platform features and usability ratings that predict user satisfaction
9.2
Automated Remediation
Average: 8.8
7.4
Quality of Support
Average: 9.0
7.4
Ease of Admin
Average: 8.6
9.2
Workflow Automation
Average: 8.8
Seller Details
Year Founded
1997
HQ Location
Bedford, MA
Twitter
@Netwitness
1,639 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Orchestration and automation to accelerate your teams and tools

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightConnect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Difficult Setup
    1
    Lack of Features
    1
    Poor Customer Support
    1
    Poor Documentation
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightConnect features and usability ratings that predict user satisfaction
    3.3
    Automated Remediation
    Average: 8.8
    3.9
    Quality of Support
    Average: 9.0
    2.5
    Ease of Admin
    Average: 8.6
    7.5
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Orchestration and automation to accelerate your teams and tools

Users
No information available
Industries
No information available
Market Segment
  • 80% Enterprise
  • 20% Mid-Market
InsightConnect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Difficult Setup
1
Lack of Features
1
Poor Customer Support
1
Poor Documentation
1
Update Issues
1
InsightConnect features and usability ratings that predict user satisfaction
3.3
Automated Remediation
Average: 8.8
3.9
Quality of Support
Average: 9.0
2.5
Ease of Admin
Average: 8.6
7.5
Workflow Automation
Average: 8.8
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securonix is working to radically transform all areas of data security with actionable security intelligence.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Securonix Security Operations and Analytics Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Detection Accuracy
    1
    Ease of Understanding
    1
    Cons
    Alerting Issues
    1
    Complex Querying
    1
    Inefficient Alerting
    1
    Logging Issues
    1
    Log Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
    8.3
    Automated Remediation
    Average: 8.8
    8.1
    Quality of Support
    Average: 9.0
    8.3
    Ease of Admin
    Average: 8.6
    9.2
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securonix
    Year Founded
    2008
    HQ Location
    Addison, US
    Twitter
    @Securonix
    4,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securonix is working to radically transform all areas of data security with actionable security intelligence.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 31% Small-Business
Securonix Security Operations and Analytics Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Detection Accuracy
1
Ease of Understanding
1
Cons
Alerting Issues
1
Complex Querying
1
Inefficient Alerting
1
Logging Issues
1
Log Management
1
Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
8.3
Automated Remediation
Average: 8.8
8.1
Quality of Support
Average: 9.0
8.3
Ease of Admin
Average: 8.6
9.2
Workflow Automation
Average: 8.8
Seller Details
Seller
Securonix
Year Founded
2008
HQ Location
Addison, US
Twitter
@Securonix
4,228 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Exabeam New-Scale Fusion Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Information Deficiency
    1
    Insufficient Detail
    1
    Not User-Friendly
    1
    Parsing Issues
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    8.0
    Quality of Support
    Average: 9.0
    8.8
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
Exabeam New-Scale Fusion Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Capabilities
1
Integrations
1
Cons
Information Deficiency
1
Insufficient Detail
1
Not User-Friendly
1
Parsing Issues
1
Poor Interface Design
1
Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
8.0
Quality of Support
Average: 9.0
8.8
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,344 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ORNA is an end-to-end incident response automation platform for lean teams in midsize businesses that helps streamline or automate detection, response, and even prevention of cyberattacks on the organ

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Small-Business
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ORNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Integration Support
    2
    Monitoring
    2
    Automation Ease
    1
    Cloud Services
    1
    Cons
    Information Deficiency
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ORNA features and usability ratings that predict user satisfaction
    6.7
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    10.0
    Ease of Admin
    Average: 8.6
    6.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ORNA
    Year Founded
    2021
    HQ Location
    Toronto, Canada
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ORNA is an end-to-end incident response automation platform for lean teams in midsize businesses that helps streamline or automate detection, response, and even prevention of cyberattacks on the organ

Users
No information available
Industries
No information available
Market Segment
  • 71% Small-Business
  • 14% Enterprise
ORNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Integration Support
2
Monitoring
2
Automation Ease
1
Cloud Services
1
Cons
Information Deficiency
1
Insufficient Information
1
ORNA features and usability ratings that predict user satisfaction
6.7
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
10.0
Ease of Admin
Average: 8.6
6.7
Workflow Automation
Average: 8.8
Seller Details
Seller
ORNA
Year Founded
2021
HQ Location
Toronto, Canada
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    autobotAI is a agentic security automation platform that streamlines and secures Security and IT operations. Leveraging generative AI, it automates workflows across multi-cloud environments, integrati

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • autobotAI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    No Coding
    2
    Workflow Management
    2
    Automation Ease
    1
    Customer Support
    1
    Cons
    Limitations
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • autobotAI features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    0.0
    No information available
    9.2
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Bangalore, IN
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

autobotAI is a agentic security automation platform that streamlines and secures Security and IT operations. Leveraging generative AI, it automates workflows across multi-cloud environments, integrati

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
autobotAI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
No Coding
2
Workflow Management
2
Automation Ease
1
Customer Support
1
Cons
Limitations
1
Slow Performance
1
autobotAI features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
0.0
No information available
9.2
Workflow Automation
Average: 8.8
Seller Details
Year Founded
2018
HQ Location
Bangalore, IN
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DTonomy’s AI Assisted Incident Response (AIR) platform manages alerts from multiple security tools and infrastructure and automates manual time-consuming and repetitive tasks. AIR is powered by DTonom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DTonomy Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Detection Accuracy
    1
    Machine Learning
    1
    Phishing Prevention
    1
    Response Time
    1
    Cons
    Limited Customization
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DTonomy features and usability ratings that predict user satisfaction
    9.4
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    6.7
    Ease of Admin
    Average: 8.6
    9.4
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DTonomy
    Year Founded
    2018
    HQ Location
    Cambridge, Massachusetts
    Twitter
    @Peter_DTonomy
    352 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DTonomy’s AI Assisted Incident Response (AIR) platform manages alerts from multiple security tools and infrastructure and automates manual time-consuming and repetitive tasks. AIR is powered by DTonom

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
DTonomy Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Detection Accuracy
1
Machine Learning
1
Phishing Prevention
1
Response Time
1
Cons
Limited Customization
1
Poor Interface Design
1
DTonomy features and usability ratings that predict user satisfaction
9.4
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
6.7
Ease of Admin
Average: 8.6
9.4
Workflow Automation
Average: 8.8
Seller Details
Seller
DTonomy
Year Founded
2018
HQ Location
Cambridge, Massachusetts
Twitter
@Peter_DTonomy
352 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiSOAR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Incident Management
    2
    Security
    2
    Automation
    1
    Customer Support
    1
    Ease of Use
    1
    Cons
    Complex Implementation
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSOAR features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    8.3
    Ease of Admin
    Average: 8.6
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
FortiSOAR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Incident Management
2
Security
2
Automation
1
Customer Support
1
Ease of Use
1
Cons
Complex Implementation
1
Difficult Setup
1
FortiSOAR features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
8.3
Ease of Admin
Average: 8.6
10.0
Workflow Automation
Average: 8.8
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments at machine speeds.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Security Orchestration, Automation & Response features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    8.3
    Quality of Support
    Average: 9.0
    0.0
    No information available
    8.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyware
    Year Founded
    2016
    HQ Location
    Jersey City, New Jersey
    Twitter
    @CywareCo
    4,706 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    267 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments at machine speeds.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Security Orchestration, Automation & Response features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
8.3
Quality of Support
Average: 9.0
0.0
No information available
8.3
Workflow Automation
Average: 8.8
Seller Details
Seller
Cyware
Year Founded
2016
HQ Location
Jersey City, New Jersey
Twitter
@CywareCo
4,706 Twitter followers
LinkedIn® Page
www.linkedin.com
267 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devo unlocks the full value of machine data for the world’s most instrumented enterprises by putting more data to work now. With Devo, IT executives finally realize the transformational promise of mac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devo features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devo
    Year Founded
    2011
    HQ Location
    Boston, US
    Twitter
    @devo_Inc
    6,240 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devo unlocks the full value of machine data for the world’s most instrumented enterprises by putting more data to work now. With Devo, IT executives finally realize the transformational promise of mac

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
Devo features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 9.0
0.0
No information available
0.0
No information available
Seller Details
Seller
Devo
Year Founded
2011
HQ Location
Boston, US
Twitter
@devo_Inc
6,240 Twitter followers
LinkedIn® Page
www.linkedin.com
604 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security Automation is a modern approach to maximize your security budgets to achieve on-demand security capabilities with flexible pay-as-you-go pricing models. Automate your penetration test

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evolve Security Automation features and usability ratings that predict user satisfaction
    8.3
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    10.0
    Ease of Admin
    Average: 8.6
    8.3
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security Automation is a modern approach to maximize your security budgets to achieve on-demand security capabilities with flexible pay-as-you-go pricing models. Automate your penetration test

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Evolve Security Automation features and usability ratings that predict user satisfaction
8.3
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
10.0
Ease of Admin
Average: 8.6
8.3
Workflow Automation
Average: 8.8
Seller Details
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    7.7
    Quality of Support
    Average: 9.0
    8.0
    Ease of Admin
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
7.7
Quality of Support
Average: 9.0
8.0
Ease of Admin
Average: 8.6
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Cloud Pack for Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Lack of Features
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Cloud Pack for Security features and usability ratings that predict user satisfaction
    6.7
    Automated Remediation
    Average: 8.8
    5.0
    Quality of Support
    Average: 9.0
    5.0
    Ease of Admin
    Average: 8.6
    6.7
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
IBM Cloud Pack for Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Lack of Features
1
Update Issues
1
IBM Cloud Pack for Security features and usability ratings that predict user satisfaction
6.7
Automated Remediation
Average: 8.8
5.0
Quality of Support
Average: 9.0
5.0
Ease of Admin
Average: 8.6
6.7
Workflow Automation
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskIQ is the digital threat management, providing the most comprehensive discovery, intelligence and mitigation of threats associated with an organization’s digital presence

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskIQ Illuminate features and usability ratings that predict user satisfaction
    8.3
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    6.7
    Ease of Admin
    Average: 8.6
    5.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskIQ
    Year Founded
    2009
    HQ Location
    San Francisco, CA
    Twitter
    @RiskIQ
    11,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskIQ is the digital threat management, providing the most comprehensive discovery, intelligence and mitigation of threats associated with an organization’s digital presence

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RiskIQ Illuminate features and usability ratings that predict user satisfaction
8.3
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
6.7
Ease of Admin
Average: 8.6
5.0
Workflow Automation
Average: 8.8
Seller Details
Seller
RiskIQ
Year Founded
2009
HQ Location
San Francisco, CA
Twitter
@RiskIQ
11,139 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cloud-based threat detection and management

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • StegoSOC Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Accuracy
    1
    Ease of Use
    1
    Features
    1
    Reliability
    1
    Reporting Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StegoSOC features and usability ratings that predict user satisfaction
    10.0
    Automated Remediation
    Average: 8.8
    10.0
    Quality of Support
    Average: 9.0
    0.0
    No information available
    10.0
    Workflow Automation
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    StegoSOC
    Year Founded
    2016
    HQ Location
    Durham, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cloud-based threat detection and management

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
StegoSOC Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Accuracy
1
Ease of Use
1
Features
1
Reliability
1
Reporting Ease
1
Cons
This product has not yet received any negative sentiments.
StegoSOC features and usability ratings that predict user satisfaction
10.0
Automated Remediation
Average: 8.8
10.0
Quality of Support
Average: 9.0
0.0
No information available
10.0
Workflow Automation
Average: 8.8
Seller Details
Seller
StegoSOC
Year Founded
2016
HQ Location
Durham, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations pla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatQ features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Quality of Support
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Reston, Virginia
    Twitter
    @ThreatQuotient
    2,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations pla

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ThreatQ features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Quality of Support
Average: 9.0
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Reston, Virginia
Twitter
@ThreatQuotient
2,283 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arcanna.AI is an AI Platform focused on augmenting human decisions in the SOC, agnostic to the tools and processes utilized by the analyst team. Reduce the risk of human error and increase efficiency

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arcanna.AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    Twitter
    @ArcannaAi
    81 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arcanna.AI is an AI Platform focused on augmenting human decisions in the SOC, agnostic to the tools and processes utilized by the analyst team. Reduce the risk of human error and increase efficiency

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Arcanna.AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2019
Twitter
@ArcannaAi
81 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Radiant Security is an autonomous SecOps platform that puts your SOC on auto-pilot. Radiant Security automates SecOps using machine learning and AI to triage and investigate incidents with a consisten

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Autonomous SecOps Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Radiant Security is an autonomous SecOps platform that puts your SOC on auto-pilot. Radiant Security automates SecOps using machine learning and AI to triage and investigate incidents with a consisten

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Autonomous SecOps Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BIMA by Perisai: Redefining Cybersecurity with a Symphony of EDR, NDR, XDR, and SIEM. Experience digital freedom like never before, where every click is safe, and every innovation is secure. Bima - wh

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BIMA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Peris.ai
    Year Founded
    2022
    HQ Location
    Jakarta, ID
    Twitter
    @peris_ai
    140 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BIMA by Perisai: Redefining Cybersecurity with a Symphony of EDR, NDR, XDR, and SIEM. Experience digital freedom like never before, where every click is safe, and every innovation is secure. Bima - wh

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BIMA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Peris.ai
Year Founded
2022
HQ Location
Jakarta, ID
Twitter
@peris_ai
140 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bringing the power of hyperscaler technology to the enterprise, Cisco Hypershield is a groundbreaking security architecture designed to defend modern, AI-scale data centers.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Hypershield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Bringing the power of hyperscaler technology to the enterprise, Cisco Hypershield is a groundbreaking security architecture designed to defend modern, AI-scale data centers.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cisco Hypershield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CounterCraft The Platform™ is the highest-quality platform for active defense powered by deception technology. It allows organizations to identify unknown risks and threats tailored to their external

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CounterCraft The Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, US
    Twitter
    @countercraftsec
    1,320 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CounterCraft The Platform™ is the highest-quality platform for active defense powered by deception technology. It allows organizations to identify unknown risks and threats tailored to their external

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CounterCraft The Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
New York, US
Twitter
@countercraftsec
1,320 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CybernetIQ’s CLAW is a military-grade attack surface analysis (ASA) platform that consolidates protection, detection, and remediation capabilities in a single frame to deliver what most SIEM and SOAR

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CybernetIQ features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

CybernetIQ’s CLAW is a military-grade attack surface analysis (ASA) platform that consolidates protection, detection, and remediation capabilities in a single frame to deliver what most SIEM and SOAR

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CybernetIQ features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DoControl Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Visibility
    2
    Access Control
    1
    Cloud Management
    1
    Deployment Ease
    1
    Cons
    Complexity
    2
    Access Control
    1
    Complex Configuration
    1
    Configuration Issues
    1
    Connectivity Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DoControl features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DoControl
    Year Founded
    2020
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    60 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution u

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
DoControl Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Visibility
2
Access Control
1
Cloud Management
1
Deployment Ease
1
Cons
Complexity
2
Access Control
1
Complex Configuration
1
Configuration Issues
1
Connectivity Issues
1
DoControl features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 9.0
0.0
No information available
0.0
No information available
Seller Details
Seller
DoControl
Year Founded
2020
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
60 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HyprEdge is a first of its kind No Code automation platform to modernize cybersecurity automation by introducing multiple innovative and industry first capabilities that bring cohesive collaboration a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HyprEdge features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HyprEdge
    Year Founded
    2022
    HQ Location
    Portland, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HyprEdge is a first of its kind No Code automation platform to modernize cybersecurity automation by introducing multiple innovative and industry first capabilities that bring cohesive collaboration a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
HyprEdge features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
HyprEdge
Year Founded
2022
HQ Location
Portland, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Streamline your approach to security operations with the industry’s most comprehensive cyber security solution bringing together People, Process and Technology.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure SOAR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Streamline your approach to security operations with the industry’s most comprehensive cyber security solution bringing together People, Process and Technology.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure SOAR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mindflow is the first AI-driven platform for enterprise hyperautomation, that makes automation achievable in the whole company to dramatically increase efficiency and consistency of repetitive process

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mindflow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mindflow
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mindflow is the first AI-driven platform for enterprise hyperautomation, that makes automation achievable in the whole company to dramatically increase efficiency and consistency of repetitive process

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Mindflow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Mindflow
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReliaQuest GreyMatter features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Tampa, FL
    Twitter
    @ReliaQuest
    2,490 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    254 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ReliaQuest GreyMatter features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2007
HQ Location
Tampa, FL
Twitter
@ReliaQuest
2,490 Twitter followers
LinkedIn® Page
www.linkedin.com
254 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Revelstoke radically simplifies security orchestration, automation and response (SOAR), so security teams can work faster, smarter and more effectively. With a low-code, drag-and-drop interface, dozen

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Revelstoke features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Revelstoke radically simplifies security orchestration, automation and response (SOAR), so security teams can work faster, smarter and more effectively. With a low-code, drag-and-drop interface, dozen

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Revelstoke features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securaa (SOAR + TIP + CSAM) Securaa is a Comprehensive No Code Security Automation Platform that blends intelligence, risk-based asset management, vulnerability insights, automation and incident re

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SECURAA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securaa
    HQ Location
    Dallas, US
    LinkedIn® Page
    www.linkedin.com
    54 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securaa (SOAR + TIP + CSAM) Securaa is a Comprehensive No Code Security Automation Platform that blends intelligence, risk-based asset management, vulnerability insights, automation and incident re

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SECURAA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Securaa
HQ Location
Dallas, US
LinkedIn® Page
www.linkedin.com
54 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Security Flow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Security Flow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sequretek MDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 9.0
    8.3
    Ease of Admin
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Woodbridge, US
    LinkedIn® Page
    www.linkedin.com
    396 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Sequretek MDR features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 9.0
8.3
Ease of Admin
Average: 8.6
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Woodbridge, US
LinkedIn® Page
www.linkedin.com
396 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transform your SOC team into a proactive cyber task force by streamlining and centralizing security operations, empowering your team to optimize intelligence, automate alert handling and expedite inci

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StrikeReady features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transform your SOC team into a proactive cyber task force by streamlining and centralizing security operations, empowering your team to optimize intelligence, automate alert handling and expedite inci

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StrikeReady features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trickest Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trickest
    HQ Location
    Dover, Delaware
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Trickest Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Trickest
HQ Location
Dover, Delaware
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Our platform centralizes and contextualizes security data to provide the insights required for an efficie

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uplevel Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    New York, US
    Twitter
    @uplevelsecurity
    534 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Our platform centralizes and contextualizes security data to provide the insights required for an efficie

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Uplevel Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
New York, US
Twitter
@uplevelsecurity
534 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A powerful tool for OT cybersecurity environments - leveraging host and network data through automation to provide network visibility and assist in threat hunting. Valkyrie proactively monitors for t

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Valkyrie Security Automation features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Antonio, US
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A powerful tool for OT cybersecurity environments - leveraging host and network data through automation to provide network visibility and assist in threat hunting. Valkyrie proactively monitors for t

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Valkyrie Security Automation features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
San Antonio, US
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®

Learn More About Security Orchestration, Automation, and Response (SOAR) Software

What is Security, Orchestration, Automation, and Response (SOAR) Software?

Security orchestration, automation, and response (SOAR) software helps coordinate, execute, and automate tasks between various IT workers and tools. SOAR tools allow organizations to respond quickly to cybersecurity attacks and observe, understand, and prevent future incidents.

SOAR software gives organizations a comprehensive view of their existing security systems while centralizing the security data. By automating security responses and reducing manual tasks, SOAR helps to generate a faster and more accurate response to security attacks. It also helps better coordinate and route incident response to the most appropriate IT worker in real time.

What Does SOAR Stand For?

SOAR stands for security orchestration, automation, and response. SOAR software significantly contributes to identifying potential future security threats.

What are the Common Features of Security, Orchestration, Automation, and Response (SOAR) Software?

Usually, a SOAR software offering operates under three primary software capabilities:

Threat and vulnerability management: Threat and vulnerability management examines key assets and prioritizes efforts to reduce risk. Working with other security teams, threat and vulnerability management helps prevent attacks by threat actors.

Security incident response: Security incident response addresses and manages the aftermath of a security breach, cyberattack, computer incident, or security incident. Security incident response is to handle the aftermath of a security breach in a way that limits damage, reduces recovery time, and reduces cost.

Security operations automation: Security operations automation is the technology that enables the automation and orchestration of security tasks. This can include both administrative duties and incident detection and response.

What are the Benefits of Security, Orchestration, Automation, and Response (SOAR) Software?

The benefits of using a SOAR tool are that it lessens the impact of security incidents and reduces the risk of legal liability. SOAR software helps companies’ security teams by enabling them to:

Maintain a central view: One of the benefits of SOAR software is that it gives security staff a central view and enables control of existing security systems while centralizing data collection to improve a company's security posture, operational efficiency, and productivity. 

Automate manual tasks: As with most software today, users are looking for help in terms of automation. SOAR software helps to manage and automate all aspects of a security incident lifecycle. This removes manual tasks, gives security staff more time to be productive, and allows them to focus on more mission-critical security tasks that do not require manual tasks.

Define incident and response procedures: SOAR software helps security systems define incident and response procedures. This helps to route security incidents to the correct security staff. SOAR can also prioritize and standardize the security response processes in a consistent, transparent, and documented way. 

Optimize incident response: Because SOAR software helps security staff define incident and response procedures, incident response is more accurate. This accuracy enables security systems and staff to have improved responses where they may have to contain, eradicate, or recover crucial data. 

Identify and assign incident severity levels: SOAR software helps to identify and assign incident severity levels. Severity levels in cybersecurity measure how severely a security incident impacts various parts of the organization. SOAR software automatically identifies and assigns severity levels, enabling the right security system and staff to respond appropriately. This means both can respond immediately to security incidents that may negatively affect an organization, such as networks, software, employee or customer data, etc.

Support collaboration and unstructured investigations: SOAR software supports collaboration and unstructured investigations in real time, helping route each security incident to the security system and security staff best suited to respond. Collaboration with other IT teams for tasks such as remediation or other departments such as legal is possible. 

Streamline operations: By using SOAR software, organizations can streamline security operations for threat and vulnerability management, security incident response, and security operations automation. SOAR software connects these security elements while integrating disparate security systems. SOAR software’s playbooks allow users to orchestrate, streamline and automate tasks. Playbooks also codify the process workflows that streamline the SOAR software functions.

Who Uses Security, Orchestration, Automation, and Response (SOAR) Software?

IT and cybersecurity staff: They use SOAR software to handle security alerts such as phishing, which includes looking for threat feed data from endpoints, failed user logins, logins from unusual locations, malicious VPN access attempts, and so on. It's also used to hunt for threats and respond to incidents from attached files for malware analysis, cloud-aware incident response, and automate data enrichment. Cybersecurity staff who assign incident severity and check other products for vulnerability scores also use SOAR platforms.

Challenges with Security, Orchestration, Automation, and Response (SOAR) software

There are a number of challenges with SOAR software that IT teams can encounter.

Skill gaps: While there is the misconception that SOAR software could replace security staff, the tool is meant to augment security teams, allowing them to work efficiently and effectively but not replacing them. However, there still may be a skills gap as the security team must be able to create detailed workflows of their processes.

Effective deployment: Another challenge of SOAR software is that it must be deployed to the enterprise but also connected to the other applications and technologies, which can be very complicated. An organization must also have staff with enough skills to deploy and maintain the platform. The applications and technologies used by the enterprise must also be able to support or be integrated into the SOAR software. One of SOAR software’s greatest strengths is to connect and orchestrate other technologies; however, if each technology is unable to be integrated, it hampers the benefits of deploying SOAR software.

How to Buy Security, Orchestration, Automation, and Response Software

Requirements Gathering (RFI/RFP) for Security, Orchestration, Automation, and Response (SOAR) Software

If an organization is just starting out and looking to purchase SOAR software, g2.com can help select the best one.

Most business pain points might be related to all of the manual work that must be completed. If the company is large and has a lot of networks, data, or devices in its organization, they may need to shop for a SOAR software that can grow with its organization. Users should think about the pain points in security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use the SOAR software and if they currently have the skills to administer it. 

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The checklist serves as a detailed guide that includes both necessary and nice-to-have features, including budget, features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the scope of the deployment, it might be helpful to produce an RFI, a one-page list with a few bullet points describing what is needed from SOAR software.

Compare Security, Orchestration, Automation, and Response (SOAR) Software

Create a long list

Vendor evaluations are an essential part of the software buying process from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

Create a short list

From the long list of vendors, it is helpful to narrow down the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list in hand, businesses can produce a matrix to compare the features and pricing of the various solutions.

Conduct demos

To ensure the comparison is comprehensive, the user should demo each solution on the shortlist with the same use cases. This will allow the business to evaluate like for like and see how each vendor stacks up against the competition. 

Selection of Security, Orchestration, Automation, and Response (SOAR) Software

Choose a selection team

Before getting started, creating a winning team that will work together throughout the entire process, from identifying pain points to implementation, is crucial. The software selection team should consist of organization members with the right interest, skills, and time to participate in this process. A good starting point is to aim for three to five people who fill roles such as the main decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. In smaller companies, the vendor selection team may be smaller, with fewer participants multitasking and taking on more responsibilities.

Compare notes

The selection team should compare notes and facts and figures which they noted during the process, such as costs, security capabilities, and alert and incident response times.

Negotiation

Just because something is written on a company’s pricing page does not mean it's final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

Final decision

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct. If not, it might be time to go back to the drawing board.

What does Security, Orchestration, Automation, and Response (SOAR) Software cost?

SOAR is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization's specific requirements. Once a SOAR solution is purchased, deployed, and integrated into an organization’s security system, the cost could be high, which is why the evaluation stage of selecting SOAR software is so crucial. The notion of rip-and-replace cost can be high. The SOAR vendor chosen should continue to provide support for the SOAR solution with flexibility and open integration.

Return on Investment (ROI)

Organizations decide to purchase SOAR software with some type of return on investment (ROI). As they want to recoup the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency.

SOAR software saves security staff costs by eliminating manual tasks. For example, SOAR software automatically investigates the scenario of email phishing attacks which is very common, so this task can be very repetitive and consumes security staff time if it is done manually. A large enterprise used actual data from its SOAR software deployment and compared it to the cost of handling email phishing investigations automatically using SOAR software versus handling them manually. The enterprise found that the reduction in staff time required to handle phishing emails equated to savings of over $680,000 per year.