Introducing G2.ai, the future of software buying.Try now
Security Orchestration, Automation & Response
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Security Orchestration, Automation & Response Alternatives

Security Orchestration, Automation & Response Reviews & Product Details

Security Orchestration, Automation & Response Overview

What is Security Orchestration, Automation & Response?

A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments at machine speeds.

Security Orchestration, Automation & Response Details
Show LessShow More
Product Description

A universal, security orchestration gateway for executing on-demand or event-triggered tasks across deployment environments at machine speeds.


Seller

Cyware

Description

Cyware is a cybersecurity solutions provider focused on enhancing threat intelligence and security operations through advanced technology. The Cyware Fusion and Threat Response (CFTR) platform is designed to centralize and streamline threat data processing and incident response. It offers capabilities such as threat intelligence sharing, automated alert triage, and coordinated response efforts, allowing security teams to efficiently manage and mitigate potential threats. The platform aims to facilitate real-time collaboration and improve situational awareness for organizations seeking a comprehensive approach to cybersecurity.

Recent Security Orchestration, Automation & Response Reviews

Verified User
U
Verified UserEnterprise (> 1000 emp.)
5.0 out of 5
"As SOAR used for both SIEM and CTIX"
Automation evidence collection Automatic incident closure
Manzar A.
MA
Manzar A.Enterprise (> 1000 emp.)
3.5 out of 5
"Cyware CSOL Review"
Most of the automation can be achieved without writing any code. The best part is support for different programming languages to achieve custom i...

Security Orchestration, Automation & Response Media

Answer a few questions to help the Security Orchestration, Automation & Response community
Have you used Security Orchestration, Automation & Response before?
Yes

2 Security Orchestration, Automation & Response Reviews

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Verified User in Banking
UB
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Security Orchestration, Automation & Response?

Automation

evidence collection

Automatic incident closure Review collected by and hosted on G2.com.

What do you dislike about Security Orchestration, Automation & Response?

Reports creation

Need better UI

Need more playbooks Review collected by and hosted on G2.com.

What problems is Security Orchestration, Automation & Response solving and how is that benefiting you?

Handling the SOC Incidents and advisory automation processing Review collected by and hosted on G2.com.

Manzar A.
MA
Software Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Security Orchestration, Automation & Response?

Most of the automation can be achieved without writing any code.

The best part is support for different programming languages to achieve custom integrations and automation which is not out-of-the-box supported.

MITRE ATT&CK-based framework. Review collected by and hosted on G2.com.

What do you dislike about Security Orchestration, Automation & Response?

The orchestration part is lacking here. Needs to integrate with any ITSM tool.

Also, it works best with the Cyware suite of products, CTIX and CFTR.

Need to buy CSOL and CFTR as a whole package. Review collected by and hosted on G2.com.

What problems is Security Orchestration, Automation & Response solving and how is that benefiting you?

Co-relation of related security alerts into one incident to reduce alert fatigue.

Automated response with playbooks and automation to reduce the time, effort, and budget of SOC.

Overall SOC maturity enhancement. Review collected by and hosted on G2.com.

There are not enough reviews of Security Orchestration, Automation & Response for G2 to provide buying insight. Below are some alternatives with more reviews:

1
KnowBe4 PhishER/PhishER Plus Logo
KnowBe4 PhishER/PhishER Plus
4.6
(524)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
2
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
3
Sumo Logic Logo
Sumo Logic
4.3
(343)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
4
Microsoft Sentinel Logo
Microsoft Sentinel
4.4
(289)
Microsoft Azure Sentinel is a cloud-native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI.
5
Tines Logo
Tines
4.8
(254)
Tines is a smart, secure workflow orchestration and automation platform for security and IT teams. The world's best companies — from startups to the Fortune 10 — trust Tines to build, run and monitor their most important workflows from automating incident response to orchestrating event remediation in real-time. Leaders across a wide array of industries, including Canva, Databricks, Elastic, Kayak, Intercom, and McKesson use Tines' AI-powered workflows to operate more effectively, mitigate risk, reduce tech debt, and do the work that matters most. Learn more and get started with our always free community edition: www.tines.com.
6
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
7
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(117)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
8
Torq Logo
Torq
4.7
(101)
Torq hyperautomates on-premise and hybrid environments at elastic scale. Torq offers immense extensibility that goes far beyond APIs, delivering the security automation industry’s only cloud-native, SaaS-based multi-tenant, zero-trust architecture. In addition, it provides horizontal scaling and parallelism with guaranteed SLAs. And it does it all in the simplest, more straightforward way possible, with instant workflow development featuring intuitive smart steps to guide users at any technical level. Customers also benefit from the industry’s most powerful visual data transformation capabilities.
9
Logpoint Logo
Logpoint
4.3
(89)
Logpoint Converged SIEM platform combines SIEM, SOAR, UEBA and SAP security monitoring to consolidate your tech stack and remove complexity. With a data-centric approach, it accelerates threat detection and response to make your Security Operations Center more efficient to protect the entirety of your organization.
10
CrowdSec Logo
CrowdSec
4.7
(87)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countries across 6 continents, the solution builds a real-time IP reputation database that keeps growing every day and benefits all community members who have each other's backs while forming a global defense shield.
Show More