


Find out what your peers are saying about Microsoft, Splunk, Palo Alto Networks and others in Security Orchestration Automation and Response (SOAR).
| Product | Market Share (%) |
|---|---|
| Google Security Operations | 3.7% |
| Microsoft Sentinel | 12.4% |
| Palo Alto Networks Cortex XSOAR | 9.0% |
| Other | 74.9% |
| Product | Market Share (%) |
|---|---|
| Mimecast Incydr | 2.5% |
| Microsoft Purview Data Loss Prevention | 8.3% |
| Varonis Platform | 6.1% |
| Other | 83.1% |


| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 24 |
| Large Enterprise | 30 |
Torq is the enterprise AI SOC solution that effectively combines adaptive insights and automation to handle critical threats efficiently. It manages threat lifecycles, swiftly moving from triage to response, ensuring effective risk management.
Torq is designed to streamline security operations by aggregating telemetry across your security stack. It investigates significant risks and manages threats from triage to containment and remediation. This AI-driven tool enhances the capabilities of your SecOps team, allowing them to achieve more impactful results without introducing complicated processes.
What are the key features of Torq?In industries like finance and healthcare, Torq shows effectiveness by adapting to specific risk scenarios often encountered in these fields. Its integration with existing infrastructures makes it a valuable asset for maintaining stringent security standards, essential for protecting critical data and operations in diverse high-stakes environments.
Google Security Operations offers a robust playbook builder and integration capabilities designed to streamline workflows and integrate seamlessly with existing systems for enhanced security management.
Google Security Operations stands out in threat detection, monitoring, and alarm management, especially when used alongside Mandiant. Its intuitive interface supports compliance requirements, and it provides customizable workflows through playbooks. Integration with multiple tools allows for automation and increased flexibility, though improvements in API connection determination and playbook search capabilities could enhance user experience. Effective in orchestrating alerts and managing security events, it is extensively used for automated response, efficient alert triage, investigation, reporting, and ticketing management, supporting over 20 use cases including real-time threat detection.
What are the Key Features of Google Security Operations?In industries where real-time threat response is critical, such as finance and healthcare, Google Security Operations is favored for its automation and integration capabilities. These characteristics are vital for efficiently managing complex security landscapes and maintaining compliance across sectors.
Mimecast Incydr offers a comprehensive data protection and recovery solution, ideal for organizations needing robust insider threat protection and regulatory compliance.
Mimecast Incydr provides a seamless experience across platforms with lightweight clients and centralized administration. It focuses on real-time monitoring, instant access to backups, strong encryption, and customizable risk scoring. This ensures data protection against insider threats while promoting ease of use and low system overhead. Although improvements are possible in areas like Java dependency reduction, GUI design, cloud storage integration, and comprehensive reporting, Mimecast Incydr remains valuable for data classification, legal discovery, and identity management, especially for large environments handling classified information.
What key features does Mimecast Incydr offer?Mimecast Incydr is leveraged across industries for data leakage protection and egress solution integration. It supports HIPAA-compliant backups and peer-to-peer data management, proving invaluable for corporate data protection and traveling employees facing data loss risks. Its application in legal data discovery and disaster recovery planning enhances its relevance for IT administrators and compliance officers managing data-intensive operations.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.