No more typing reviews! Try our Samantha, our new voice AI agent.

Google Security Operations vs Splunk SOAR comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Torq
Sponsored
Ranking in Security Orchestration Automation and Response (SOAR)
4th
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
8
Ranking in other categories
AI-SOC (2nd), AI-Powered Security Automation (2nd)
Google Security Operations
Ranking in Security Orchestration Automation and Response (SOAR)
14th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
5
Ranking in other categories
Security Information and Event Management (SIEM) (27th), AI-Powered Cybersecurity Platforms (13th)
Splunk SOAR
Ranking in Security Orchestration Automation and Response (SOAR)
2nd
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
58
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Security Orchestration Automation and Response (SOAR) category, the mindshare of Torq is 3.7%, down from 5.4% compared to the previous year. The mindshare of Google Security Operations is 3.8%, up from 2.0% compared to the previous year. The mindshare of Splunk SOAR is 7.4%, up from 7.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Orchestration Automation and Response (SOAR) Mindshare Distribution
ProductMindshare (%)
Splunk SOAR7.4%
Torq3.7%
Google Security Operations3.8%
Other85.1%
Security Orchestration Automation and Response (SOAR)
 

Featured Reviews

Nimrod Vardi - PeerSpot reviewer
Global IT Director at OpenWeb
Automation workflows have transformed our IT, enabling secure just-in-time access control
We work with them quite often, so we have a direct line regarding areas in Torq that have room for improvement. If we have a feature request, we can request it. I do not have anything in mind at the moment. We were a design partner for a short while, so we feel that they listen and that users of the system have an impact on the way the system is designed for the better. They have a new community, which is something that I personally suggested years ago. There are many people like me in different places and they might have already built the workflow that I need. Having the option to share workflows or to jump on a thread and say I have this need, did anyone ever build a workflow for it, is amazing. Someone would jump in and say yes, sure, here, take this workflow. I think this is an amazing thing and I really hope that the community will come alive because I think this is really powerful. This is something that I already suggested and it did happen eventually, and I am quite happy with it. I do not have any specific feature in mind that I have a need for at the moment.
CK
Technical Lead at a transportation company with 1,001-5,000 employees
Simplified detection rules and SOAR workflows have improved compliance-focused operations
One improvement I am looking for is silent log source monitoring. If some feed or some host went offline or was not pulling any logs into Google Security Operations, I would want better visibility. Silent host monitoring would make a significant difference because it is very hard to track which host went down, and there are many false positives as a result. I think there is a lot of room for scalability improvements, particularly in the integration of third-party applications. Currently, I have to write a script and use a cloud run function to pull logs. If there were direct ingestion by simply providing an API key and some sort of client certificate, it would be much easier.
SS
Manager cybersecurity at Hexion Inc.
Automates threat response and reduces investigation time but needs better threat intelligence integration
One thing that we would like to see with Splunk SOAR is the expandability to the threat intelligence feed. Currently, we have limited ingestion to the threat intelligence feed for the correlation purpose. We would like to see it being integrated, with license cost or without license cost, to leading threat intelligence sources such as Recorded Future, Feedly, or Flare. That is something we would appreciate having integrated. The second thing on the improvement side is about exposed credential-related information. If we start ingesting those data to Splunk SOAR or SIEM with some sort of integration with threat intelligence feed, that will also improve our detection and prediction method or help us with the investigation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Torq has helped a lot regarding SOC analyst efficiency."
"If I review about 100 vendors that I might work with, Torq is definitely in the top five that gave me personally investment back, just because every bit of effort I put into Torq eventually became a workflow that gave it back to me."
"What I appreciate most about Torq is that it is an essential part of our system."
"Since we started working with Torq, I am handling much fewer alerts, it is becoming really easy for me to handle an alert, I have all the information that I need, I do not need to connect to different vendors to receive this information, and the main thing I got from Torq is time, which now helps me to build another automated system and learn."
"As an analyst, it has demonstrated potential to reduce workforce requirements and time needed for related activities."
"Torq's unified platform approach to AI, SOAR, automation, and case management is superior compared to my experience managing multiple point solutions."
"Once I started to use the system and I saw the potential, it changed all of our work in IT."
"Using that one piece of AI, we auto-closed 511 cases in quarter four alone."
"The valuable parts of Google Security Operations include how easy it is to write parsers or detection rules, and it is well-advanced in the analytical part."
"The playbooks feature in Siemplify is crucial for automation. We've utilized both standard and custom integrations with other security operation solutions, enhancing our flexibility. The user interface is generally straightforward, although recent changes may require some adjustment and Siemplify's integrations and capabilities offer potential support for various compliance requirements."
"Without hyperbole, I have never, in my entire career, encountered a vendor or a vendor community as awesome as Siemplify. Siemplify and the Siemplify Community quite literally made it possible for our SOC to increase almost five-fold in our number of clients and number of analysts and to go from a Monday to Friday 9-5 shop to a 24/7 shop all in the span of under a year and a half and all while continually adding capabilities and improving the services we offer to our clients."
"Overall, Google SecOps is a very useful service for security operations."
"Google SecOps is extremely useful for threat detection and hunting."
"The most valuable feature of Siemplify is the playbooks that can be created."
"I like the integration capabilities of Phantom; it has a lot of integrations with other products, its searching methodologies are also good, and it is easy to understand and easy to create playbooks."
"The playbooks are valuable. They are the core component. Being able to implement and build a code process to work through and scale out what we want to do is valuable."
"The most valuable feature of Splunk SOAR is the automated playbooks, which saves analysts time."
"The features of Splunk SOAR that I appreciate most are the integrations with all the other applications and tools."
"Technical support is helpful."
"The most valuable feature is the risk-based access control."
"My understanding is the initial setup isn't too hard."
"The solution allows us to customize playbooks and incorporate custom code, allowing us to drag and drop elements while still writing code to build the integrations we need."
 

Cons

"The initial deployment of Torq was not easy."
"It was able to capture data but was unable to differentiate between the agent hostname we are using and the hostname that resides on the back end of the Internet."
"Regarding the pricing of Torq, I would say it is expensive."
"We have MCP that we are working with our cloud security platform, and we wanted to connect this MCP to the case management."
"Even now, we have workflows that are in production that use AI steps and I get different results, making it unusable to some degree."
"Additionally, the documentation for Torq is not very clear. Most of the information is presented in videos, which are not ideal for reading; there are mostly paragraphs and other text-based content."
"Regarding stability, I have noticed some lagging, crashing, and downtime, which is one of my largest gripes."
"The initial deployment of Torq was not easy."
"We often encounter minor issues that could be improved, but we maintain communication with the developers and submit feature requests. Recently, I requested enhancements such as improved search functionality within playbooks and expanded options for exporting case data."
"The main improvement could be in the accuracy and detail provided in threat descriptions."
"Building the playbooks could be easier and the integration could improve. It is a difficult process, such as what API connections need to be made."
"The main improvement could be in the accuracy and detail provided in threat descriptions."
"I'm inclined to say that I'd love to see some Machine Learning capabilities integrated into the platform, however, I just attended a demo this morning where Siemplify gave a sneak peek into some Machine Learning capabilities that they are currently developing and have roadmapped for release soon."
"I can give customer service a rating of six because it is very hard sometimes to keep up with the support."
"I think Splunk SOAR is a bit slow to catch up with the AI boom. Everyone is ingesting Copilots or some form of AI in their platforms, and Splunk SOAR doesn't have it yet."
"We want to see improvements made to the APIs such that we can connect to many different systems and data sources."
"The application does not work properly and does not pass the log-based configuration. I feel that some kind of review should happen in the application. This review should validate things so that we can get the right information. Splunk does not tell us where the IP address is associated with."
"From the improvement point of view regarding Splunk SOAR, I suggest including more types of LLM models such as autonomous AI models including Anthropic and Opus 4.6, as well as creating a playground for new users to work on these, which will significantly help solve complex problems and assist new companies in understanding how Splunk works easily."
"Splunk's support for integration is subpar and has room for improvement."
"Splunk SOAR follows very flat pricing and most of the time it's very high when compared to the other competitors."
"While there have been improvements to the investigation process, particularly with the playbook data, the current log review method is cumbersome."
"There is some homework to be done before you can really properly use Splunk SOAR. Resolution times could be faster in terms of support."
 

Pricing and Cost Advice

Information not available
Information not available
"I don't know the exact price, but for my region, it is very expensive."
"The tool is not cheap."
"When we first purchased our Splunk SOAR license, it was based on an event-count model. It was based on the number of events. I had strong opinions at the time that automation should not be stifled by the amount of automation you can accomplish, so the previous structure was not as beneficial for us. Later that year, we got told or saw at a conference that they announced user-based pricing. We are now in a renewal period, so we migrated to a user-based license model, which is more appropriate for us so that we no longer have to worry about stifling our automation based on the quantity."
"The cost is high and the licensing is on an annual basis."
"While I can't confirm the exact pricing, some colleagues have mentioned that Splunk SOAR may be on the costlier side."
"It's very overpriced because it is based on the number of users. There is no bulk licensing."
"Splunk SOAR is an expensive solution for an organization of our size."
"Splunk is a fast enterprise tool, but it costs too much. At the same time, it's worth what we pay, in my opinion. We can efficiently perform all the functions and tie together the data. It's the perfect tool for our needs."
report
Use our free recommendation engine to learn which Security Orchestration Automation and Response (SOAR) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Comms Service Provider
10%
Construction Company
10%
Manufacturing Company
9%
Financial Services Firm
15%
Manufacturing Company
9%
University
7%
Government
7%
Financial Services Firm
12%
Manufacturing Company
10%
Computer Software Company
7%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise3
Large Enterprise4
No data available
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise8
Large Enterprise37
 

Questions from the Community

What needs improvement with Torq?
This is exactly what we discussed two days ago with the Torq team. We told them where we want to see improvements. Fo...
What is your primary use case for Torq?
I use Torq as my case management and alert system. Working as a SOC analyst, the first thing I do every morning is ge...
What advice do you have for others considering Torq?
I would definitely recommend Torq. I have no doubt, really. When we looked for another vendor, Torq really answered a...
What is your experience regarding pricing and costs for Siemplify?
The pricing for Google SecOps and Microsoft Sentinel is almost the same, with no significant differences.
What needs improvement with Siemplify?
The main improvement could be in the accuracy and detail provided in threat descriptions. Google SecOps reports could...
What is your primary use case for Siemplify?
I use Google SecOps for threat detection and hunting. It is primarily used for monitoring threats in real-time, and G...
What is your experience regarding pricing and costs for Splunk Phantom?
My experience with pricing, setup cost, and licensing is that it is perfectly acceptable, helping us significantly wi...
What needs improvement with Splunk Phantom?
From the improvement point of view regarding Splunk SOAR, I suggest including more types of LLM models such as autono...
What is your primary use case for Splunk Phantom?
The use cases that I work with mostly in Splunk SOAR include phishing email responses automation, where Splunk detect...
 

Also Known As

No data available
Siemplify ThreatNexus
Phantom
 

Overview

 

Sample Customers

Information Not Available
FedEx Mondelez Intenrational Check Point Trustwave Atos Cyberint Bae Systems Crowe Longwall Security Telefonica Nordea HCL
Recorded Future, Blackstone
Find out what your peers are saying about Google Security Operations vs. Splunk SOAR and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.