Find out what your peers are saying about Microsoft, Splunk, Palo Alto Networks and others in Security Orchestration Automation and Response (SOAR).
| Product | Mindshare (%) |
|---|---|
| Splunk SOAR | 7.4% |
| Microsoft Sentinel | 10.1% |
| Palo Alto Networks Cortex XSOAR | 8.8% |
| Other | 73.7% |
| Product | Mindshare (%) |
|---|---|
| StrikeReady | 2.0% |
| Dropzone AI | 14.6% |
| Prophet Security | 9.5% |
| Other | 73.9% |

| Company Size | Count |
|---|---|
| Small Business | 1 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 8 |
| Large Enterprise | 37 |
Torq is the enterprise AI SOC solution that effectively combines adaptive insights and automation to handle critical threats efficiently. It manages threat lifecycles, swiftly moving from triage to response, ensuring effective risk management.
Torq is designed to streamline security operations by aggregating telemetry across your security stack. It investigates significant risks and manages threats from triage to containment and remediation. This AI-driven tool enhances the capabilities of your SecOps team, allowing them to achieve more impactful results without introducing complicated processes.
What are the key features of Torq?In industries like finance and healthcare, Torq shows effectiveness by adapting to specific risk scenarios often encountered in these fields. Its integration with existing infrastructures makes it a valuable asset for maintaining stringent security standards, essential for protecting critical data and operations in diverse high-stakes environments.
Splunk SOAR focuses on automating security operations with seamless third-party integrations and customizable workflows, enhancing incident response and threat management.
Splunk SOAR offers robust playbook automation and powerful API connectivity, allowing organizations to streamline workflows and integrate extensively with tools like Salesforce and ServiceNow. With its capabilities in real-time data visualization and automated threat responses, it significantly enhances security and reduces manual efforts. Users appreciate the ease of creating playbooks, which reduces mean time to detect and resolve. However, attention to its integration challenges with Microsoft products, the need for more playbooks, and improved customization tools is necessary. Enhancements in the development process, visibility, scalability, and case management options are also beneficial. Improving documentation and training resources would add more depth and accessibility.
What are the top features of Splunk SOAR?Organizations implement Splunk SOAR in industries to automate tasks in Security Operation Centers, addressing incidents such as phishing, brute force, and ransomware. It integrates with third-party applications for threat intelligence enrichment, commonly deployed both on-premise and cloud, enhancing cybersecurity efforts.
StrikeReady is a cybersecurity platform designed to enhance threat response and streamline workflows. It empowers teams by providing actionable insights and automating complex tasks, making it valuable for organizations looking to bolster their security posture.
StrikeReady integrates artificial intelligence to assist security operations teams, providing real-time data analysis and threat response capabilities. It aims to reduce workload and improve efficiency by automating repetitive tasks. Its collaborative features enable users to share intelligence and coordinate strategies, enhancing overall resilience to cyber threats. Advanced analytics and intuitive controls make it a choice for cybersecurity professionals.
What are the key features of StrikeReady?
What benefits should users look for?
StrikeReady is utilized in industries that require robust cybersecurity measures, such as finance and healthcare. These sectors benefit from its capabilities in managing complex threats and maintaining regulatory compliance. Implementation involves an understanding of specific industry challenges, ensuring the platform can be tailored to meet unique requirements.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.