Introducing G2.ai, the future of software buying.Try now

Best Security Orchestration, Automation, and Response (SOAR) Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Security orchestration, automation, and response (SOAR) software products are tools used to help integrate security technologies and automate incident-related tasks. These tools integrate with a company’s existing security solutions to help users build and automate workflows, simplifying the incident response process and reducing the amount of human intervention necessary to handle security incidents. Companies use these tools to create a centralized system complete with visibility into a company’s security software and operational processes. These tools also reduce the time it takes to respond to incidents, as well as the potential for human error in remediating security threats and vulnerabilities.

SOAR platforms combine aspects of vulnerability management, incident response, and security information and event management (SIEM) solutions. SOAR products are designed to provide some of each tool’s respective functionality or integrate with third-party tools. Once integrated, processes can be designed to identify incidents and automate remediation tasks.

To qualify for inclusion in the Security Orchestration, Automation, and Response (SOAR) category, a product must:

Integrate security information and incident response tools
Allow security professionals to build response workflows
Automate incident management and response tasks within workflows
Provide formalized incident, workflow, and performance reports
Show More
Show Less

Best Security Orchestration, Automation, and Response (SOAR) Software At A Glance

Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Security Orchestration, Automation, and Response (SOAR) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
68 Listings in Security Orchestration, Automation, and Response (SOAR) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security Flow is a hybrid Security Orchestration, Automation, and Response solution designed to empower security analysts by automating time-consuming tasks without the need for coding expertise. By i

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Security Flow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security Flow is a hybrid Security Orchestration, Automation, and Response solution designed to empower security analysts by automating time-consuming tasks without the need for coding expertise. By i

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Security Flow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne Purple AI is an advanced AI cybersecurity analyst designed to enhance security operations by automating and accelerating threat detection, investigation, and response. By integrating gener

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Purple AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne Purple AI is an advanced AI cybersecurity analyst designed to enhance security operations by automating and accelerating threat detection, investigation, and response. By integrating gener

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SentinelOne Purple AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,749 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
Ownership
NASDAQ: S

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sequretek MDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 9.0
    8.3
    Ease of Admin
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Woodbridge, US
    LinkedIn® Page
    www.linkedin.com
    391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Sequretek MDR features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 9.0
8.3
Ease of Admin
Average: 8.6
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Woodbridge, US
LinkedIn® Page
www.linkedin.com
391 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your entire organization with the industry's fastest AI-powered open platform for all your data and workflows—built on the SentinelOne Singularity™ Data Lake. Singularity AI SIEM is designed f

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Singularity AI SIEM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your entire organization with the industry's fastest AI-powered open platform for all your data and workflows—built on the SentinelOne Singularity™ Data Lake. Singularity AI SIEM is designed f

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Singularity AI SIEM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,749 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transform your SOC team into a proactive cyber task force by streamlining and centralizing security operations, empowering your team to optimize intelligence, automate alert handling and expedite inci

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StrikeReady features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transform your SOC team into a proactive cyber task force by streamlining and centralizing security operations, empowering your team to optimize intelligence, automate alert handling and expedite inci

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StrikeReady features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trickest Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trickest
    Year Founded
    2020
    HQ Location
    Dover, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Trickest Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Trickest
Year Founded
2020
HQ Location
Dover, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Our platform centralizes and contextualizes security data to provide the insights required for an efficie

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uplevel Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    New York, US
    Twitter
    @uplevelsecurity
    532 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning. Our platform centralizes and contextualizes security data to provide the insights required for an efficie

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Uplevel Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
New York, US
Twitter
@uplevelsecurity
532 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A powerful tool for OT cybersecurity environments - leveraging host and network data through automation to provide network visibility and assist in threat hunting. Valkyrie proactively monitors for t

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Valkyrie Security Automation features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Antonio, US
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A powerful tool for OT cybersecurity environments - leveraging host and network data through automation to provide network visibility and assist in threat hunting. Valkyrie proactively monitors for t

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Valkyrie Security Automation features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
San Antonio, US
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®