Anonymous UserCyber Security Solution Architect at a tech services company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable features are simplicity and ease of integration."
"The automation part and the playbook creation part are awesome. The way it is responding to the customers and incidents is also very good. In the SOC environment, I guess it will carry out around 50% of the work."
"The pricing is very good."
"The automation is excellent."
"The most valuable features are the orchestration because of the way in which it coordinates the loss from all the devices and it provides us with a high-level overview of the critical log information."
"The most valuable feature is the risk-based access control."
"Very flexible integration with other tools"
"So far, the interface is very easy to use."
"The customization continues to be excellent."
"I like the integration capabilities of Phantom. It has a lot of integrations with other products. Its searching methodologies are also good. It is also easy to understand and easy to create playbooks."
"I'm just a beginner on the solution and it's pretty easy for me to use."
"Implementing this solution requires a lot of involvement from the vendor and it should be made easier for the partners."
"For building automation, there is not a lot of good documentation. The documentation is there, but it is not very good from my perspective. There should be an improvement in this area. I don't see issues with anything else. In terms of new features, I have heard that other products have EBA functionality. It would be good if this functionality could be added."
"The user interface could be a bit better."
"When Palo Alto bought the solution, the pricing increased by 1.5 times. There's been a 50% increase, which is a lot."
"There should be an on-premise version available for customers to have different choices."
"We want to see improvements made to the APIs such that we can connect to many different systems and data sources."
"And most of the challenges that I have faced with the solution can be found in the documentation itself."
"It would be ideal if we could automate processes even more."
"In the beginning, we couldn't find any specific documents for every function. It wasn't easy to navigate to what we needed."
"I haven't used it fully, but based on my usage, I could not find simulation tools and features. It currently lacks simulation features, which are important for me for creating a playbook. It is also very expensive for my region."
"We've had trouble implementing the solution with Microsoft products. There seems to be an integration gap."
"There is a perception that it is priced very high compared to other solutions."
"From the cost perspective, I have heard that its price is a bit high as compared to other similar products."
"There is a yearly license required for this solution and it is expensive."
"I don't know the exact price, but for my region, it is very expensive."
Demisto Enterprise delivers a complete solution that helps Tier-1 through Tier-3 analysts and SOC managers to optimize the entire incident life cycle while auto documenting and journaling all the evidence. More than 100+ integrations enable security orchestration workflows for incident management and other critical security operation tasks.
Phantom enables teams to work smarter by executing automated actions across their security
infrastructure in seconds, versus hours or more if
performed manually. Teams can codify workflows
into Phantom’s automated playbooks using the visual
editor (no coding required) or the integrated Python
development environment. By offloading these
repetitive tasks, teams can focus their attention on
making the most mission-critical decisions.
Phantom is the connective tissue that lets existing security tools work better together. By connecting and coordinating complex workflows across the SOC’s team and tools, Phantom ensures that each part of the SOC’s layered defense is actively participating in a unified defense strategy. Powerful abstraction allows teams to focus on what they need to accomplish, while the platform translates that into tool-specific actions.
Phantom helps security teams investigate and respond to threats faster. Using Phantom’s automated detection, investigation, and response capabilities, teams can execute response actions at machine speed, reduce malware dwell time and lower their overall mean time to resolve (MTTR). And now with Phantom on Splunk Mobile, analysts can use their mobile device to respond to security incidents while on-the-go. Phantom’s event and case management functionality can further streamline security operations. Case-related data and activity are easily accessible from one central repository. It’s easy to chat with other team members about an event or case, and assign events and tasks to the appropriate team member.
Palo Alto Networks Cortex XSOAR is ranked 3rd in Security Orchestration Automation and Response (SOAR) with 5 reviews while Splunk Phantom is ranked 2nd in Security Orchestration Automation and Response (SOAR) with 6 reviews. Palo Alto Networks Cortex XSOAR is rated 8.2, while Splunk Phantom is rated 7.6. The top reviewer of Palo Alto Networks Cortex XSOAR writes "User-friendly and robust with good technical support". On the other hand, the top reviewer of Splunk Phantom writes "Very stable with a straightforward setup and good performance". Palo Alto Networks Cortex XSOAR is most compared with Fortinet FortiSOAR, IBM Resilient, ServiceNow Security Operations, Siemplify and Swimlane, whereas Splunk Phantom is most compared with ServiceNow Security Operations, IBM Resilient, Fortinet FortiSOAR, Siemplify and Swimlane. See our Palo Alto Networks Cortex XSOAR vs. Splunk Phantom report.
See our list of best Security Orchestration Automation and Response (SOAR) vendors.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.