2020-06-17T09:37:00Z

What is the difference between SIEM and SOAR platforms?


SIEM and SOAR have a lot of components in common. How do they differ in the role they play in Cyber Security?

If you've been working in cybersecurity, you've likely come across SOAR and SIEM technologies. There are differences between their capabilities, although they have a fair amount of commonalities. They both collect data, but the quantity of data, type of data, and type of response is where they differ. As threats have advanced, security professionals may be in need of both.

That's where SOAR and SIEM come to the rescue, although there has been some confusion as to the difference between the two. The two technologies have different competencies, but can be combined to increase a security team's or SOC's effectiveness.

We've evaluated the differences of the best SIEM tools and top SOAR tools to clear up the differences between each.

SIEM vs SOAR

In short, SIEM aggregates and correlates data from multiple security systems to generate alerts while SOAR acts as the remediation and response engine to those alerts.

SIEM is the collection and aggregation of security data sourced from integrated platforms logging event-related data - firewalls, network appliances, intrusion detection and prevention systems, etc. - then correlates data across devices, categorizes, and analyzes incidents before issuing alerts. The alerts are identified by using sophisticated analytical techniques and machine learning, which require fine tuning. This leaves a lot of alerts for a security team or SOC to prioritize and remediate; a difficult, time-consuming process.

SOAR, on the other hand, is designed to help security teams automate the response process by gathering alerts, managing cases, and responding to the endless alerts generated by SIEM. With SOAR, security teams can integrate with security alerts and create adaptive, automated incident response workflows. This gives SecOps the ability to prioritize threats and deliver faster results.

Guest
55 Answers

author avatar
Top 5LeaderboardReseller

TLDR:


SIEM:


Security information management: Long-term storage as well as analysis and reporting of log data.


Security event manager: Real-time monitoring, correlation of events, notifications, and console views.


SOAR:


SIEM + Threat Intelligence (IoC's, AI, etc), Vulnerability and Threat Management (Analysis, Reporting, Management views, Dashboards, real-time analysis) Automation and orchestration for incident response (Something like "Ability to Block dst_ip that we get from for example proxy log, on our firewall).

2020-06-18T13:55:00Z
author avatar
Top 5LeaderboardReal User

The SIEM is the detection/surveillance engine whereas the SOAR is the remediation/response engine

2020-06-17T21:22:29Z
author avatar
User

SIEM is the log file collection of I.T assets and various intel feeds that aggregates and correlates big data, the SOAR component mostly enhances how the detected anomalies are handled with minimal to no human interaction by coordinating corrective action from one or more systems.

2020-06-17T13:23:49Z
author avatar
Top 20Real User

What is SIEM?


Firewalls, network appliances and intrusion detection systems generate an immense amount of event-related data—more data than security teams can reasonably expect to interpret. A SIEM makes sense of all of this data by collecting and aggregating and then identifying, categorizing and analyzing incidents and events. This is often done using machine learning, specialized analytics software and dedicated sensors.


A SIEM solution examines log data for patterns that could indicate a cyberattack, then correlates event information between devices to identify potentially anomalous activity and finally, issues alerts accordingly.


So why isn’t a SIEM solution effective on its own?


SIEM tools usually needs regular tuning to continually understand and differentiate between anomalous and normal activity. The need for regular tuning leads to security analysts and engineers wasting precious time on making the tool work for them instead of triaging the constant influx of data.


What is SOAR?


Like SIEM, SOAR is designed to help security teams manage and respond to endless alarms at machine speeds. SOAR platforms take things a step further by combining comprehensive data gathering, case management, standardization, workflow and analytics to provide organizations the ability to implement sophisticated defense-in-depth capabilities.


Here’s how:



  • SOAR solutions gather alarm data from each integrated platform and place them in a single location for additional investigation.

  • SOAR’s approach to case management allows users to research, assess and perform additional relevant investigations from within a single case.

  • SOAR establishes integration as a means to accommodate highly automated, complex incident response workflows, delivering faster results and facilitating an adaptive defense.

  • SOAR solutions include multiple playbooks in response to specific threats: Each step in a playbook can be fully automated or set up for one-click execution directly from within the platform—like Swimlane—including interaction with third-party products for comprehensive integration.


Put simply, SOAR—sometimes also known as security automation and orchestration (SAO)—integrates all of the tools, systems and applications within an organization’s security toolset and then enables the SecOps team to automate incident response workflows.


SOAR’s main benefit to a SOC is that it automates and orchestrates time-consuming, manual tasks, including opening a ticket in a tracking system, such as Jira, without requiring any human intervention—which allows engineers and analysts to better use their specialized skills.

2020-06-18T08:39:00Z
Find out what your peers are saying about Splunk, LogRhythm, IBM and others in Security Information and Event Management (SIEM). Updated: October 2020.
442,283 professionals have used our research since 2012.