Published: 22 February 2018
Summary
Increasing complexity of IT, evolving threats and the need to coordinate multiple security products gave rise to SOAR technology. Technical professionals in security operations and vulnerability management must understand SOAR deployment and operations practices.
Included in Full Research
- Defining SOAR
- SOAR Drivers and Enablers
- SOAR for Security Staff Productivity
- Additional SOAR Drivers
- SOAR Enablers
- SOAR Use Cases
- Detection and Triage Use Cases
- Incident Response Use Cases
- Threat Intelligence Use Cases
- Detailed Use Case Example: Phishing Email Handling
- SOAR Technologies in Depth
- Workflow and Collaboration Engine
- Case and Ticket Management
- Orchestration and Automation
- Threat Intelligence Management
- Other Components and Capabilities
- SOAR Architecture
- Differences Between Existing SOAR Tool Categories
- SOAR Future
- Strengths
- Weaknesses
- Decide on the Need and Readiness for SOAR
- Build a Business Case for SOAR
- Select the Right SOAR Tool for You
- Test the SOAR Tools
- Align Skills Needed for SOAR Success
- Deploy the SOAR Technology
- Use SOAR Tools Effectively
- Expand and Evolve Your SOAR Deployment