Palo Alto Networks Cortex XSOARFormerly Demisto
Overview
What is Palo Alto Networks Cortex XSOAR?
Cortex XSOAR, formerly Demisto and now from Palo Alto Networks since it was acquired in March 2019, provides orchestration to enable security teams to ingest alerts across sources and execute standardized, automatable playbooks for accelerated incident response. Its playbooks are…
Very good SOAR solution
Best SOAR in the market
Fast and effective responses against cyber threats from the internet.
A Super SOC with just 2 persons and much embedded technology
XSOAR Review
Cortex XSOAR observations from a Security Analyst's standpoint after 3 years of use
Customized automation when time matters
Cortex XSOAR - Comprehensive incident management solution
Pricing
What is Palo Alto Networks Cortex XSOAR?
Cortex XSOAR, formerly Demisto and now from Palo Alto Networks since it was acquired in March 2019, provides orchestration to enable security teams to ingest alerts across sources and execute standardized, automatable playbooks for accelerated incident response. Its playbooks are powered by…
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
21 people also want pricing
Alternatives Pricing
What is Microsoft Sentinel?
Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.
Product Details
- About
- Tech Details
What is Palo Alto Networks Cortex XSOAR?
Palo Alto Networks Cortex XSOAR Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(20)Community Insights
- Business Problems Solved
- Pros
- Cons
Users have found that the product greatly improves incident response efficiency by automating controls in response to detected incidents. This automation streamlines and expedites the incident response process, allowing analysts to focus on more critical tasks. Additionally, the product is used for documentation and escalation of sensitive cases within the team and the extended information security team, ensuring that all relevant information is properly documented and shared with the appropriate stakeholders.
Analysts have reported significant time savings and improved analysis capabilities thanks to the product's IOC enrichment feature. This feature allows for quick enrichment of indicators of compromise, saving analysts from manually searching for information and aiding in the analysis of cybersecurity incidents. Moreover, the product seamlessly enables SOC teams to triage and investigate malicious traffic, enhancing the organization's overall network security posture.
The playbooks provided by the product have been highly beneficial to security teams as they standardize and scale processes, increasing efficiencies across the board. By leveraging these playbooks, security analysts can automate thousands of actions across various security products, resulting in lower response times to security incidents. Additionally, the product allows for coordination of actions across different security products, providing a process-centric view for incident response.
The IT Security department primarily relies on the product for automation, secops, logging, compliance, and HiTrust certification reporting. By automating these crucial processes, the department can ensure compliance with regulatory requirements while also improving operational efficiency. Users have been using this product successfully for over a year to automate and orchestrate security processes, integrating various tools and systems to gain a complete view of their IT environment.
The automated phishing protection functionality offered by the product has proven highly effective in reducing security incidents via email. By automatically identifying and blocking phishing attempts, organizations can significantly enhance their email security posture. Moreover, the product excels at collecting and analyzing data in one centralized place, saving valuable time for security analysts and enabling comprehensive security analytics.
Integration capabilities are a key strength of the product, allowing users to consolidate cybersecurity incidents from various security products into a single platform. This centralized view simplifies incident management and enables more efficient collaboration between different teams. Finally, the product's IOC enrichment feature continues to be highly appreciated by cybersecurity professionals, as it provides valuable context and insights to aid in the analysis of cybersecurity incidents.
In summary, this product offers a range of valuable use cases for security teams. From automating controls and incident response to enabling documentation and escalation of sensitive cases, this product significantly improves efficiency and streamlines processes. Analysts benefit from the product's automation capabilities, IOC enrichment feature, playbooks for standardized processes, integration capabilities, and automated phishing protection functionality. Moreover, IT Security departments rely on the product for automation, secops, logging, compliance, and HiTrust certification reporting. With its comprehensive functionality and ease of use, this product proves to be an essential tool for enhancing network security posture and maintaining a proactive approach to cybersecurity.
Comprehensive Automation: Many users have stated that the product offers comprehensive automation capabilities for necessary operations after a security event. This feature allows users to streamline their operations and improve efficiency by automating repetitive tasks.
Wide Range of Integrations: Several reviewers have mentioned that the product provides a wide range of integrations, allowing for seamless integration with various platforms, including mobiles. This enhances the accessibility of the Management App provided by the product across different platforms.
Threat Detection and Response Enhancement: A significant number of users have praised the product's IOC enrichment feature, which enables them to enrich IP, URL, and File Hashes. By enhancing threat detection effectiveness, this feature aids in proactive threat detection and response.
-
Cluttered Summary Page: Some users have mentioned that the XSOAR bot creates a lot of noise on the summary page of any XSOAR incident, which can clutter the whole scenario and make it difficult to focus on important information.
-
Overwhelming Interface: Several users have found the interface overwhelming, with too much data displayed on a single pane. They expressed a desire for more interactive and easier-to-navigate search areas to improve usability.
-
Stability Issues with SAML Authentication: A number of users have experienced stability issues with SAML authentication, stating that it has caused numerous problems and inconveniences during their usage of the platform.
Attribute Ratings
Reviews
(1-8 of 8)Very good SOAR solution
●Lower response times with automation: Demisto can automate thousands of actions across your security products, handing back time to you for investigation and decision-making. This automation can be for alert ingestion, data gathering, response actions, and updating info back in the point products.
●Coordinate actions across security products: You now have a process-centric view of how to respond to a particular incident that’s not tied to any one security product. All security products have their purpose, but playbooks provide you with an abstract view of the ‘process’ and make it easier to replace one product with another whenever you need to.
- Standardize and scale processes
- Lower response times with automation
- Coordinate actions across security products
- PLAYBOOK generation
- Using other languages in marketplace
- Scripting documentation
●Attackers
Can leverage automation to launch high-quantity phishing attacks with the click of a button.
●Spear
Phishing attacks are sophisticated and sometimes indistinguishable from real emails, resulting in compromise through human error.
●Security
Teams aren’t able to follow set processes while responding to phishing alerts. They must coordinate across email inboxes, threat intel, NGFW, ticketing, and other tools. Each tool has different consoles, data conventions, and contexts, making it difficult for security teams to fill in the gaps while minimizing errors. XSOAR is less suited for analyzing traffic.
Best SOAR in the market
- Taking preemptive actions by blocking IP
- Track of the incident occurrence
- Integrations with different products
- Automation
- Better documentation can be more helpful
- UI interface can be improved
- Automation with immediate security responses.
- Comprehensive phishing protection and increased email protection.
- Analysis and reporting feature.
- Intuitive and easy-to-view panels.
- Alerts by email and sms of incidents for the administration.
- Centralized monitoring.
- Some reports are not generated automatically
- The documentation still has some flaws.
- automates necessary operations after a security event
- Lots of integrations available
- Management App that works in any plaforms include mobiles
- console responsiveness
- better integration with third-party threat intelligence solutions
- better integration with SAML authentication
XSOAR Review
- Integration with other vendor tools.
- Customizing and automating has pretty much no limit.
- Support is fast and helpful.
- Better documentation e.g. indicators and how to property automate them.
- IOC enrichment for IP, URL, File Hashes
- Automating workflows for notifications to the concerned team and decision-making for repetitive alerts/issues based on the playbook
- Taking remediation action like blocking the IP, URL by the custom-made XSOAR commands
- Providing the timeline of an incident, which helps in AAR activities
- The XSOAR bot creates a lot of noise on the summary page of any XSOAR incident. Although the filter is available to reduce the view, by default this should not be visible cluttering the whole scenario.
- The interface has too much data on a single pane. I would love to have many buttons to just click and do stuff.
- Also, I would love to have search areas more interactive and easier to navigate.
Customized automation when time matters
- Automated work flows
- Customization
- Reporting
- Creating custom workflows can be unintuitive at a small scale. Processes inside of a process.
Cortex XSOAR - Comprehensive incident management solution
- Triage and investigation of malicious traffic
- Automate firewall policy modifications and actions in playbooks using Panorama
- Automate malware sample analysis
- SAML is not stable, it gives a lot of issues.
- Pre-defined playbooks need a lot of fine tuning
- Lacks proper documentation