Very good SOAR solution
Updated January 09, 2023

Very good SOAR solution

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Palo Alto Networks Cortex XSOAR (formerly Demisto)

●Standardize
and
scale processes: Demisto playbooks help you codify
and enforce a process that’s common across your security team. These playbooks
can be fully automated, fully manual, or any combination of the two, with each
scenario having its own advantages for increased efficiencies.


●Lower response times with automation: Demisto
can automate thousands of actions across your security products, handing back
time to you for investigation and decision-making. This automation can be for
alert ingestion, data gathering, response actions, and updating info back in
the point products.

●Coordinate actions across security
products: You
now have a process-centric view of how to respond to a particular incident
that’s not tied to any one security product. All security products have their
purpose, but playbooks provide you with an abstract view of the ‘process’ and make
it easier to replace one product with another whenever you need to.
  • Standardize and scale processes
  • Lower response times with automation
  • Coordinate actions across security products
  • PLAYBOOK generation
  • Using other languages in marketplace
  • Scripting documentation
  • Orchestration
  • Automation
  • Response
  • Standardize and scale processes
  • Lower response times with automation
  • Coordinate actions across security products

Do you think Palo Alto Networks Cortex XSOAR delivers good value for the price?

Yes

Are you happy with Palo Alto Networks Cortex XSOAR's feature set?

Yes

Did Palo Alto Networks Cortex XSOAR live up to sales and marketing promises?

No

Did implementation of Palo Alto Networks Cortex XSOAR go as expected?

Yes

Would you buy Palo Alto Networks Cortex XSOAR again?

Yes

XSOAR is well suited for phishing detection and response. Phishing alerts are as much of a
problem today as they were decades ago. This is because:
●Attackers
Can leverage automation to launch high-quantity phishing attacks with the click
of a button.


●Spear
Phishing attacks are sophisticated and sometimes indistinguishable from real
emails, resulting in compromise through human error.


●Security
Teams aren’t able to follow set processes while responding to phishing alerts.
They must coordinate across email inboxes, threat intel, NGFW, ticketing, and
other tools. Each tool has different consoles, data conventions, and contexts,
making it difficult for security teams to fill in the gaps while minimizing
errors. XSOAR is less suited for analyzing traffic.