My experience deploying Splunk SOAR in multi-client SOC
Overall Satisfaction with Splunk SOAR
It plays a central role in bridging detection with response automation. As a SOC analyst, I oversee threat response operations from multiple enterprise clients. Splunk SOAR obviously does a ton for us but at its core, the problem it solves is alert fatigue and triage inconsistency.
Pros
- My go-to is the visual playbook editor. It's clean enough for new analyst but still flexible for power users who want to script with python. I've built more than 50 playbooks from scratch.
Cons
- Splunk SOAR is powerful, but when you operate it at MSSP scale, a few rough edges become apparent like debugging visibility within playbooks. when a step fails, the log traces aren't always intuitive
- 70 % of low to mid tier alerts are now auto resolved through playbooks
- MTTD and MTTR are significantly low
Splunk SOAR has multi vendor friendly design that suits our MSP model. Qradar on the other hand has deployment complexity and dependency on IBM's Qradar, which is less appealing for us since our clients run everything from Sentinel to elastic
Do you think Splunk SOAR delivers good value for the price?
Yes
Are you happy with Splunk SOAR's feature set?
Yes
Did Splunk SOAR live up to sales and marketing promises?
No
Did implementation of Splunk SOAR go as expected?
Yes
Would you buy Splunk SOAR again?
Yes

Comments
Please log in to join the conversation