Splunk SOAR Recognized in Forrester Now Tech: SOAR, Q2 2022 Report

The Splunk SOAR team is excited to be recognized within Forrester’s report Now Tech: Security Orchestration, Automation, And Response (SOAR), Q2 2022. Splunk SOAR is categorized within the Security Analytics Portfolio functionality segment and in the “Large” vendor market presence segment. The following post will share more on our views of the report, our position in this dynamic market landscape, and a look at what’s ahead.

Report Overview

Authored by Forrester analyst Allie Mellen and published on April 14th, 2022, the report examines 31 vendors in the SOAR market category based on the following five ‘functionality segments’:

A comparison table is provided that measures 12 critical SOAR capabilities within each of these five functionality segments (i.e. “out of the box playbooks” and “security technology integrations”). Vendors are also segmented by their estimated revenues (i.e. Large, Midsize, or Small). As noted above, Splunk SOAR was categorized within the Security Analytics Portfolio functionality segment and Large revenue segment (definitions of these segments are found within the report).

The Forrester report notes that the Security Analytics Portfolio segment, “has the benefit of potentially strong integrations with other aspects of the portfolio, while also having the freedom to implement with other security analytics technologies.” We believe being categorized within the Security Analytics Portfolio segment is reflected by Splunk SOAR’s growing ecosystem of 350+ Apps allow users to automate actions across third-party technologies, along with a tight cohesion with the broader Splunk portfolio, most importantly with the Splunk Enterprise Security (ES) platform (SIEM/Security Analytics) and Splunk Intelligence Management. Organizations clearly want a more complete set of technologies that work together to solve a broad set of challenges as opposed to siloed point solutions.

Meeting the Breadth, Depth and Speed of Your SecOps

Security operations teams are facing immense challenges from alert overload to employee burnout and it’s clear that SOAR can enable teams to keep up with the changing nature of adversary tactics. But with 31 different vendors named in this report by Forrester, it’s hard to know where to start the process of comparing vendor capabilities. We think Splunk SOAR stands out from the crowd for teams that require extensibility, flexibility, and speed by offering the most complete solution that integrates with other Splunk tools and your broader technology stack.

Splunk’s core DNA as a company has always been extensibility and continues to be demonstrated by our focus on partnerships - just look at the scale of the Splunk Partnerverse. We know we can’t solve every technology challenge on our own, especially when it comes to automation which is built upon App integrations with your key technologies. We partner with your technologies in threat intelligence, endpoint security, network security, identity, vulnerability management, and many other tools.

Our continued focus is on improving your security operations by providing pre-built playbooks out-of-the-box to help security analysts get started with automation using a low-code/no-code approach. We have also advanced your Splunk SOAR user experience in a few key areas that help speed up your security operations to close the detection and response gap such as:

Looking Ahead

The Forrester Now Tech report closes with guidance for buyers that are evaluating SOAR with the advice that “planning is paramount when adopting SOAR” and provides cautions such as setting realistic expectations, defining your processes, and allocating resources. We couldn’t agree more with this guidance. Starting with a mindset of task-based automation vs. end-to-end automation will help reign in your deployment objectives by starting small. As you begin to automate the basic tasks that you perform the most often, those can then become a stamp and repeat process within your more complex workflows over time.

More information about all these new developments will be found at our annual user conference .Conf22. Splunk SOAR experts will be presenting on a variety of topics related to security operations and co-presented with some of our key partners and customers. If you haven’t signed up yet, be sure to register here. The event will be held both virtually and physically in Las Vegas from June 13th to June 16th, 2022. Look forward to seeing you there!

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.