Top 3 Market Trends for SOAR Solutions
This is not a sustainable working environment and teams must find a new apparatus to tackle the abundance of incoming threats and security alerts. Many security analysts have realized, especially over the past year, that adding a security orchestration, automation, and response (SOAR) tool to their toolkit can help decrease workloads, respond to incidents faster, and automate alert triage, investigation, and response.
Gartner recently released their 2020 SOAR Market Guide. It provides valuable insights into the must-have capabilities provided by a SOAR, the trajectory of the technology and marketplace, and recognizes Splunk Phantom amongst a representative list of SOAR vendors in alignment with Gartner’s vision.
Let’s take a look at a few notable insights from Gartner’s research:
1. “Orchestration and automation, basic incident/case management, and operationalizing threat intelligence are ‘table stakes’ for SOAR tools.” Many security teams turn to SOAR solutions to help reduce alert fatigue, mean time to respond, and overall workload. With orchestration and automation, analysts no longer have to spend hours manually executing actions across a multitude of point products to investigate and remediate threats. Instead, the analyst can have a SOAR tool automate actions, without human interaction, across different products in a matter of seconds. This not only saves time, but frees the analyst to focus on mission critical tasks.
Capabilities such as automated alert triage help the analyst prioritize the highest risk alerts; case management helps analysts coordinate a comprehensive investigation or response at a faster rate; and automated threat intelligence empowers analysts to make better educated decisions backed by data.
Based on Gartner’s recommendations for evaluating SOAR capabilities, Splunk Phantom offers all of the above and more, including:
- A fully integrated intelligence assistant that leverages machine learning to provide suggestions on how to help investigate, contain, and eradicate a security incident
- A visual playbook editor for creating playbooks with drag and drop elements
- Modular workbooks that are reusable and customizable templates for process documentation
- Custom function blocks for easier playbook creation and execution
3. “Security information and event management vendors continue to add SOAR capabilities via acquisitions, OEM agreements or internal development; however, the solutions are still primarily sold as premium add-ons and not being merged with SIEM tools.”SIEM and SOAR technologies, when used together in a security workflow, greatly complement one another. The SIEM collects and organizes information and detections from your various security tools, analyzes that activity and provides insights, and then generates alerts. Then, the SOAR tool will automatically triage those alerts, and orchestrate automated responses to those alerts. In other words, while the SIEM “observes” and “orients” the security team to potential malicious activity in their environment, the SOAR tool then automates the decision-making and actions (executed by your other various security tools) to resolve such activity.
Splunk is one of the few vendors on the market that offers both SIEM and SOAR in their security portfolio. We are proud that Splunk Enterprise Security is recognized by Gartner as a leader in the 2020 Gartner Magic Quadrant for SIEM.
To learn more about the general market trends for SOAR, investment recommendations, and how Splunk Phantom aligns with Gartner’s vision for SOAR, download a complimentary copy of the 2020 Gartner SOAR Market Guide.
----------------------------------------------------
Thanks!
Kelly Huang
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Splunk Security Content for Threat Detection & Response: November Recap

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

AI for Humans: A Beginner’s Field Guide

Splunk Security Content for Threat Detection & Response: November 2025 Update

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
