Free Security Orchestration, Automation, and Response (SOAR) Software
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Here's our list of apps for Security Orchestration, Automation, and Response (SOAR) Software. Filters help you narrow down the results to find exactly what you’re looking for.
Filter by
Pricing model
Devices supported
Business size
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Languages
Languages that the product is available in.
Sort by
14 Software options
In a world full of unpredictability, choosing the right partner is crucial. We are your guide on the path to greater simplicity and efficiency. ACMP offers modular and scalable solutions for your specific challenges in the IT department.
Read more about ACMP Suite
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.
Read more about CanIPhish
Logsign Unified SO Platform delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat intelligence, UEBA, and SOAR capabilities.
Read more about Logsign Unified SO Platform
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.
Read more about ManageEngine Log360
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.
Read more about Reveelium
DNIF HYPERCLOUD is a cloud-based security information and event management (SIEM) solution, which assists small to large organizations with threat detection and incident response. Key features include data parsing, user behavior analysis, workflow automation, data recovery, and performance metrics.
Read more about DNIF HYPERCLOUD
VenariX is a platform offering immediate, clear insights into cybersecurity incidents worldwide. It turns complex data into actionable intelligence with a user-friendly dashboard, detailed incident reports, and threat actor profiles, streamlining cyber threat analysis for various audiences.
Read more about VenariX
Swimlane is a security orchestration, automation, and response (SOAR) platform designed to help businesses in banking, healthcare, insurance, energy, retail, and other industries manage alerts and automate incident response processes by collecting security data from various sources. The platform exposes false positives and lets supervisors map...
Read more about Swimlane
ORNA is a SaaS cyber incident response platform, designed to take old-fashioned PDF-based plans and playbooks, with seamless workflow management, process automation, instant reporting and risk management capabilities.
Read more about Orna
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.
Read more about Teleport
Siemplify is an independent SOAR platform designed to help security teams manage case creation, investigation, remediation, and response processes to drive continuous improvement. It lets engineers automate repetitive processes related to the prevention, detection, and remediation of cyber threats using machine learning technology.
Read more about Siemplify
Security automation for the entire threat lifecycle.
Read more about SOAR+
DTonomy leverage AI and automation to help the security team
- automate repetitive tasks
- reduce false positives
- recover attack stories
Read more about DTonomy AIR
Proactively identify threat campaigns, streamline security operations, reduce false positives, and impore MTTD and MTTR.
Read more about UnderDefense MAXI