Home / Security Operations and Automation / Security Orchestration, Automation, and Response (SOAR)

Security Orchestration, Automation, and Response (SOAR)

Streamline security operations with SOAR. Automate tasks, orchestrate responses, and accelerate threat detection and incident management.

Try these 283 AI Security Orchestration, Automation, and Response (SOAR) Tools

TNO Cyber Security Lab
Free

TNO Cyber Security Lab View TNO Cyber Security Lab

The TNO Cyber Security Lab is a state-of-the-art facility dedicated to pioneering research and development for a secure and resilient cyberspace. We focus on creating robust solutions that protect against disruptions and cyberattacks, fostering innovation and economic growth while safeguarding national security interests. Through collaborative partnerships within the 'golden triangle' of government, academia, and industry, the lab drives cutting-edge advancements in cybersecurity.

Advanced experimental cybersecurity research
Resilience against disruptions and attacks
Fostering innovation and economic growth
Torq
Free

Torq View Torq

Torq is a purpose-built, no-code security automation platform designed to modernize workflows for security and operations teams. Leveraging limitless integrations and a rich library of pre-built templates, Torq empowers front-line teams and CISOs to achieve immediate improvements in security posture and ROI. Its lightweight, flexible design seamlessly scales with organizational needs, enabling proactive risk reduction through efficient, easily integrated automation.

Intuitive no-code workflow builder
Extensive library of pre-built automation templates
Seamless integration with existing security tools
Tototheo Global
Free

Tototheo Global View Tototheo Global

Tototheo Global pioneers the fusion of maritime and terrestrial technology, delivering advanced satellite communication, cybersecurity, and digital transformation solutions. Leveraging deep maritime expertise, we empower land operations with state-of-the-art innovation, ensuring security, sustainability, and seamless connectivity for global progress. Our commitment extends to the Tines security automation platform, enhancing efficiency for security teams through automated task management.

Advanced Satellite Communication Solutions
Expert Maritime and Terrestrial Technology Integration
Robust Cybersecurity for Global Operations
Trackd
Free

Trackd View Trackd

Trackd revolutionizes vulnerability remediation by intelligently automating the patching process, eliminating the fear of operational disruption. Leveraging a unique database of operator patching experiences and proprietary machine learning, Trackd predicts patch disruptiveness, enabling automated deployment of safe updates. Empower your security teams with data-driven insights to confidently prioritize and execute remediation strategies that align with critical business objectives.

AI-powered patch disruptiveness prediction
Automated safe patch deployment
Vast operator patching experience database
Trellix
Free

Trellix View Trellix

Trellix provides an open and native Extended Detection and Response (XDR) platform designed to bolster the security posture of organizations facing sophisticated cyber threats. Emerging from the synergy of McAfee Enterprise and FireEye Products, Trellix leverages AI and automation, supported by a vast partner network, to empower over 40,000 global businesses and government entities. The platform aims to enhance operational resilience and confidence through advanced threat detection, investigation, and response capabilities.

Open and Native XDR Platform
Advanced Threat Detection and Response
AI and Machine Learning Driven Automation
Trickest
Free

Trickest View Trickest

Trickest empowers organizations and security professionals to automate and scale offensive cybersecurity operations. Our platform enables the rapid development and deployment of custom attack workflows, leveraging a powerful crowdsourced threat intelligence engine. Streamline your security testing with automated attack surface mapping, vulnerability scanning, secret discovery, and container security.

Automated Offensive Security Workflows
Crowdsourced Intelligence Engine
Attack Surface Mapping
Tuskira
Free

Tuskira View Tuskira

Tuskira is an advanced Preemptive Cyber Defense & Response Platform leveraging agentic AI to redefine security operations. Its AI-driven Security Mesh intelligently unifies data from over 150 security tools, creating a robust defense system that actively closes posture gaps and expands detection coverage. Tuskira autonomously responds to threats in real-time by continuously correlating insights across your entire security stack, proactively disrupting attack workflows and minimizing exposures to defend against present and future cyber threats.

Agentic AI-driven analysis and response
Unified data ingestion from 150+ security tools
Automated threat detection and mitigation
TZ-CERT
Free

TZ-CERT View TZ-CERT

TZ-CERT serves as Tanzania's National Computer Emergency Response Team, dedicated to orchestrating national cyber security incident response and fostering collaboration with regional and international partners. Its core mission is to elevate network and information security standards across the nation, cultivating a robust security culture for all stakeholders, thereby ensuring secure and efficient online activities for government, citizens, and organizations.

National Cyber Security Incident Coordination
Cross-border Cybersecurity Cooperation
Enhancing National Network Security
Unisys
Free

Unisys View Unisys

Unisys delivers industry-focused information technology solutions, integrating cutting-edge security to empower clients across government, financial services, and commercial sectors. Their comprehensive offerings span advanced analytics, secure cloud and infrastructure services, application development, and robust security solutions, including the Tines security automation platform, designed to protect digital assets, ensure regulatory compliance, and build customer trust through enhanced efficiency and effectiveness.

Industry-specific IT solutions for government, finance, and commercial sectors.
Integrated, leading-edge security for comprehensive digital asset protection.
Advanced data analytics for actionable insights.
Var Group
Free

Var Group View Var Group

Var Group is a leading ICT innovation partner in Italy, offering comprehensive digital transformation services grounded in profound business process knowledge and seamless integration. As part of the SeSa Group, Var Group empowers organizations of all sizes with a holistic approach to digital security, fusing physical and logical protection with advanced AI, Machine Learning, and Threat Intelligence, all managed through a SOC-centric framework to proactively defend against sophisticated cyber threats. Their expertise spans Business & Industry Solutions, Digital Cloud, Digital Industries, Digital Process Engineering, Customer Experience, Digital Security, Business Technology Solutions, Smart Services, and Data Science.

Holistic Digital and Physical Security Convergence
AI and Machine Learning-Powered Threat Intelligence
SOC-Centric Security Operations
Verica
Free

Verica

Verica leverages the power of chaos engineering to proactively identify and address security and availability weaknesses within complex systems. By continuously verifying system behavior through controlled experimentation, Verica empowers organizations to prevent costly incidents and ensure unwavering confidence in their software's resilience and security posture. Our approach allows you to trust that your applications will perform as intended, even under the most challenging conditions.

Continuous Verification through controlled experimentation
Proactive identification of security and availability weaknesses
Reduced risk of business-disrupting incidents
Viria
Free

Viria View Viria

Viria is a leading provider of integrated information and security technology solutions, empowering organizations to embrace digitalization securely and efficiently. We leverage deep expertise in business intelligence, digital transformation, and both information and physical security to deliver innovative, sustainable digital services. Our customer-centric approach, combined with advanced service design and data utilization, ensures tailored solutions that drive significant improvements in security posture and operational efficiency for our clients, establishing them as data-driven leaders.

Total security (digital and physical protection)
Proactive cyber risk reduction
Data-driven organizational development
Visible Statement
Free

Visible Statement View Visible Statement

Visible Statement is an innovative computer-based delivery system engineered to significantly improve retention and recall of critical security training messages. By leveraging colorful, humorous, and professionally designed Info-Animations and Info-Graphics, it delivers essential content directly to employees' workstations, reinforcing key learnings through the scientifically-backed principle of spaced repetition. This dynamic approach ensures consistent reinforcement, cultivating widespread security awareness across your entire organization.

Engaging Info-Animations and Info-Graphics
Computer-based delivery system
Spaced repetition learning principle
Wing Security
Free

Wing Security View Wing Security

Wing Security is the premier holistic SaaS security platform designed to empower security leaders with robust, always-on, and consistent SaaS security without overwhelming vendor stacks or disrupting user workflows. By intelligently engaging SaaS end-users and streamlining communication with security teams, Wing fosters a proactive security culture. Our non-intrusive discovery and automated remediation paths ensure effective governance and effortless compliance, delivering strong, consistent SaaS security that integrates seamlessly into your business operations.

Holistic SaaS Security Platform
Non-Intrusive SaaS Discovery
Automated Remediation Paths
World Wide Technology (WWT)
Free

World Wide Technology (WWT) View World Wide Technology (WWT)

World Wide Technology (WWT) is a premier technology solutions provider specializing in advanced capabilities across big data, collaboration, cloud, mobility, networking, security, and storage. WWT offers an innovative, multi-faceted approach to threat management, built upon readiness, awareness, defense, analytics, and response, complemented by a proprietary cybersecurity reference architecture. This architecture empowers organizations to proactively defend against sophisticated threats, detect anomalies with robust analytics, achieve compliance, automate security processes, and secure their entire network infrastructure.

Comprehensive cybersecurity reference architecture for multi-vendor solution comparison
Innovative threat management approach covering readiness, awareness, defense, analytics, and response
Proactive security solutions to reduce cyber risk and improve security posture
xMatters
Free

xMatters View xMatters

xMatters is a leading digital service availability platform designed to proactively prevent, efficiently manage, and rapidly resolve IT incidents, safeguarding against business disruptions. By integrating with hundreds of IT management, security, and DevOps applications, xMatters provides unparalleled operational visibility and control, empowering organizations to automate critical processes and streamline complex workflows within highly dynamic IT environments. Acquired by Everbridge in 2021, the platform is trusted globally by enterprises seeking to maintain robust service availability and resilience.

Digital Service Availability Platform
Proactive Incident Prevention
Automated Incident Management
Xmore AI
Free

Xmore AI View Xmore AI

Xmore AI is revolutionizing IT optimization and security with advanced AI models designed to enhance efficiency and significantly reduce operational costs. Their innovative software consolidates multiple cybersecurity tools into a unified platform, delivering real-time risk analysis, proactive vulnerability detection, and streamlined IT operations management. By ensuring data remains within the enterprise, Xmore AI provides robust privacy alongside cutting-edge security.

AI-driven cybersecurity solutions
Consolidated security tool platform
Real-time risk analysis
ZeroNorth
Free

ZeroNorth View ZeroNorth

ZeroNorth, now part of Harness, is a comprehensive platform designed to revolutionize software and infrastructure security. It streamlines continuous compliance reporting and optimizes cost-effective risk management programs through its advanced "mission-control" orchestration capabilities. ZeroNorth empowers organizations to build and maintain automated, consistent software security programs, delivering board-level visibility into business risk, enhanced security assurance, and continuous proof of compliance.

Orchestration Platform for Software Security Programs
Automated and Consistent Security Workflows
Board-Level Business Risk Visibility
ZM CIRT
Free

ZM CIRT View ZM CIRT

ZM CIRT serves as Zambia's national Computer Incident Response Team, dedicated to safeguarding the nation's digital infrastructure. We provide a comprehensive incident response framework for the Zambian Government, public utilities, private sector organizations, and citizens. Our mission is to bolster cybersecurity resilience and ensure a secure digital environment for all stakeholders across Zambia.

National Incident Response Coordination
Governmental Cybersecurity Support
Public Utility Security Assurance