SHARE
Facebook X Pinterest WhatsApp

Cybersecurity Must SOAR to Address Today’s Threats

thumbnail
Cybersecurity Must SOAR to Address Today’s Threats

Cubed background in different sizes and blue colors aligning to a row of glowing information security icons surrounding the word cybersecurity 3D illustration

SOAR’s biggest strength is its ability to apply automation to security operations, freeing up analysts’ time from menial tasks to focus on more strategic initiatives.

Sep 13, 2021

Modern business operations are becoming increasingly complex and harder to secure. Companies typically support a mix of on-premises solutions, multiple cloud services, and third-party apps and data. Most of these entities are monitored using a bevy of point security solutions, all of which generate vast amounts of data and endless security alerts. Those responsible for protecting the company from cyber threats must quickly assimilate all of that data, derive insights into looming threats in real time, and instantly take action. Increasingly, the way to accomplish that is by using SOAR (security orchestration, automation, and response).

Download Infographic Now: The 5 intelligence gaps curbing your climb to digital  success

According to Gartner, SOAR refers to technologies that enable organizations to collect inputs monitored by the security operations team. For example, alerts from a security information and event management (SIEM) system and other security technologies — where incident analysis and triage can be performed by leveraging a combination of human and machine power — help define, prioritize, and drive standardized incident response activities. SOAR tools allow an organization to define incident analysis and response procedures in a digital workflow format.

See also: Continuous Intelligence Insights

Why the need for automation?

А cyberattack is expected to happen every 11 seconds in 2021. To prevent irreparable damage, alerts need to be sorted in minutes, not days and weeks. 

Therein lies the challenge. Many businesses use a variety of security solutions, including vulnerability scanners, endpoint protection products, firewalls, intrusion detection and intrusion prevention systems, SIEM platforms, as well as external threat intelligence feeds.

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics

The data and alerts from these systems offer a way to detect threats as they are emerging and then take action. The problem is that the volume of data and alerts makes it hard to integrate information and understand what’s happening.

Advertisement

How does SOAR help?

One of SOAR’s biggest strengths is its ability to apply automation to security operations (SecOps). By automating processes, SOAR frees up analysts’ time, which they could use for more strategic initiatives rather than spending it on repetitive, menial tasks. Specifically, tasks previously performed by SecOps staff, such as vulnerability scanning, log analysis, and ticket checking, can now be automatically executed by a SOAR platform. In addition, artificial intelligence (AI) and machine learning can be applied to derive insights. SOAR solutions are often used to elevate threats if human intervention is needed, make action recommendations, and automate responses. They use continuous intelligence to derive real-time insights upon which a company can base its response to a threat.

Such automation is critical today. The pace at which threats are evolving is increasing the demand for qualified security professionals. The only problem is that many companies are finding it harder and harder to adequately staff a team of cybersecurity professionals.

There is great competition for qualified security experts. One way to address this problem is to get more productivity out of current staff, so fewer new positions need to be filled. The way that it’s done is that by applying automation and orchestration. SOAR has been found to significantly increase security operations staff productivity. This allows security professionals to have more time to focus on the most prominent threats.

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics
thumbnail
Salvatore Salamone

Salvatore Salamone is a physicist by training who writes about science and information technology. During his career, he has been a senior or executive editor at many industry-leading publications including High Technology, Network World, Byte Magazine, Data Communications, LAN Times, InternetWeek, Bio-IT World, and Lightwave, The Journal of Fiber Optics. He also is the author of three business technology books.

Recommended for you...

The Rise of Autonomous BI: How AI Agents Are Transforming Data Discovery and Analysis
Beyond Procurement: Optimizing Productivity, Consumer Experience with a Holistic Tech Management Strategy
Rishi Kohli
Jan 3, 2026
Smart Governance in the Age of Self-Service BI: Striking the Right Balance
Why the Next Evolution in the C-Suite Is a Chief Data, Analytics, and AI Officer

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.