Home Big Data Standalone SOAR is Alive and Kicking

Standalone SOAR is Alive and Kicking

0
Standalone SOAR is Alive and Kicking

[ad_1]

A number of publications and analyst corporations have predicted a doomsday state of affairs for the standalone SOAR following various acquisitions within the area, primarily by SIEM distributors. Google acquired Siemplify, Devo acquired LogicHub, Fortinet acquired CyberSponse, Palo Alto Networks acquired Demisto, Splunk acquired Phantom, Sumo Logic acquired DFLabs, and Micro Focus acquired Atar Labs, which, in flip, received acquired by OpenText.

However this high-level view has very low decision. It assumes that each one potential SOARs are already in circulation, that each acquisition minimizes the pool of standalone distributors, and that an acquisition implies that the SOAR will probably be natively built-in inside a SIEM or XDR. As a part of my analysis on SOAR, I’ve seen quite a few developments over the previous three years that point out that not solely is there a spot for the standalone SOAR, however the options are evolving to help new use instances. 

Listed here are some key the explanation why the standalone SOAR options won’t be consumed into SIEM or XDR within the close to future:

  1. Extra standalone distributors enter the market.
  2. Massive gamers nonetheless select to supply standalone.
  3. The inherent advantages of standalone and vendor-agnostic options.
  4. Non-security occasion ingestion.
  5. Non-security automation.

Extra Standalone SOARs Enter the Market

In comparison with the second iteration of the GigaOm SOAR Radar, the third iteration options three extra standalone SOAR gamers, particularly Cyware, Tines, and Torq. Torq is the newest participant, having been established in 2020 and has constructed a formidable portfolio of consumers. Tines has additionally been gaining traction available in the market. I’ve repeatedly and adventitiously seen Tines added to integration portfolios throughout numerous community and safety distributors over the previous couple of years.

Massive Gamers Nonetheless Supply Standalone SOARs

Whereas a choice of safety distributors have chosen to combine SOARs into their SIEM – corresponding to OpenText, Huntsman, Sumo Logic, and Devo – others have stored SOAR as a standalone and vendor-agnostic product. Most notably, heavyweights corresponding to Fortinet, IBM, Splunk, and Palo Alto Networks. 

Why would they do this? The obvious purpose is to develop their complete addressable market. If an built-in SIEM plus SOAR resolution (see our GigaOm Radar on ASOM) is just appropriate for purchasers that both wish to migrate from the incumbent SIEM or don’t have a SIEM in any respect, a standalone SOAR also can goal clients with a third-party SIEM that don’t wish to migrate.

However there’s extra to standalone SOARs than only a bigger goal market, which we discover within the part beneath.

The Inherent Advantages of Standalone and Vendor-Agnostic Options

A SIEM with native SOAR capabilities might turn into unwieldy and tough to handle, with slower cadence on new options. A really giant portion of your SOC turns into depending on this one resolution, and regardless of all of the automation and ML-powered insights, the platform will doubtless incur a variety of technical debt.

Right here, SOAR platforms have two benefits—Standalone and vendor agnostic – that are two sides to the identical coin. Vendor agnosticism implies that a SOAR resolution can work with any third-party SIEM, significantly reducing the dependency on a single platform and making migration significantly simpler, whether or not it’s switching out the SOAR or SIEM a part of an answer. 

The standalone high quality implies that the SOAR resolution can fulfill its function within the absence of SIEM. This side permits SOAR to department into two extra use instances unavailable for built-in SIEM and SOAR options, immediately ingesting non-security occasions, and automating non-security duties.

Non-Safety Occasion Ingestion

Current developments point out that the remaining standalone SOAR distributors are discovering a method of side-stepping SIEM, with the choice of turning into the primary instrument for SOC analysts. Relatively than counting on SIEM to ingest logs and generate alarms, some SOAR distributors at the moment are ingesting occasions immediately from the instruments that generate them. On this context, non-security occasions usually are not generated by a safety instrument corresponding to SIEM, XDR, firewall, or antivirus.

Whereas this state of affairs sounds similar to SIEM’s log assortment performance, SOAR options don’t seize every little thing, solely occasions corresponding to API calls, HTTP requests, or login makes an attempt. This strategy signifies that occasions are fewer and richer in comparison with logs, which implies two issues:

  • SOAR won’t have the identical difficulty of gathering, digesting, storing, and analyzing billions and trillions of logs as SIEM does.
  • SOAR won’t present the identical stage of deep visibility that SIEM does. 

This potential to ingest occasions immediately with no dependency on SIEM doesn’t imply breaking away from SIEM altogether—the 2 options can proceed working collectively, particularly when their options are complementary. Nevertheless, it might be the case that SOAR options would supply a lighter and extra agile method for safety analysts to deal with incident response within the context of less complicated IT environments, corresponding to start-ups and different cloud-native and cloud-only organizations.

Non-Safety Automation

SOAR and drop the S to turn into Orchestration, Automation, and Response. How is that this completely different from different IT workflow automation instruments? SOAR has been bred in a high-stakes setting and advantages from robust audit, compliance, governance, and, most significantly, belief. To not point out, an all-purpose SOAR can nonetheless perform its core safety capabilities moreover the extra IT automation. 

As a multi-purpose instrument, (S)OAR can turn into its personal class that blends IT automation and safety response. Including non-security-related capabilities right into a SIEM would make little to no sense, that means that solely a standalone SOAR can play on this market. Sure, I can automate responses for the alerts generated by SIEM, but it surely can be used for automated patch administration, guaranteeing compliance, asset administration, and onboarding new staff.

A vendor corresponding to ServiceNow has a definite benefit contemplating their ITSM background and complete SOAR capabilities.

Exit Choices for Standalone SOAR Distributors

From a much less technical viewpoint, one doubtless purpose we’ve seen so many acquisitions is that an acquisition is the more than likely exit for SOARs. Most of those start-ups had been acquired inside 5 to 10 years of inception. Are we prone to see an IPO from a SOAR-only vendor? The more than likely candidates are D3, Swimlane, and ThreatConnect, well-established gamers with lengthy tenure.

Maybe the reply to this stands throughout the final two factors I made above for the non-security occasion ingestion and non-security automation. There are solely a handful of point-solution SOAR distributors that develop their capabilities to open up new use instances for his or her merchandise, which implies that there are income streams that can’t be tapped by adjoining options corresponding to SIEMs or IT workflow automation. 

Whether or not we’ll see a SOAR IPO or not, the near-future prognosis for the SOAR market is robust, and no quantity of acquisitions will spell the tip of the standalone SOAR, as its inherent standalone and vendor-agnostic capabilities can’t be changed.

[ad_2]