"It has a quick detection and response time."
"The initial setup is straightforward."
"The product can be automated for network security purposes. The solution offers a great security automation response."
"The most valuable feature is the risk-based access control."
"The customization continues to be excellent."
"I'm just a beginner on the solution and it's pretty easy for me to use."
"I like the integration capabilities of Phantom. It has a lot of integrations with other products. Its searching methodologies are also good. It is also easy to understand and easy to create playbooks."
"Very flexible integration with other tools"
"So far, the interface is very easy to use."
"Technical support could be improved."
"The area that needs improvement is integration with multiple third-party vendors."
"I don't currently see where the solution is lacking features. For us and for our clients it works very well and we're pleased with it."
"In the beginning, we couldn't find any specific documents for every function. It wasn't easy to navigate to what we needed."
"We've had trouble implementing the solution with Microsoft products. There seems to be an integration gap."
"And most of the challenges that I have faced with the solution can be found in the documentation itself."
"It would be ideal if we could automate processes even more."
"I haven't used it fully, but based on my usage, I could not find simulation tools and features. It currently lacks simulation features, which are important for me for creating a playbook. It is also very expensive for my region."
"We want to see improvements made to the APIs such that we can connect to many different systems and data sources."
As the digital attack surface expands, security teams must also expand their defense capabilities. Yet, adding additional security monitoring tools is not always the answer. Additional monitoring tools means more alerts for security teams to investigate, more context switching in the investigation process, and slower response times. This creates a number of challenges for security teams including alert fatigue, a lack of qualified security personnel to manage new tools, and slower response times.
Integrated into the Fortinet Security Fabric, FortiSOAR security orchestration, automation and response (SOAR) remedies some of the biggest challenges facing cybersecurity teams today. Allowing security operation center (SOC) teams to create a custom automated framework that pulls together all of their organization's tools unifies operations, eliminating alert fatigue and reducing context switching. This allows enterprises to not only adapt, but also optimize their security process.
Phantom enables teams to work smarter by executing automated actions across their security
infrastructure in seconds, versus hours or more if
performed manually. Teams can codify workflows
into Phantom’s automated playbooks using the visual
editor (no coding required) or the integrated Python
development environment. By offloading these
repetitive tasks, teams can focus their attention on
making the most mission-critical decisions.
Phantom is the connective tissue that lets existing security tools work better together. By connecting and coordinating complex workflows across the SOC’s team and tools, Phantom ensures that each part of the SOC’s layered defense is actively participating in a unified defense strategy. Powerful abstraction allows teams to focus on what they need to accomplish, while the platform translates that into tool-specific actions.
Phantom helps security teams investigate and respond to threats faster. Using Phantom’s automated detection, investigation, and response capabilities, teams can execute response actions at machine speed, reduce malware dwell time and lower their overall mean time to resolve (MTTR). And now with Phantom on Splunk Mobile, analysts can use their mobile device to respond to security incidents while on-the-go. Phantom’s event and case management functionality can further streamline security operations. Case-related data and activity are easily accessible from one central repository. It’s easy to chat with other team members about an event or case, and assign events and tasks to the appropriate team member.
Fortinet FortiSOAR is ranked 8th in Security Orchestration Automation and Response (SOAR) with 3 reviews while Splunk Phantom is ranked 3rd in Security Orchestration Automation and Response (SOAR) with 6 reviews. Fortinet FortiSOAR is rated 7.6, while Splunk Phantom is rated 7.6. The top reviewer of Fortinet FortiSOAR writes "Accessible with good centralization and a straightforward initial setup". On the other hand, the top reviewer of Splunk Phantom writes "Very stable with a straightforward setup and good performance". Fortinet FortiSOAR is most compared with Palo Alto Networks Cortex XSOAR, Cisco SecureX, ServiceNow Security Operations, IBM Resilient and SECDO Platform, whereas Splunk Phantom is most compared with Palo Alto Networks Cortex XSOAR, ServiceNow Security Operations, IBM Resilient, Cisco SecureX and Siemplify. See our Fortinet FortiSOAR vs. Splunk Phantom report.
See our list of best Security Orchestration Automation and Response (SOAR) vendors.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.