


Find out what your peers are saying about Microsoft, Splunk, Palo Alto Networks and others in Security Orchestration Automation and Response (SOAR).
| Product | Mindshare (%) |
|---|---|
| McAfee ePolicy Orchestrator | 1.5% |
| Microsoft Sentinel | 11.2% |
| Palo Alto Networks Cortex XSOAR | 8.6% |
| Other | 78.7% |
| Product | Mindshare (%) |
|---|---|
| Webroot Advanced Email Encryption powered by Zix | 1.4% |
| Proofpoint Email Protection | 19.9% |
| Microsoft Defender for Office 365 | 18.3% |
| Other | 60.400000000000006% |



| Company Size | Count |
|---|---|
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 11 |
| Large Enterprise | 19 |
Torq is the enterprise AI SOC solution that effectively combines adaptive insights and automation to handle critical threats efficiently. It manages threat lifecycles, swiftly moving from triage to response, ensuring effective risk management.
Torq is designed to streamline security operations by aggregating telemetry across your security stack. It investigates significant risks and manages threats from triage to containment and remediation. This AI-driven tool enhances the capabilities of your SecOps team, allowing them to achieve more impactful results without introducing complicated processes.
What are the key features of Torq?In industries like finance and healthcare, Torq shows effectiveness by adapting to specific risk scenarios often encountered in these fields. Its integration with existing infrastructures makes it a valuable asset for maintaining stringent security standards, essential for protecting critical data and operations in diverse high-stakes environments.
McAfee ePolicy Orchestrator centralizes cybersecurity management, providing a unified platform for antivirus and data loss prevention with integrated analytics and reporting capabilities. It enhances policy oversight and threat detection across diverse IT environments.
McAfee ePolicy Orchestrator offers centralized management for robust network and endpoint security. Its scalable platform includes advanced threat prevention, encryption, and application control. With its intuitive console, it simplifies management of policies across devices. Challenges include improvements in automation, reporting, licensing clarity, and compatibility with modern technologies, often impacting system performance. Despite this, its centralized interface efficiently manages device control, antivirus, data loss prevention, and threat intelligence, offering custom insights for better compliance visibility.
What are the key features of McAfee ePolicy Orchestrator?In industries requiring meticulous data protection and compliance, such as finance and healthcare, McAfee ePolicy Orchestrator is implemented to manage endpoint security, alleviate data security risks, and ensure adherence to strict regulatory standards. Users benefit from its powerful capabilities in managing network logs and automating security tasks.
Webroot Advanced Email Encryption powered by Zix offers robust email security by ensuring messages are sent and received securely, catering to businesses that prioritize data protection and compliance.
This encryption tool provides a seamless way to safeguard business communications, protecting sensitive information with minimal user intervention. Its advanced encryption technology integrates effortlessly into existing email platforms, ensuring that security measures are not only effective but also invisible to end-users. Companies benefit from the unmatched ability to meet compliance requirements while maintaining efficient communication channels.
What are the key features of Webroot Advanced Email Encryption powered by Zix?Webroot Advanced Email Encryption powered by Zix can be particularly advantageous for industries such as healthcare and finance, where maintaining confidentiality and compliance is crucial. Its ability to integrate smoothly with existing systems makes it adaptable for organizations that handle large volumes of sensitive data, offering a reliable and efficient way to enhance communication security.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.