{"id":3643,"date":"2021-08-10T12:04:45","date_gmt":"2021-08-10T16:04:45","guid":{"rendered":"https:\/\/chrisgrundemann.com\/?post_type=avada_portfolio&#038;p=3643"},"modified":"2021-08-11T12:05:08","modified_gmt":"2021-08-11T16:05:08","slug":"key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0","status":"publish","type":"avada_portfolio","link":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/","title":{"rendered":"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Security Orchestration, Automation, and Response (SOAR) solutions started out as automation and orchestration engines based on playbooks and integrations. Since then, the platforms have developed beyond the core SOAR capabilities to offer more holistic experiences to security analysts, aiming to develop SOAR as the main workspace for practitioners. Additionally, SOAR vendors have gradually implemented Artificial Intelligence (AI) and Machine Learning (ML) technologies within their platform to learn from past events and fine-tune existing processes&#8230;<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/gigaom.com\/report\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Keep Reading<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4261,"featured_media":3644,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"portfolio_category":[981],"portfolio_skills":[992],"portfolio_tags":[976,995,1100],"class_list":["post-3643","avada_portfolio","type-avada_portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-content-creation","portfolio_skills-research","portfolio_tags-gigaom","portfolio_tags-report","portfolio_tags-soar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0 ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0 ~ Chris Grundemann\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-11T16:05:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1907\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/\",\"url\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/\",\"name\":\"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0 ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg\",\"datePublished\":\"2021-08-10T16:04:45+00:00\",\"dateModified\":\"2021-08-11T16:05:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#primaryimage\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg\",\"width\":2560,\"height\":1907,\"caption\":\"Key Criteria for Evaluating SOAR V1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chrisgrundemann.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Content Creation\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/portfolio_category\/content-creation\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chrisgrundemann.com\/#website\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chrisgrundemann.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ChrisGrundemann\",\"https:\/\/www.linkedin.com\/company\/grundemann\",\"https:\/\/www.linkedin.com\/in\/cgrundemann\/\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0 ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/","og_locale":"en_US","og_type":"article","og_title":"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0 ~ Chris Grundemann","og_url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/","og_site_name":"Chris Grundemann","article_modified_time":"2021-08-11T16:05:08+00:00","og_image":[{"width":2560,"height":1907,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@ChrisGrundemann","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/","url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/","name":"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0 ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg","datePublished":"2021-08-10T16:04:45+00:00","dateModified":"2021-08-11T16:05:08+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/stefan-cosma-GVlcXhQejA8-unsplash-scaled.jpeg","width":2560,"height":1907,"caption":"Key Criteria for Evaluating SOAR V1"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-v1-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/"},{"@type":"ListItem","position":3,"name":"Content Creation","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio_category\/content-creation\/"},{"@type":"ListItem","position":4,"name":"Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) v1.0"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/avada_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/4261"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=3643"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/3644"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=3643"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_category?post=3643"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_skills?post=3643"},{"taxonomy":"portfolio_tags","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_tags?post=3643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}