No more typing reviews! Try our Samantha, our new voice AI agent.

Cisco SecureX [EOL] vs Splunk SOAR comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco SecureX [EOL]
Average Rating
9.0
Reviews Sentiment
8.2
Number of Reviews
13
Ranking in other categories
No ranking in other categories
Splunk SOAR
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
58
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (2nd)
 

Featured Reviews

Alon K - PeerSpot reviewer
CTO & VP of Cyber Solutions, Israel at Rockwell Automation
Gives our customers visibility and they don't have to go multiple management consoles anymore
One of the examples is related to forensics. The forensics are amazing because when you have enrichment, and the solutions talk with each other, when you need it, you have the ability to know everything in the organization: when, why, whatever. With just one click you have information from email, from the endpoint, from the web. Let's say that tomorrow morning, you have a ransom[ware] attack in your organization and you would like to know from which email it came, or where the customer saved the file, even though the incident didn't occur at the same moment. With SecureX, you have Cisco Threat Response inside. [With] one click, you get all of the flow. That's amazing value. That also releases resources for our customers. The customers don't have to connect many systems and try to register the event on each system, or to go to the SIEM and do a correlation. That's the one-stop shop for the customers, and that's amazing.
SS
Manager cybersecurity at Hexion Inc.
Automates threat response and reduces investigation time but needs better threat intelligence integration
One thing that we would like to see with Splunk SOAR is the expandability to the threat intelligence feed. Currently, we have limited ingestion to the threat intelligence feed for the correlation purpose. We would like to see it being integrated, with license cost or without license cost, to leading threat intelligence sources such as Recorded Future, Feedly, or Flare. That is something we would appreciate having integrated. The second thing on the improvement side is about exposed credential-related information. If we start ingesting those data to Splunk SOAR or SIEM with some sort of integration with threat intelligence feed, that will also improve our detection and prediction method or help us with the investigation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Using SecureX, a tool provided by Cisco, we can easily integrate it with many of our other Cisco products such as Cisco ISE and many networking devices."
"SecureX has been keeping our devices safe during the pandemic and we haven't had any major threats that have come in or that have been found on our devices."
"If management wants to ingest reports at a high level from all of the different products, they would only need one login to SecureX to view this information as opposed to separate logins for each of the integrated products."
"The most valuable feature is its ability to manage all the applications and visibility. For example, if there is malware, spam, or another component that wants to attack the company in my servers, network, or applications, then SecureX will react to the problem."
"This solution definitely helps us meet our cyber security goals and we haven't had any problems so far."
"One of the most valuable features is the simplicity of deploying SecureX. It's very easy to do that and then you gain very detailed visibility into everything that's going on in your network and, obviously, at the device level. There's just a wealth of information that you can pull from all of these products that are part of SecureX. You know exactly if you have an issue or not."
"It has evolved a lot, just that monitoring piece to the current Orchestrator piece. The additional analytics are there. They now have something called Insight, which can basically take data from Microsoft Azure AD and Intune to give us information about our endpoints. This is detailed information about the endpoints, from Secure Endpoint and all these different products. So, it is just constantly evolving. Every time that it evolves, we have more information with more visibility. There are more features that we have that just make everything so much easier, and it is in one place. I don't have to keep going back and forth. I don't have to go to Secure Endpoint and ISE to get the data. I don't have to go to Intune on Microsoft to get the information. It is all in one place."
"Using SecureX, we can aggregate the data from all our security products, automate many of our tasks that we had to do manually before, save a huge amount of time, and provide many reports about usage of our systems and networks to our leaders and managers to show what we can do to make our security better."
"The automation part of the product is great."
"Splunk SOAR's quick response to incidents is the most valuable part."
"Compared to other products, Phantom seems to be easy to use and the ability to customize is high."
"The product provides 100% automation for certain processes."
"SOAR allows custom code to be written and integrates with various technologies through pre-built apps like Windows Remote Management or custom apps we can build ourselves like a secret retrieval app from our vault."
"When you design a playbook, you can integrate multiple log sources and define rules... After that, the platform automatically compiles all these activities and, based on the results, the analyst only has to indicate whether the result is a true or false positive. That reduces the time and effort involved."
"Splunk integrates with so many products. It provides us with good information for us to be able to do our jobs."
"The customizable playbook is the most valuable aspect of the solution."
 

Cons

"It is good that it provides information. However, I think that there needs to be more actionable items for us based on the information provided."
"The playbooks provided with the product are great, although I would appreciate having more playbooks available. Threats are constantly evolving, so having access to updated playbooks is crucial."
"They could expand into more areas."
"The documentation can be improved and the on-prem integration. The set of applications that it was integrated with wasn't comprehensive."
"If they could make the Cisco Umbrella piece a little bit more advanced or easier to manage, that would help. We use it for filtering and when you compare it to a normal content filter, it lacks some functionality."
"They could expand into more areas. The more third-parties that we have tied into it, the better. The capabilities are there. As they just continue to involve the product, the more things that you can look into, then the more analytics that you can get. Also, the more data that we can get, then the better off we will be."
"Enhancing automation capabilities could further improve the product."
"It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco."
"The scalability could be better."
"It would be nice if we could put it on other search heads, not just Enterprise Security."
"The algorithm and machine learning have room for improvement and can be more user-friendly."
"Splunk SOAR has room to improve its offering for small-sized customers. The price is not fair for smaller-sized customers."
"Splunk's support for integration is subpar and has room for improvement."
"The tool's response is slower because it has to search through a huge dataset, which can be improved for latency."
"Suppose I am initially granted user rights or analyst rights, but later on, I also get admin rights. SOAR is unable to amend the limitations of my role. I raised a support ticket with Splunk about this. They said it's a bug in their 5.3.5 version. To fix this, I had to reinstall the entire platform from scratch.."
"The number of playbooks on offer should be increased."
 

Pricing and Cost Advice

"It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco."
"Cisco SecureX is more expensive than Trend Micro. However, considering the integration capabilities with other solutions and the quality of technical support, I believe there's justification for the price difference."
"It is free. It can't get any better than that."
"The pricing is competitive, especially for education institutions. Licensing can be a little bit difficult to navigate, especially with resellers with Cisco, but for us it has been pretty easy."
"The product is absolutely free to any customer. As such, the only thing one must keep in mind is that as long as he already has one Cisco security product, irregardless of what that product is, SecureX is available for free."
"The pricing is the best part of this solution. It is free if you buy Umbrella or Duo Security. It is also a good solution."
"You can spend less money for another solution, but if you really want to have a good solution you have to pay. We are happy that we are getting such a good solution for what we are spending."
"For the value you get, the pricing of the solution is excellent."
"The licensing cost is reasonable."
"I found the price of Splunk SOAR to be good."
"Splunk SOAR is moderately priced, neither cheap nor overly expensive."
"In my opinion, the price is high, but if you want good products, you have to be willing to pay for them."
"The tool is not cheap."
"Splunk is a fast enterprise tool, but it costs too much. At the same time, it's worth what we pay, in my opinion. We can efficiently perform all the functions and tie together the data. It's the perfect tool for our needs."
"When we first purchased our Splunk SOAR license, it was based on an event-count model. It was based on the number of events. I had strong opinions at the time that automation should not be stifled by the amount of automation you can accomplish, so the previous structure was not as beneficial for us. Later that year, we got told or saw at a conference that they announced user-based pricing. We are now in a renewal period, so we migrated to a user-based license model, which is more appropriate for us so that we no longer have to worry about stifling our automation based on the quantity."
"I don't know the exact price, but for my region, it is very expensive."
report
Use our free recommendation engine to learn which Application Security Tools solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
11%
Marketing Services Firm
10%
Computer Software Company
10%
Outsourcing Company
9%
Financial Services Firm
12%
Manufacturing Company
10%
Computer Software Company
7%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise7
Large Enterprise3
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise7
Large Enterprise38
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Splunk Phantom?
My experience with pricing, setup cost, and licensing is that it is perfectly acceptable, helping us significantly with setup costs and licensing, and aiding in making approvals and assigning custo...
What needs improvement with Splunk Phantom?
From the improvement point of view regarding Splunk SOAR, I suggest including more types of LLM models such as autonomous AI models including Anthropic and Opus 4.6, as well as creating a playgroun...
What is your primary use case for Splunk Phantom?
The use cases that I work with mostly in Splunk SOAR include phishing email responses automation, where Splunk detects suspicious indicators such as the URL, IP, and geolocation from reputed VirusT...
 

Also Known As

Kenna.AppSec, Kenna.VI
Phantom
 

Overview

 

Sample Customers

NHS, Rackspace, UNC Pembroke, University of North Carolina at Charlotte, Missing Piece
Recorded Future, Blackstone
Find out what your peers are saying about SonarSource Sàrl, Checkmarx, Veracode and others in Application Security Tools. Updated: May 2026.
893,311 professionals have used our research since 2012.