Try our new research platform with insights from 80,000+ expert users

Splunk SOAR vs VMware Carbon Black Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 28, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Torq
Sponsored
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
6
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (6th), AI-SOC (7th), AI-Powered Security Automation (2nd)
Splunk SOAR
Average Rating
8.0
Reviews Sentiment
6.5
Number of Reviews
54
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (2nd)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.7
Number of Reviews
64
Ranking in other categories
Endpoint Protection Platform (EPP) (38th), Security Incident Response (7th), Endpoint Detection and Response (EDR) (36th), Ransomware Protection (8th)
 

Mindshare comparison

Security Orchestration Automation and Response (SOAR) Market Share Distribution
ProductMarket Share (%)
Splunk SOAR8.0%
Microsoft Sentinel12.4%
Palo Alto Networks Cortex XSOAR9.0%
Other70.6%
Security Orchestration Automation and Response (SOAR)
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
VMware Carbon Black Endpoint1.8%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.7%
Other83.7%
Endpoint Protection Platform (EPP)
 

Featured Reviews

Nimrod Vardi - PeerSpot reviewer
Global IT Director at OpenWeb
Automation workflows have transformed our IT, enabling secure just-in-time access control
We work with them quite often, so we have a direct line regarding areas in Torq that have room for improvement. If we have a feature request, we can request it. I do not have anything in mind at the moment. We were a design partner for a short while, so we feel that they listen and that users of the system have an impact on the way the system is designed for the better. They have a new community, which is something that I personally suggested years ago. There are many people like me in different places and they might have already built the workflow that I need. Having the option to share workflows or to jump on a thread and say I have this need, did anyone ever build a workflow for it, is amazing. Someone would jump in and say yes, sure, here, take this workflow. I think this is an amazing thing and I really hope that the community will come alive because I think this is really powerful. This is something that I already suggested and it did happen eventually, and I am quite happy with it. I do not have any specific feature in mind that I have a need for at the moment.
SS
Manager cybersecurity at Hexion Inc.
Automates threat response and reduces investigation time but needs better threat intelligence integration
One thing that we would like to see with Splunk SOAR is the expandability to the threat intelligence feed. Currently, we have limited ingestion to the threat intelligence feed for the correlation purpose. We would like to see it being integrated, with license cost or without license cost, to leading threat intelligence sources such as Recorded Future, Feedly, or Flare. That is something we would appreciate having integrated. The second thing on the improvement side is about exposed credential-related information. If we start ingesting those data to Splunk SOAR or SIEM with some sort of integration with threat intelligence feed, that will also improve our detection and prediction method or help us with the investigation.
reviewer2689206 - PeerSpot reviewer
Senior VP, Technology & Leading Technology Office at a outsourcing company with 1,001-5,000 employees
Behavior analytics has strengthened threat prediction yet still needs to improve overall standing
Regarding the real-time monitoring feature with VMware Carbon Black Endpoint, it is helpful in addressing unseen threats. I find the behavior analysis feature beneficial. I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic. The behavior and analytics feature employs machine learning, and these are features which make the product and give that distinguishing, differentiating factor. The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance. Whenever this feature provides prediction, you know what action to take. You are aware of a possible attack and what kind of attack it may be, so you are much better prepared.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Any request that comes in, regardless of how complex it is, I can accomplish it with Torq."
"If I review about 100 vendors that I might work with, Torq is definitely in the top five that gave me personally investment back, just because every bit of effort I put into Torq eventually became a workflow that gave it back to me."
"As an analyst, it has demonstrated potential to reduce workforce requirements and time needed for related activities."
"Once I started to use the system and I saw the potential, it changed all of our work in IT."
"What I appreciate most about Torq is that it is an essential part of our system."
"Using that one piece of AI, we auto-closed 511 cases in quarter four alone."
"The automation part of the product is great."
"Before its use, analyzing each email would take at least 15 to 20 minutes, with some complex cases taking up to 30 minutes...With the automation provided by Splunk Phantom, we could significantly reduce the amount of time and human effort required to complete this task."
"Technical support is helpful."
"It has definitely saved a decent amount of time for our analysts so they can focus on other tasks."
"I like the integration capabilities of Phantom. It has a lot of integrations with other products. Its searching methodologies are also good. It is also easy to understand and easy to create playbooks."
"The product’s integration with other Splunk products is valuable."
"We are not a 24/7 SOC, so the most valuable feature of Splunk SOAR is the auto-response to threats when we are not in the office and the notifications that it sends to the on-call engineer."
"The benefits were immediate when we started using Mission Control Splunk SOAR over a year ago; it has made it easier for our analysts to work on alerts using playbooks and forward them."
"VMware Carbon Black Endpoint is a highly stable solution."
"This product has the capability of uploading scripts to the tool and this is a very comprehensive feature."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"For Carbon Black Endpoint, the possibility of integration with different other software's log servers is the important thing. Having just one point of view is more interesting so you don't need to go to different places to see all the information."
"The whole purpose of the product, like application control, is very good, and also if you need to update some policies, it works well and instantly."
"It is a stable solution...The initial setup of VMware Carbon Black Endpoint was easy."
"The most valuable asset is the time-lining capability for any breach activity."
"Once the solution is installed and configured correctly it does not require a lot of hands-on attention until you need upgrading."
 

Cons

"Regarding the pricing of Torq, I would say it is expensive."
"It was able to capture data but was unable to differentiate between the agent hostname we are using and the hostname that resides on the back end of the Internet."
"Even now, we have workflows that are in production that use AI steps and I get different results, making it unusable to some degree."
"The initial deployment of Torq was not easy."
"Regarding stability, I have noticed some lagging, crashing, and downtime, which is one of my largest gripes."
"We've had trouble implementing the solution with Microsoft products. There seems to be an integration gap."
"The scalability could be better."
"Improving the integration ecosystem can raise the quality of the bottom tier of the integrations so that they can work better out of the box."
"While I appreciate Splunk SOAR, there are areas for improvement, notably regarding the CI/CD pipeline for playbook lifecycle management, as transitioning playbooks from development to production currently feels cumbersome and requires more manual effort than I would prefer."
"The dashboard could be improved and some other features. SOAR should integrate network capabilities, allowing us to also monitor the WLAN network. Splunk is also expensive and difficult for beginners to learn. It's hard for a new user to figure out how to visualize old threat data. It took two to three months to learn with hands-on experience how to use the dashboard, visualize events, and analyze threats."
"There are areas where Splunk SOAR can continue to improve, particularly regarding the synchronization of information, as sometimes it takes longer than other tools."
"They should integrate Splunk Enterprise Security better into Splunk Cloud."
"It would be ideal if we could automate processes even more."
"The device control feature could also be compatible with the user’s profile as well."
"The local technical support is very poor, but the support from headquarters is very nice."
"I would like to see the user credentials feature improved. I would also like to see more reporting features and better ways to roll the reports out."
"In the past, we've seen some stability issues in the latest version releases. We tend to hang back one version just to make sure issues are fully resolved to avoid user disruption."
"There's some disparity between the on-premise and the cloud type of application."
"The GUI and reporting should be addressed and the product's administration features need fine tuning."
"Occasionally, we'll have issues with the latest version and they'll basically tell us that they will improve it in the next iteration. They need to work on their version release quality."
"A search bar in the investigation page and some AI-related tasks like outgoing alerts, or recent tactics that are being used in the market, must be embedded in the tool so that it's easier to find alerts."
 

Pricing and Cost Advice

Information not available
"When we first purchased our Splunk SOAR license, it was based on an event-count model. It was based on the number of events. I had strong opinions at the time that automation should not be stifled by the amount of automation you can accomplish, so the previous structure was not as beneficial for us. Later that year, we got told or saw at a conference that they announced user-based pricing. We are now in a renewal period, so we migrated to a user-based license model, which is more appropriate for us so that we no longer have to worry about stifling our automation based on the quantity."
"The tool is not cheap."
"The licensing cost is reasonable."
"Splunk SOAR is more expensive compared to other options for SOAR."
"The cost is high and the licensing is on an annual basis."
"I found the price of Splunk SOAR to be good."
"Splunk SOAR is an expensive solution for an organization of our size."
"Splunk SOAR is moderately priced, neither cheap nor overly expensive."
"We have branches, we have different companies, but we cannot buy less than 100 licenses. This does not make sense to me... It should be more flexible. I can understand their saying, "Okay, to be a customer you need 100," but to add on to that number it should be something very straightforward. If I need to add five, for example, I shouldn't need to add 100."
"The license is annual. It's a standard license."
"The solution has almost the same price as other different kinds of infrastructures, but it offers a lot of different features."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"The pricing is very high."
"The licensing cost is on the more expensive side, but I thought it was worth it because they did a good job. It was one of the vendors I truly didn't have to worry about too much until this latest upgrade."
"Its pricing was very good, which is one of the reasons I went to it as an alternative. It is on a yearly basis. There are no additional fees."
"Overall, it was cost-effective too."
report
Use our free recommendation engine to learn which Security Orchestration Automation and Response (SOAR) solutions are best for your needs.
882,606 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Comms Service Provider
8%
Manufacturing Company
8%
Computer Software Company
7%
Financial Services Firm
11%
Manufacturing Company
10%
Computer Software Company
9%
University
7%
Financial Services Firm
11%
Government
9%
Manufacturing Company
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Midsize Enterprise3
Large Enterprise4
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise7
Large Enterprise34
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise31
 

Questions from the Community

What needs improvement with Torq?
We do not utilize the AI features that much. When it comes to general AI features of Torq, we are just slowly startin...
What is your primary use case for Torq?
Torq markets itself as a security tool, and we do use them for security, but not in the traditional sense they market...
What advice do you have for others considering Torq?
I would rate Torq an eight overall. I feel that Torq is as good as the effort you put into it. The limitations are ve...
What do you like most about Splunk Phantom?
Splunk SOAR's quick response to incidents is the most valuable part.
What is your experience regarding pricing and costs for Splunk Phantom?
I am familiar with the pricing aspect, setup cost, and licensing cost of Splunk SOAR, and it is pretty much similar t...
What needs improvement with Splunk Phantom?
There are areas for improvement in Splunk SOAR, such as the need for more code-level customizations despite providing...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) s...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoin...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Phantom
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Information Not Available
Recorded Future, Blackstone
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Microsoft, Splunk, Palo Alto Networks and others in Security Orchestration Automation and Response (SOAR). Updated: January 2026.
882,606 professionals have used our research since 2012.