Security Compliance Lead at a computer software company with 51-200 employees
Real User
Top 20
2024-03-04T14:20:00Z
Mar 4, 2024
Siemplify has streamlined various tasks such as configuring playbooks, integrations, and running reports. It helps automate security incident response processes through configuration setup and provides tools for fluid management. Siemplify, now part of Google Clinical SecOps, primarily focuses on security orchestration, automation, and response. It automates specific workflows, integrates with other systems like ITSMs, and facilitates ticket creation or email alerts for security events.
Siemplify is a core component of our SOC capabilities. We leverage the platform for orchestrating alerts and security events from different security tools and sources throughout client environments. We use it for automating responses and enrichments, and to improve security for all of our SOC Managed Detection and Response (MDR) clients based on analysis done for any of our other SOC MDR clients. We use it to facilitate workflows for alert triage and investigation. Finally, we use it for helping manage reporting and ticketing for our SOC MDR client environments.
Find out what your peers are saying about Google, Exabeam, Trellix and others in Security Information and Event Management (SIEM). Updated: November 2024.
Siemplify has streamlined various tasks such as configuring playbooks, integrations, and running reports. It helps automate security incident response processes through configuration setup and provides tools for fluid management. Siemplify, now part of Google Clinical SecOps, primarily focuses on security orchestration, automation, and response. It automates specific workflows, integrates with other systems like ITSMs, and facilitates ticket creation or email alerts for security events.
We use Siemplify for over 20 use cases.
Siemplify is a core component of our SOC capabilities. We leverage the platform for orchestrating alerts and security events from different security tools and sources throughout client environments. We use it for automating responses and enrichments, and to improve security for all of our SOC Managed Detection and Response (MDR) clients based on analysis done for any of our other SOC MDR clients. We use it to facilitate workflows for alert triage and investigation. Finally, we use it for helping manage reporting and ticketing for our SOC MDR client environments.