Cloud Senior lead at a financial services firm with 10,001+ employees
Real User
Top 5
2025-02-03T12:20:00Z
Feb 3, 2025
I use Google SecOps for threat detection and hunting. It is primarily used for monitoring threats in real-time, and Google SecOps allows us to manage threats efficiently. When integrated with Mandiant, it enhances real-time threat detection capabilities.
Security Compliance Lead at a computer software company with 51-200 employees
Real User
Top 20
2024-03-04T14:20:00Z
Mar 4, 2024
Siemplify has streamlined various tasks such as configuring playbooks, integrations, and running reports. It helps automate security incident response processes through configuration setup and provides tools for fluid management. Siemplify, now part of Google Clinical SecOps, primarily focuses on security orchestration, automation, and response. It automates specific workflows, integrates with other systems like ITSMs, and facilitates ticket creation or email alerts for security events.
Siemplify is a core component of our SOC capabilities. We leverage the platform for orchestrating alerts and security events from different security tools and sources throughout client environments. We use it for automating responses and enrichments, and to improve security for all of our SOC Managed Detection and Response (MDR) clients based on analysis done for any of our other SOC MDR clients. We use it to facilitate workflows for alert triage and investigation. Finally, we use it for helping manage reporting and ticketing for our SOC MDR client environments.
Find out what your peers are saying about Google, Exabeam, Microsoft and others in Security Information and Event Management (SIEM). Updated: March 2025.
Security Information and Event Management (SIEM) tools offer comprehensive visibility and management of an organization’s security events through real-time analysis and correlation of data from multiple sources.
SIEM solutions provide a centralized platform for managing security alerts and logs from various sources such as network devices, servers, and applications. They help identify and mitigate potential threats by analyzing event data for unusual patterns and correlations. These tools...
I use Google SecOps for threat detection and hunting. It is primarily used for monitoring threats in real-time, and Google SecOps allows us to manage threats efficiently. When integrated with Mandiant, it enhances real-time threat detection capabilities.
Siemplify has streamlined various tasks such as configuring playbooks, integrations, and running reports. It helps automate security incident response processes through configuration setup and provides tools for fluid management. Siemplify, now part of Google Clinical SecOps, primarily focuses on security orchestration, automation, and response. It automates specific workflows, integrates with other systems like ITSMs, and facilitates ticket creation or email alerts for security events.
We use Siemplify for over 20 use cases.
Siemplify is a core component of our SOC capabilities. We leverage the platform for orchestrating alerts and security events from different security tools and sources throughout client environments. We use it for automating responses and enrichments, and to improve security for all of our SOC Managed Detection and Response (MDR) clients based on analysis done for any of our other SOC MDR clients. We use it to facilitate workflows for alert triage and investigation. Finally, we use it for helping manage reporting and ticketing for our SOC MDR client environments.