AIMultiple ResearchAIMultiple ResearchAIMultiple Research
GenAIAgentic AISOAR
Updated on May 2, 2025

AI in SOAR: AI Analytics vs GenAI vs Agents in 2025

Headshot of Cem Dilmegani
MailLinkedinX

AI capabilities in security orchestration, automation, and response (SOAR) aim to automate security operations centers (SOCs), reducing human tasks and increasing efficiency. Several types or subsets (e.g. machine learning) of AI are employed in the SOC. Three of the most prevalent applications are outlined below:

  • Gen 1 (mid-2010s) – AI analytics: Around 2015, the first SOAR tools began incorporating AI capabilities, particularly for analytics. These early platforms broadly fit the definition of artificial intelligence and used machine learning to make statistical analyses for:
    • Identifying patterns
    • Detecting anomalies in threats
  • Gen 2 (2020-2023) – GenAI: SOAR with GenAI machine learning capabilities developed in 2020, and widespread deployment began in 2023. These tools had AI-driven no-code interfaces that allowed analysts to make conversational commands via chatbots & co-pilots for:
    • Querying systems
    • Searching logs or escalating incidents
    • Triggering incident response
    • Generating reports
  • Gen 3 (2023-to date) – AI agentsAI agents in cybersecurity started appearing in the market in 2023. These solutions offer a proactive approach to automating tasks and producing complete work units without human intervention. They offer incident response AI agents and can be used in several SOAR use cases, including:
    • Tier 1 (Initial Threat Identification): Automating triage and investigation.
    • Tier 2 (Action-Based): Isolating affected systems and removing malware.

Last Updated at 02-20-2025
AspectAI AnalyticsGenAIAI Agents
ApproachData-driven, pattern recognitionReactive, content and report generationProactive, autonomous decision-making
Decision-MakingAnalyzes data, identifies trends, and provides insightsSuggests actions, data-driven analysisExecutes actions based on workflows
Human InvolvementHigh human oversight needed for deeper insights

High human oversight needed

Minimal human oversight required
ActionsGenerates insights, predictions, visualizationsGenerates alerts and reports

Automates responses

AI in SOAR: Leading vendors and tools

Some SOAR vendors offering GenAI tools (Securonix, Splunk Enterprise, Exabeam) initially offered products only with AI analytics. Later, they incorporated GenAI tools into newer versions. These tools include Securonix EON, Splunk AI Assistant, and Exabeam Copilot.

Gen 1 (mid-2010s): AI analytics in SOAR

Early SOAR platforms used AI capabilities to optimize analytics, leveraging machine learning algorithms for statistical analysis, behavioral modeling, and anomaly detection. 

The primary focus was on threat intelligence & hunting, improving the ability to identify threats more efficiently than traditional rule-based systems. These platforms had static playbooks, implementations (which often required coding), and significant maintenance requirements. 

  • What it does for the security operations center (SOC): Detect potential threats.
  • When it is used: Pre-detection stage.

Use cases of AI analytics in SOAR applications 

Most companies utilize machine learning analytics in SOAR applications for fundamental use cases such as user Behavior Analytics (UBA), phishing attack detection, and credential stuffing detection.

Some companies used them beyond simple use cases, such as:

  • Threat intelligence and correlation 
  • Initial triage of security alerts 
  • Sending automated alerts

1. User behavior analytics (UBA)

AI-driven analytics in SOAR leverage machine learning to analyze user activity patterns to identify deviations that could indicate malicious behavior or compromised accounts. By continuously monitoring user behavior, it can flag abnormal activities, such as:

  • Accessing restricted areas
  • Logging in at unusual hours
  • Accessing sensitive data

Real-life case study: Bank One uses Darktrace’s AI-driven user behavior analytics (UBA)

Bank One leverages Darktrace to detect anomalous activity in email communications. Darktrace analyzes user interaction patterns with emails and identifies deviations from normal behavior to detect phishing and impersonation attempts.1

2. Phishing attack detection

AI-driven analytics in SOAR can evaluate incoming emails for known phishing characteristics, such as:

  • Suspicious links
  • Unusual attachments
  • Malicious domain names

Real-life case study: Barracuda Networks uses AI analytics for phishing attack detection

Calgon Carbon, an industrial manufacturing company, leverages AI analytics in SOAR for phishing attack detection. The company analyzes logs from various sources to identify suspicious patterns associated with phishing attacks, such as unusual login attempts or unauthorized access.2

3. Credential stuffing detection

AI-driven analytics in SOAR can be used in credential stuffing detection to identify suspicious login patterns like:

  •  Rapid failed login attempts from different locations
  •  Unusual IP addresses, or a high volume of logins within a short time frame

This lets security teams quickly investigate and take necessary actions, like account lockouts or further verification steps. 

Real-life case study: Canadian food chain prevents credential stuffing 

Canada’s largest retail pizza chain uses machine learning to automatically detect attacks, eliminating the need for analysts to manually identify and piece together signs of an impending threat.3

Last Updated at 02-20-2025
ProsCons
Effective in identifying unknown threatsCreates manual work due to the volume of alerts
Improved automation of tasks like data collection and alert triageLacks decision-making capabilities for fully automated incident response
Enhanced anomaly detection with machine learningRelies on human intervention for complex decision-making
Increased detection accuracy through AI analyticsLimited scalability in handling high-volume, complex incidents

Example vendors

AI analytics tools: Early-stage SOAR vendors (AI analytics tools) laid the foundation for more autonomous tools, which would evolve to incorporate generative AI (genAI)

  • Abnormal Security: Offers AI-powered email security solutions, focusing on phishing and email anomaly detection.
  • Darktrace: Leverages machine learning and AI analytics to detect cyber threats by analyzing network traffic and other data points.

SOAR tools (with embedded AI analytics):

  • Securonix: Securonix initially introduced AI-powered analytics for behavioral analysis and threat detection, and launched the AI assistant Securonix EON in 2024.
  • Exabeam: In 2015, Exabeam launched its platform with AI-driven user behavior intelligence tools, then added GenAI capabilities to its platform with Exabeam Copilot in 2025.
  • Splunk Enterprise: In 2018, Splunk began offering AI analytics with Splunk Enterprise 7.1  to identify threats through statistical models and correlation.  In 2023, Splunk released Splunk AI Assistant.

Gen 2 (2020-2023): GenAI in SOAR

Gen 2 SOAR platforms with GenAI capabilities improved workflow efficiency by allowing analysts to interact with systems using natural language via chatbots, and a co-pilot is a helper tool, often with a chatbot interface built on top of a large language model, that quickly accesses relevant information and receives guidance on the best course of action. 

These platforms offer no-code, drag-and-drop editors and extensive playbook libraries,  helping to automate multi-step workflow execution

  • What it does for the security operations center (SOC): Assists analysts with their tasks in the security operations center.
  • When it is used: Typically used in the post-detection stage to aid in further analysis and decision-making.

Use cases of GenAI in SOAR applications

1. Initial triage of security alerts

GenA in SOAR querying systems searching logs, network traffic, and related events. It extracts key details, such as:

  • Attack vector (e.g., email phishing).
  • Affected systems (e.g., servers, endpoints, or user devices).
  • Potential impact (e.g., data loss, unauthorized access).

Based on its analysis, it assigns an incident severity score based on the threat’s potential impact. 

Real-life case study: Blackstone automates initial triage of security alerts

Blackstone uses its SOAR platform for the initial malware triage, integrating it with their security infrastructure. When an email malware alert is received, the SOAR platform automatically activates its playbook, which begins by querying the security information and event management (SIEM) system for relevant data. This included extracting key email details such as:

  • The recipients of the email.
  • Their associated business group, title, and location are from Active Directory.

This context helps analysts prioritize alerts based on the recipient’s role, and their potential impact, reducing the risk of oversight.4

2. Threat intelligence with data correlation

GenAI in SOAR can correlate information from various sources b:

  • Ingesting large volumes of security data from various sources, including SIEM, threat intelligence, and endpoint data
  • Using machine learning or deep learning algorithms) analyze the data to correlate data points

Real-life case study: Global retailer correlates threat data from multiple sources

A global retailer uses a SOAR platform with GenAI capabilities to correlate threat intelligence from various security tools to provide incident data and automate response workflows.5

3. Alert generation and response

Once a threat is identified, GenAI in SOAR can:

Automated Alerting: Trigger automated alerts to security teams with relevant context, enabling them to assess and respond quickly.

Automated Response: Based on predefined workflows, initiate responses, such as:

  • Blocking a malicious IP or user account
  • Isolating an infected endpoint

Note that GenAI relies heavily on data correlation and pattern recognition. Its decision-making process is based on historical data and statistical analysis to respond to threats. It is less proactive compared to agentic AI models.

4. Automatically generate reports

GenAI in SOAR can autonomously generate comprehensive incident reports from the logs, including:

  • A description of the incident
  • Time and date of occurrence
  • Affected components or services
  • Potential causes based on historical data
  • Suggested remedial actions

Real-life case study: HCL streamlines security operations with automated report generation

HCL Technologies leverages ManageEngine’s Log360 SOAR tool for log management and reporting. The platform automatically transfers logs from various sources to a central repository where they are parsed, indexed, and analyzed to generate detailed reports.6

5. Predictive recommendations

GenAI in SOAR platforms helps analysts by suggesting actions for handling security incidents based on alert and log analysis. It can recommend steps for containment, remediation, or further investigation, making it easier for analysts to decide how to respond.

Real-life case study: PSCU reduces downtime with predictive SOAR insights

PSCU, the largest credit union service organization in the United States, leverages Splunk Enterprise (along with their natively integrated SOAR capabilities) to receive predictive insights related to IT operations, security events, and system health monitoring.7

6. Natural language interaction (chatbots)

With Gen AI-driven SOAR tools, analysts started interacting with the SOAR platform using conversational AI (chatbots) instead of manually navigating complex dashboards or code scripts.

Real-life case study: IBM Security SOAR offers a chatbot for incident response

IBM Security SOAR has integrated its Watson AI assistant with genAI capabilities to allow analysts to interact with the platform using natural language commands.

Instead of manually sorting through security alerts and triaging them one by one, analysts can simply type a command like “Analyze last 24 hours of alerts for high-priority threats”.8

7. Use drag-and-drop & no-code editors

GenAI in SOAR tools enables no-code, drag-and-drop interfaces for building and automating incident response playbooks. These interfaces help non-technical users create and customize their automation workflows, significantly reducing reliance on specialized security engineers.

Real-life case study: Jams uses playbook automation & no-code editors

Jamf, an IT services company specializing in solutions for the Apple environment, dramatically improved its security operations with Tines’ SOAR platform. By leveraging Tines’ drag-and-drop interface, Jamf’s non-technical analysts could streamline their phishing response without requiring any coding expertise.

Key impacts:

  • Workflow build time was reduced by 95%, from a week to just one or two hours.
  • In the first month alone, the team saved 150 person-hours.
  • They expanded automation to 4x more team members, enhancing cross-functional collaboration and speeding up the development of security processes.9
Last Updated at 02-20-2025
ProsCons
Effective when the user knows technical details about what what to askUsers need to know what questions to ask
Enables natural language access to informationNot ideal for junior analysts
Boosts productivity for senior analystsResults require interpretation and action by the user
Effective for tasks like threat huntingAnalyst still needs to do time-consuming work

Example vendors

SOAR tools with genAI capabilities were developed in 2020, and widespread deployment began in 2023.

  • ManageEngine AI Assistant Widget: Still in development phase. Streamlines request analysis by integrating multiple AI providers directly into the request details page. It supports three AI providers: Google’s Gemini (online), OpenAI’s GPT-4 (online), and Ollama (local LLMs).
  • Microsoft Security Co-pilot: Automates threat investigation, provides contextual insights, and prioritizes incidents based on severity. Analysts interact with the platform via natural language to receive insights on attack vectors, impacted systems, and recommended remediation steps.
  • SentinelOne Purple AI: Offers a co-pilot functionality that facilitates the automation of complex workflows, such as isolating compromised systems or triggering additional scans.
  • Splunk’s AI Assistant: An AI chatbot that offers a chat experience to help you translate a natural language prompt into a Splunk query that you can execute. It is Splunk’s first offering powered by generative AI, released in 2023.

Gen 3 (2023-to date): AI agents in SOAR

AI agents in SOAR operations function as autonomous decision-makers capable of monitoring networks and analyzing data. 

  • What does it do for the security operations center (SOC): Increases SOC productivity by automating significant portions of work.
  • When does it happen: Post-detection, performing analysis, and decision-making previously handled by human SOC analysts.

AI agents offer a more proactive and autonomous approach than genAI, for example:

  • A GenAI-based system might generate incident reports, draft response strategies, or create summaries from raw data and events.
  • An Agentic AI system could block a malicious IP, isolate a compromised endpoint, or enforce security policies automatically without human oversight.

Use cases of AI agents in SOAR applications

1. Automated triage and investigation

Agentic AI agents can identify security alerts before they reach human analysts. Unlike genAI, these systems can fully automate triage and investigation operations by mimicking human SOC routines and decision-making, performing tasks such as:

Alert deduplication: Automatically filters out duplicate alerts to reduce system noise.

Alert grouping: Groups-related alerts based on impacted assets (e.g., endpoints, servers) for better analysis.

Alert enrichment: Adds valuable context to alerts, including:

  • IOC Enrichment: Cross-references IPs and file hashes with threat databases for further insight.
  • Machine enrichment: Provides system-specific data like OS version and patch status.
  • Account enrichment: Gathers user-specific data, such as login activity and privileges, to add depth to alerts.

2. Automated response execution

AI agents can automatically apply predefined security policies, such as blocking an infected endpoint or disabling a compromised user account.

Isolating compromised endpoints: Disconnecting infected devices from the network to prevent further spread.

Blocking malicious IP addresses: Adding identified malicious IPs to a firewall blacklist to prevent connections.

Quarantining malicious files
: Moving suspicious or infected files to a secure, isolated location for analysis.

Disabling compromised user accounts: Suspending accounts exhibiting abnormal behavior to prevent unauthorized access.

3. Adaptive threat hunting

Unlike GenAI, which is typically reactive and generates insights or suggestions based on historical data, Agentic AI can adapt and respond to evolving threats in real-time by:

Decomposing alerts: Classifying indicators into:

  • Basic elements like IPs, domains, emails, and file hashes.
  • Data-derived information, like malware size or encoded strings.

Searching basic elements and data-derived information: Creating queries to retrieve data on basic elements (like IP addresses) and data-derived information (such as malware file sizes) from SIEMs and other security tools.

Analyzing behavior: Connecting behavioral indicators with frameworks like MITRE ATT&CK to map network activity and search historical data across connected systems.

4. Automated policy enforcement

Based on new regulatory changes or internal security policies, AI agents update policies and continuously enforce them across systems without manual intervention by:

Continuously monitoring systems for compliance with regulatory controls: (e.g., GDPR data retention, HIPAA access rules).

Alerting and remediating policy violations: (e.g., a user accessing sensitive data without the proper credentials).

Enforce security policies:

  • Restricting unauthorized access
  • Ensuring encryption,
  • Applying data classification rules.

Leveraging adaptive policy authentication: Enforces multi-factor authentication (MFA) or additional authentication checks when suspicious activities or risk factors are detected.

5. Generating real-time reports 

AI agents use past incident data to incorporate lessons learned into the organization’s knowledge base for better incident reporting.

Agents can automatically update dashboards with real-time metrics and generate incident summary reports by:

 Impact assessment:

  • Automated incident timeline creation: Generating a timeline of key events, including attack detection, compromise points, and resolution.
  • Data enrichment for reporting: Cross-referencing indicators of compromise (IOCs) with known threat actors for deeper analysis.

Data enrichment and analysis:

  • Automated impact assessment: Assessing incident impact by measuring system uptime, identifying affected endpoints, and detecting data exfiltration.
  • Action effectiveness evaluation: Reviewing triggered responses and correlating actions with outcomes to evaluate the effectiveness of automated responses.
Last Updated at 02-20-2025
ProsCons
Delivers tasks by replicating analyst workflows and decision-makingNot widely available
Automates processes without the need for playbooks or manual maintenanceCapabilities still evolving, prone to false/positives
May include AI analytics and chatbot/co-pilot capabilities

What is agentic AI?

Agentic AI refers to autonomous artificial intelligence systems that can perceive their surroundings, make decisions, and perform tasks. Unlike traditional rule-based automation, agentic AI adapts dynamically, optimizing methods based on real-time inputs.

Key features of agentic AI:

  • Autonomy: Operates independently without constant human intervention.
  • Goal-oriented behavior: Utilizes reaching particular objectives with minimum prompting.
  • Context awareness: Uses environmental information to make informed decisions.
  • Learning and Adaptation: Continuously evolves by learning from results.

In cybersecurity, this involves transitioning from reactive systems to proactive defensive mechanisms capable of mitigating threats before they escalate.

What is SOAR (security orchestration, automation, and response)?

SOAR (security orchestration, automation, and response) is a collection of compatible software applications that allows an organization to collect data on cybersecurity risks and respond to security events with little or no human intervention. Implementing a SOAR platform increases the efficiency of physical and digital security operations.

SOAR platforms include three main parts: security orchestration, security automation, and security response. 

1. Security orchestration

“Security orchestration” refers to how SOAR platforms integrate and coordinate the hardware and software components in a company’s security system. Examples of connected systems:

  • Vulnerability scanners
  • Endpoint protection products
  • User and entity behavior analytics
  • Firewalls
  • Intrusion detection and prevention systems (IDS/IPS)
  • Security information and event management (SIEM) platforms
  • Other third-party sources

2. Security automation

SOAR security solutions automate repetitive tasks like opening support tickets, event enrichment, and alert prioritization. They can also trigger actions from integrated security tools, streamlining complex security operations. 

For example, when an endpoint detection and response (EDR) system detects suspicious activity on a laptop:

  1. The SOAR platform triggers a playbook.
  2. The playbook opens an incident ticket, 
  3. The playbook enriches the alert with data from threat intelligence feeds and executes automated responses, such as isolating the infected endpoints.
  4. SOAR integrates with ticketing management systems to send a ticket to a security analyst for final resolution or further action.

3. Security response.

Security analysts may utilize SOARs to investigate and resolve events without switching between tools. SOARs, like threat intelligence systems, collect data and alerts from external feeds and combine them into a centralized dashboard. Analysts may combine data from many sources, filter out false positives, prioritize warnings, and identify the threats they are dealing with. Then, analysts can respond by activating the necessary playbooks.

Share This Article
MailLinkedinX
Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 55% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE and NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and resources that referenced AIMultiple.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.
Mert Palazoglu is an industry analyst at AIMultiple focused on customer service and network security with a few years of experience. He holds a bachelor's degree in management.

Next to Read

Comments

Your email address will not be published. All fields are required.

0 Comments