We just raised a $30M Series A: Read our story

Top 8 IT Alerting and Incident Management Tools

PagerDutyEverbridge IT AlertingBigPandaxMatters IT ManagementOpsgenieVictorOpsSend Word NowFortiMonitor
  1. leader badge
    It reduces the amount of white noise. If something comes through, then it will alert somebody. However, if it's a bit of white noise that comes through at night, then it gets dealt with the next day. Everything is visible to everybody. It's not just a single person getting an SMS, then going, "Oh, I'm not going to worry about that." The visibility to everybody on the team is one of the great things about it because it reduces the white noise.
  2. leader badge
    The post mortem reports are descriptive, indicating who joined the call and when. A robust solution with multiple modules that can be leveraged.
  3. Find out what your peers are saying about PagerDuty, Everbridge, BigPanda and others in IT Alerting and Incident Management. Updated: October 2021.
    543,089 professionals have used our research since 2012.
  4. BigPanda integrates well with other solutions, such as WatchGuard,The main thing that we like about BigPanda is the user interface.
  5. The automatic logging that's built into xMatters, especially the timeline of events, is very helpful because we can figure out why a particular person got a call... Having that level of detail built-in makes it really easy for me or the managers to prove that's what happened, and we can self-serve that information. It gives people the autonomy to know why they got a call.
  6. The integration feature is the most valuable. It provides a lot of customizations for the integrations we use. OpsGenie has many features, such as email notification, SMS notification, roster, tracking of the tickets. Automation, like scripting, is also possible. There are also features for maintaining the history of the tickets and all the solutions related to how it was resolved previously. If there are similar kinds of tickets, we can look at how a person is working on that ticket. If he doesn't have any idea, you can look back at a similar ticket and solve it as the previous person did it.
  7. Transmogrifier and automatic solution report gives me a report with the solution and the way to solve issues when an error occurred.
  8. report
    Use our free recommendation engine to learn which IT Alerting and Incident Management solutions are best for your needs.
    543,089 professionals have used our research since 2012.
  9. The placeholder dropdowns for message templates are useful.​It allows for a systematic and uniform method of alerting personnel in every location.​

Advice From The Community

Read answers to top IT Alerting and Incident Management questions. 543,089 professionals have gotten help from our community of experts.
Hi dear community, Can you explain what an incident response playbook is and the role it plays in SOAR? How do you build an incident response playbook?  Do SOAR solutions come with a pre-defined playbook as a starting point?
author avatarMaged Magdy
Real User


what an incident response playbook? 

Incident Response Playbook is the guide lines and group of processes, policies, plans, and procedures, along with appropriate oversight of response activities, that  the organization should take to make a proactive response, quick containment, effective remediation and action plan with "what if" scenario in case of certain cyber incident has taken place.

How do you build an incident response playbook?

Regarding to NIST, to build an Incident Response Playbook you need to design the process which contains 4 main phases:

1- Prepare.

2- Detect and Analyze.

3- Contain, Eradicate and Recover.

4- Post-Incident Handling.

*reference, NIST Computer Security Incident Handling Guide:


*reference, SANS Incident Handler's Handbook:


Do SOAR solutions come with a pre-defined playbook as a starting point?

- Sure, most of SOAR solutions today comes with predefined templates. However, it's a double-bladed weapon based on Cyber Security Awareness and maturity level of the organization. If it's implemented with no or low maturity level, it may harm the organization production and utilize the resources improperly.


author avatarDavid Swift
Real User

Incident Response playbooks detail how to act when a threat or incident occurs. PICERL - Preparation, Identification, Containment, Eradication, Remediation, Lessons Learned (From SANS).  The playbook outlines what to do at each stage.

Typical SOAR playbooks automate the response to detected threats.

- Create a Ticket to Track the Incident

- Identify the source and target

- Confirm the attack is suspicious (SOC Analyst Lookup, On known blacklist? other events?)

- Contain or Clean the Host (EDR, Patch, Update AV...)

- Block the Known Attacker (on a Firewall, IDS, etc...)

- Disable a Compromised Account

- Notify anyone necessary 

SOAR actions include scripts to set or fire off actions on devices.

A playbook usually has a series of actions when a threat/incident is detected.

Most SOARs include playbooks, but they have to be tailored and customized to the specific devices you have in your environment (Palo Alto Firewall vs. Checkpoint, Cylance vs. McAfee EPO...), Ticketing System integration, SIEM/UEBA threat detection integration...

author avatarRobert Cheruiyot

Hi Rony, 

Playbook automates the gathering of threat intelligence from a myriad of sources of threat intelligence. Playbooks ingest alerts from tools like SIEM and scan the alerts against the threat intelligence sources like VirusTotal and others in order to get information related to the alert. Playbook for example can scan suspicious domains /IPs against virus total and provide reputation score of the domain/IP.

Depending on the workflow, the playbook may be configured to close a case if it's a false positive or pass the case together with threat intelligence gathered to SOC Analyst for further investigation. This way the playbook will reduce time spent on false-positive alerts. Also saves time for analysts by automatically gathering threat intelligence instead of analysts doing that manually. 

Be careful of cases where you set alerts to be automatically closed though. You can try this on some community editions soar platforms: Splunk phantom, SIEMplify ...

Building a playbook

Magdy has provided perfect industry standards for building playbooks. Just a little, the playbook mainly has actions and decisions. Actions: take an action against an alert (like scanning) and based on the results playbook decides what to do with the results: whether to close, do further scanning using other tools, pass it to the SOC analyst and this really depends on your workflow.

I am a junior but I love this SOAR thing.

author avatarSimon Thornton
Real User

For a given incident type, it describes a series of actions that can be a mixture of automated and manual steps. When you start, the steps are often manual. As the playbook and confidence in the steps improve, you can start automating.

For example a playbook for a “suspicious email” might read as:

1) check if the case is already opened for this user and/or asset, if yes go to step 3open case

2) open case and record details

3) extract suspicious attachment

4) generate MD5 and SHA256 hashes

5) submit hashes to Virustotal and record results

6) if 50% (pick your threshold) of AV engines detect the sample skip to step 10

7) forward email attachment to sandbox

8) does a sandbox report indicate suspicious behavior? If yes escalate to T3

9) inform the user

10) open a ticket to IT to re-template PC or fix

11) when you receive a response from IT about the ticket, then close a SOC ticket with relevant closure details

This is a quick illustration of what steps should be included depending on your environment and how far you go. 

Each step could be related to different teams.

IT Alerting and Incident Management Articles

Netanya Carmi
Content Manager
IT Central Station
Oct 14 2021
We receive alerts all day long - alerts about emails, incoming Whatsapps and SMSes, posts on social media, etc. At some point we become desensitized to these alerts and stop noticing them anymore - a phenomenon known as “alert fatigue.” Seventy percent of a SOC analyst’s workday is spent dealing… (more)

We receive alerts all day long - alerts about emails, incoming Whatsapps and SMSes, posts on social media, etc. At some point we become desensitized to these alerts and stop noticing them anymore - a phenomenon known as “alert fatigue.” Seventy percent of a SOC analyst’s workday is spent dealing with alerts, so SOC analysts are more at risk for alert fatigue than pretty much anyone else.

SOC analyst and IT Central Station user Geofrey M. says that he receives more than 20,000 alerts a week - and 60% of these are deemed critical. With numbers like these, alerts can easily start piling up and don’t always get dealt with in a timely manner - or sometimes at all - leaving what may be important issues to fall through the cracks.

Alert fatigue can be harmful to your business for a number of reasons. These include:

  1. Ignored alerts - Obviously, when alerts get missed due to alert fatigue, this can lead to damaged customer relationships and overall devastation to your business.
  2. Wasted time - The more time your team spends responding to alerts that are not necessarily critical, the less time they spend doing the other critical tasks they are being paid to do.
  3. Employee burnout - Your staff may, in fact, manage to resolve most of the significant alerts and therefore your customers may not be directly impacted. But the fact remains that the more alerts your employees receive and have to deal with, the less productive they will be.
  4. Psychological effects - The more alerts SOC analysts receive, the more reason they have for concern. Fear that they may have missed something can slow down releases, ultimately impacting customers.

Some of these factors, like the number of alerts that get missed or the amount of wasted time, can be measured. In his article, “Alert Fatigue – A Practical Guide to Managing Alerts,” Itiel Schwartz writes that psychological ramifications, such as how burned out your staff gets, cannot. But in response to his article, Reddit user SU1PHR disagrees, stating that just because there is no quantitative way to measure employee burnout does not mean it can’t be measured. He suggests monitoring employee retention rates and one-to-one meetings at which managers can routinely receive feedback on how their employees are managing. He warns that not doing so can cause “a deadly spiral that will lead to more fatigue, more errors and more missed alerts.”

Several other Reddit users on the same thread mentioned that at their places of employment, alerts get saved and fed into business analytics tools but that, other than being able to say “we are collecting the data,” nothing else ever gets done with them.

So what can be done to minimize alert fatigue and help SOC analysts stay on top of everything that needs to get done?

First of all, it’s important to minimize human error whenever possible. Sometimes engineers inadvertently create a code malfunction or an alert isn’t calibrated properly. Putting better organizational processes in place can help ensure that the people involved in setting the alerts do so appropriately.

But it’s best, when feasible, to remove the human element altogether. This is why IT Central Station user Tshepiso M. points out that it is important to automate wherever possible. Using technology to sort alerts by importance can help ensure peace of mind in your staff by taking some of the burden off of them. The less your employees feel responsible for keeping track of and dealing with alerts, the less you’ll have to worry about psychological effects such as burnout or fear of failure.

One way to increase efficiency, as Geofrey M. points out, is by implementing a SIEM solution. Security information and event management (SIEM) solutions can help prevent alert fatigue by streamlining security. Part of the problem with alerts is the amount of sources from which they originate. Organizations are constantly adding more tools, which makes IT environments increasingly complex. A SIEM solution can become your primary security monitoring tool by consolidating the data streams and integrating unique data sources. It can also take security data from a variety of systems and analyze them, putting them all into context and gleaning new insights from one centralized location.

Every organization is different, and a SIEM allows you to adapt and build your own nuances into the security alert process for your business. When you are considering deploying a SIEM solution, keep the following things in mind in order to ensure that you are only receiving the notifications you actually need.

  • Consider context - Rather than setting the same alerts for each new asset, take the time to think through each asset’s function and role within the wider context of the environment and adjust the defaults and settings accordingly. This allows for proper prioritization and allows the number of notifications to be reduced significantly.
  • Limit who will receive what alerts - Without a SIEM, every single alert may be sent out to every single admin. But this is rarely necessary. A SIEM will allow you to have different staff members alerted depending on the event or the operating system affected. This reduces redundancy and prevents a buildup of excess alerts over time.
  • Revisit and readjust - Make changes as you go. If your initial configuration leaves you getting alerts you don’t need, you can always lower the priority or filter it out altogether. SIEMs allow you the flexibility to change your settings as needed, maximizing the capabilities of your security tools and freeing up your security team to be available when they are really needed.


Putting better organizational processes in place in order to minimize human error can help reduce alert fatigue for SOC analysts. But an even better strategy is to try to automate and remove the human element altogether. One great way to do this is to implement a SIEM solution.

Learn about SOC Analyst Appreciation Day here.

Find out what your peers are saying about PagerDuty, Everbridge, BigPanda and others in IT Alerting and Incident Management. Updated: October 2021.
543,089 professionals have used our research since 2012.