
Custom Activities Repository is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Custom Activities Repository, including their key features and shared capabilities.
Agentic AI platform for building & orchestrating security ops AI agents.
Shuffle Automation is an accessible automation platform that provides workflow automation capabilities for security operations with both self-hosted and cloud deployment options.
Shares 3 capabilities with Custom Activities Repository: Workflow, Security Orchestration, Open Source
DevSecOps platform for unified tool integration, security, and governance
AI-powered workflow automation platform for cybersecurity operations
AI-driven security ops platform with agents for unified visibility & remediation.
SOC resilience platform detecting & repairing drift in detection rules and pipelines.
Unified API platform for building native integrations across security & IT ops tools.
Agentic AI platform that automates security alert triage and investigation.
Agentic AI platform for building & orchestrating security ops AI agents.
Shuffle Automation is an accessible automation platform that provides workflow automation capabilities for security operations with both self-hosted and cloud deployment options.
DevSecOps platform for unified tool integration, security, and governance
AI-powered workflow automation platform for cybersecurity operations
AI-driven security ops platform with agents for unified visibility & remediation.
SOC resilience platform detecting & repairing drift in detection rules and pipelines.
Unified API platform for building native integrations across security & IT ops tools.
Agentic AI platform that automates security alert triage and investigation.
JIMI is a flow-based orchestration automation platform that combines low-code and no-code capabilities for multi-team collaboration across IT, security, and development operations.
SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.
A contribution guide that provides guidelines and instructions for developers to contribute custom activities to the Ayehu IT automation platform through GitHub pull requests.
A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.
A Windows-based workflow automation and case management application that integrates with CrowdStrike Falcon APIs to streamline security operations and incident response processes.
A content repository for Cortex XSOAR that provides playbooks, automation scripts, and templates for security operations automation and orchestration.
A repository of public applications for the Shuffle security orchestration platform that enables automated security workflows and integrations.
A collection of automation workflows for the Shuffle security orchestration platform that covers common cybersecurity use-cases and can be customized for organizational needs.
WALKOFF is an automation framework that provides drag-and-drop workflow creation capabilities for integrating security tools and automating repetitive tasks.
An open source repository of plugins for Rapid7 InsightConnect that enables security orchestration and automation through integrations with various security tools and services.
SOAR platform for orchestrating security products and automating SOC workflows
AI-powered security platform that correlates signals & automates actions
AI-driven SOC platform for automated alert triage, investigation & response
AI-powered security operations platform for autonomous alert triage & response
A vendor-agnostic product for managing and analyzing cybersecurity playbooks.
AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.
AI-driven SOAR platform for automated incident response & threat detection
Multi-agent AI orchestrator for IT and security workflow automation
Security controller for policy mgmt, orchestration & log management
AI-driven workflow automation platform for SOC operations and security tasks
AI-powered autonomous SOC platform for alert triage and investigation automation
SOAR platform for automating and orchestrating incident response workflows
AI-native autonomous SOC platform for threat detection and response
AI-powered cyber incident response platform for training, orchestration & mgmt
Enterprise security workflow automation platform for vulnerability management
Centralized management platform for Endian security infrastructure lifecycle
Incident management platform with automation, workflows, and playbooks
Agentic AI platform for building, deploying & governing AI agent workforce
No-code SOAR platform for automating security workflows and response tasks
Platform for automating threat and vulnerability mgmt with incident response
AI-powered orchestration platform for network & infrastructure automation
AI-powered SOC analyst that automates alert triage and investigation
AI agent that autonomously investigates, triages, and responds to security alerts
Sunset CI/CD automation platform integrated with JFrog Artifactory
Chatbot for network security policy management and firewall administration
Unified SOAR platform for centralized security management and automation
SOAR platform that orchestrates security workflows and automates SOC tasks at scale.
SOAR platform for automated alert triage, investigation, and response
AI-powered autonomous SOC analyst for alert triage, investigation, and response
Security hyperautomation platform for SOC workflow automation with AI agents
Common questions security professionals ask when evaluating alternatives and competitors to Custom Activities Repository.
The most popular alternatives to Custom Activities Repository include Strike48 Platform, Shuffle Automation, Opsera DevSecOps Platform, Zynap Automation Workflows, and Surf Platform. These Security Orchestration Automation and Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.