
Building effective automated security workflows has been a false promise for fifteen years.
Automation will free analysts from grunt work. Investigations will run while humans sleep. Incident response will compress from hours into minutes.
Some of that's happened. Most of it hasn't. The automation we actually built got complicated fast, and the teams carrying it are exhausted.
The evolution from hand-written Python scripts to SOAR platforms to modern agentic systems maps a gap that never fully closed. The teams still carrying the old tools know exactly where it went wrong.
SOAR platforms failed because they replaced one maintenance burden with another. Playbooks broke on edge cases, required specialized engineers to maintain, and couldn’t adapt when integrations changed. The promise of “build once, run everywhere” didn’t survive contact with real production environments.
SOAR emerged in the early 2010s with genuine ambition. SOAR vendors promised to turn expensive analysts into orchestrators. Build a playbook once. Run it everywhere.
It worked in demos. It rarely worked in production.
First-generation SOAR required coding expertise to build and maintain playbooks. Not Python or any real programming language. It looked approachable. It broke just as easily as the scripts it was supposed to replace.
Teams discovered this the hard way. An edge case appeared. The playbook broke. An analyst went back and patched it. Three months later, it broke again in a different way.
SOAR also created a new operational burden. Teams didn't eliminate work. They shifted it. Instead of analysts writing ad-hoc scripts, they hired SOAR engineers to build and maintain orchestration logic. The tool cost money. The people cost more money. The complexity cost time.
SOAR playbooks were also brittle by design. They worked against structured data from a few integrated tools. Logs that didn’t fit the expected format broke the logic. APIs changed. Integrations stopped working. The playbook that automated phishing detection in 2019 was obsolete by 2021 because the tool landscape shifted around it.
The promised efficiency evaporated.
The security workflows worth automating share three characteristics: the input is structured, the logic is deterministic, and the right answer doesn’t require judgment. Alert triage, phishing analysis, vulnerability response, compliance evidence gathering, and incident response coordination all qualify. Everything else needs reasoning.
The best candidates share three traits: high volume, structured data, and no judgment required. Here’s how each workflow breaks down.
All five follow the same pattern: deterministic input, structured data, logic that doesn’t require discretion.
Security tasks that require judgment should not be automated. This includes system isolation decisions, law enforcement escalations, investigation interpretation, threat hunting, and behavioral analysis. Automating these removes the reasoning step those decisions need without providing anything useful in its place.
Some decisions can’t be reduced to a pattern. Whether to isolate a system. Whether to notify leadership. Whether to escalate to law enforcement. These require judgment, not matching.
The same problem applies to investigation interpretation. A flagged anomaly might be a real threat or a perfectly legitimate action the system has no context for. Automation can surface it. Agents can use reasoning to determine what they can resolve and what needs to be sent to a human
The practical approach is straightforward: automate the deterministic,use agents for the reasoning, then hand off to a human for anything too complex or sensitive. Alert triage, evidence collection, artifact analysis all run without interruption. When an agent reaches a step that requires judgment, it routes to a human instead of guessing. Teams can also configure specific workflow steps to require human review, regardless of what the agent concluded. If your organization requires a human sign-off before any response action on a privilege escalation alert, you build that into the workflow. Every action is logged in a full audit trail, so analysts can see exactly what ran, what was reasoned, and what triggered the escalation. You stay in control without sitting inside every step.
To select security workflows to automate, prioritize tasks where analysts are already following a repeatable process. Alert triage is the right starting point for most SOC teams. Avoid automating any workflow where the right answer depends on context a system can’t have.
The most common security automation failures are automating the wrong process, building logic that breaks on edge cases, ignoring how work routes between analysts, and measuring time saved instead of security outcomes. Most failed automation projects get at least two of these wrong.
Hybrid security automation combines deterministic workflows for structured logic with AI agents for reasoning tasks, and routes to humans when a decision requires judgment. This differs from SOAR, which forced teams to choose between full automation and manual execution. It also differs from pure agentic systems, which introduce hallucination risk when applied to tasks that have a provably correct answer.
First-generation SOAR platforms automated workflows through rigid playbooks. Modern systems combine two things SOAR never could: deterministic workflows that run without reasoning, and agents that reason when reasoning is actually required.
The distinction matters because not everything should go through an agent. Structured logic, calculations, rule-based decisions: these need to run deterministically. When you let an agent reason about whether an IP matches a known-bad list or whether an alert threshold was crossed, you introduce hallucination risk into a process that has a correct answer. The deterministic layer handles that work the same way every time. When the workflow hits something that actually requires reasoning, it hands off to an agent. The agent interprets context, weighs ambiguous signals, and makes a call. Then control returns to the deterministic layer, or routes to a human.
Humans stay in the loop throughout. Every action the system takes is logged in a full audit trail: what ran, what the agent reasoned, and what decision was made. Teams can also configure specific steps to always route to a human regardless of what the agent concluded. If your organization has a policy that privilege escalation alerts always require human sign-off before any response action, you build that into the workflow. The system respects it without exception.
This hybrid architecture also reduces maintenance overhead. The deterministic layer handles structured logic reliably. The agent handles variability without requiring you to pre-write every possible branch. When an integration changes or an edge case appears, the agent adapts instead of breaking. Teams that have deployed this architecture report compressed investigation timelines, higher detection rates on real threats, and dramatically lower maintenance overhead compared to legacy SOAR. Mean time to detection drops below ten minutes. Alert triage compresses from fifteen minutes per alert to seconds. Incident response shifts from sequential steps into parallel paths running simultaneously.
Earlier SOAR platforms forced you to choose: full automation that broke on edge cases, or manual execution that defeated the purpose. The hybrid model runs deterministically through everything it can handle with certainty, hands off to agents for reasoning, and routes to humans for decisions that need a person. That’s not a limitation. It’s how production security actually works.
Prospector Studio gives teams a no-code environment to define workflows in plain language. You specify what the deterministic steps are, where agents take over for reasoning, and which decisions route to a human. The audit trail runs throughout. When business logic changes or a new log source comes online, teams adjust in minutes instead of rebuilding playbooks from scratch.
The five metrics that actually measure security automation success are mean time to detection, false positive rate, analyst capacity for investigation work, operational reliability, and cost efficiency. Time saved per alert is not on that list.
Earlier automation attempts failed because rigid playbooks break on edge cases. Teams had to hire expensive engineers just to maintain orchestration logic. The work shifted instead of being eliminated.
Strike48’s platform is built on a hybrid architecture. Deterministic logic handles the structured work. Agents handle the reasoning, with a full audit trail at every step. Humans handle the decisions that require human judgment.
What changes? The mean time to detection drops below eight minutes. Alert triage compresses from fifteen minutes per alert to three seconds. Incident response shifts from sequential investigation to parallel execution. Phishing emails get analyzed and routed in seconds instead of minutes.
You don't need to rip out your current tools.
Strike48 queries data wherever it lives. Splunk, Elastic, S3. Or collect centrally. Prospector Studio lets you define the full workflow in plain language: the deterministic steps, the agent handoffs, and the human checkpoints.
Request a demo to see how hybrid workflows handle the complexity that killed earlier platforms