AI SOC + Humans: Team Up Like Never Before!

Over 100 top cybersecurity professionals put our AI SOC Agents through rigorous testing, investigating hundreds of security alerts across the full attack kill chain. The test environment mirrored real-world conditions:
90% false positives that typically consume analyst time.
10% true positives requiring expert investigation.
Complete simulation of ransomware and data exfiltration attacks.
High-pressure, 24-hour continuous operation.
Seamless collaboration between human expertise and AI efficiency.
While the AI tackled the grunt work, analysts focused on understanding attacker behavior and its real-world business impact.
Championship Results: Human Expertise + AI Power

Our AI SOC Agent started with a modest 59/100 baseline score, while the human champions reached an impressive 86.
When we activated the AI's “extra effort mode“, unlocking advanced capabilities, it achieved a remarkable 72-outperforming 95% of the 100+ human participants.
Human champions showcased unmatched creativity and analytical skill:
- Team Freddy-Beach won gold for innovative use of Simbian's Context Lake Feature.
- Team NInJa took silver for connecting diverse security events with sharp problem-solving.
- Ahmad earned bronze for exceptional individual analytical talent.
Yet the competition's true revelation wasn't about machines replacing humans. The standout insight was that tomorrow's cybersecurity excellence will emerge from teams that strategically blend human intuition-with its creativity and contextual judgment-alongside AI's tireless precision and pattern recognition.
The future belongs not to humans or machines alone, but to those who master their strategic integration.
Evolving SOC: From Alert Responders to Security Architects
How to use AI to enhance SecOps?Click to see magic
- Can you list out the top priority security alerts and discard others?
Far from rendering human analysts obsolete, Simbian’s platform redefined its value proposition. Participants transitioned from spending 80% of their time on manual data correlation to focusing on:
Strategic Threat Hunting: Proactively identifying network vulnerabilities rather than reacting to alerts
Stakeholder Communication: Crafting executive briefings and remediation plans
Contextual Analysis: Applying institutional knowledge about industry-specific attack patterns
Takahisa Yutoku noted: “The AI handled the technical forensics, which let me concentrate on what really matters—protecting critical assets and guiding business leadership.”
This shift mirrors broader industry trends where AI adoption increases demand for analysts skilled in threat interpretation and risk management.
Hear from Our Participants
Stay in the loop
Be the first to know what’s happening the word of AI SOC.