Security, Orchestration, Automation, & Response Market by Solution Type (Case Management, Collaboration, Incident Response), Component (Platform, Services), End users, Deployment Mode, Organization Size - Global Forecast 2025-2032
Description
The Security, Orchestration, Automation, & Response Market was valued at USD 16.96 billion in 2024 and is projected to grow to USD 19.59 billion in 2025, with a CAGR of 15.33%, reaching USD 53.11 billion by 2032.
An authoritative orientation to how modern security operations leverage orchestration and automation to strengthen detection and response capabilities across heterogeneous environments
Security orchestration, automation, and response (SOAR) capabilities have emerged as mission-critical enablers for modern security operations centers, blending human expertise with automated workflows to reduce time-to-detect and time-to-respond. This executive summary articulates the shifting dynamics that shape the SOAR ecosystem, summarizes segmentation and regional perspectives, and translates analytical findings into practical guidance for decision-makers. The objective is to present an integrated view that supports both strategic planning and operational improvement initiatives.
In the sections that follow, we dissect the market through multiple lenses: solution capabilities, component models, deployment approaches, organizational scale, and sector-specific demands. Each perspective reveals its own drivers and friction points, and collectively they form a coherent story about where investments can yield the greatest resilience and measurable outcomes. By focusing on use-case alignment, integration maturity, and human-process-technology orchestration, this summary equips security leaders to prioritize actions that increase defender efficiency and reduce systemic risk.
How converging advances in automation, analytics, integration, and regulatory expectations are reshaping security operations and accelerating orchestration adoption
The landscape of security operations is undergoing rapid transformation driven by technological maturity, changing attacker tactics, and evolving expectations from risk governance functions. Advances in machine learning and behavioral analytics have improved contextual detection and automated triage, enabling security teams to reduce false positives and concentrate human effort where complex judgement matters. Simultaneously, the proliferation of cloud-native services and distributed workloads has elevated the importance of seamless integration and API-first architectures that allow orchestration platforms to coordinate diverse telemetry and enforcement points.
Workforce dynamics also contribute to the shift: skills shortages and the need for consistent operational procedures have incentivized automation of repetitive tasks, resulting in playbooks that codify institutional knowledge. Regulatory and compliance pressures further reinforce this trend by demanding demonstrable controls and repeatable audit trails. As a result, organizations are moving from ad hoc automation pilots toward enterprise-wide orchestration strategies that interlink case management, threat intelligence, and incident response to produce measurable reductions in mean time to remediate and to build repeatable, auditable forensic workflows.
Assessing how the 2025 United States tariffs introduced supply chain pressures that reshaped procurement decisions, deployment models, and vendor sourcing strategies for security tooling
Policy decisions and trade measures can have material downstream effects on technology procurement, supply chain planning, and vendor strategies. The United States tariffs enacted in 2025 introduced renewed emphasis on supply chain provenance, component sourcing, and cost structures that technology buyers must navigate. Hardware-dependent aspects of security platforms-such as appliance-based packet capture, cryptographic accelerators, or on-premise logging infrastructure-faced procurement scrutiny as organizations reassessed total cost of ownership and lifecycle replacement plans. This led many security leaders to reevaluate the balance between cloud-managed services and on-premises investments, prioritizing flexibility and vendor ecosystems that support hybrid deployments.
Furthermore, the tariffs heightened interest in partner diversity and vendor-neutral integrations to hedge against regional sourcing constraints. Procurement teams increasingly demanded transparent bills of materials and supply chain attestations, prompting vendors to strengthen supplier due diligence and to explore localized manufacturing or distribution partnerships. In turn, security architects accelerated migration strategies favoring orchestration platforms designed to operate across cloud, hybrid, and on-premise environments, thereby reducing exposure to single-source hardware risks and enabling continuity of operations even when component availability is disrupted.
Comprehensive segmentation analysis revealing how solution types, deployment models, components, organizational scale, and vertical demands shape adoption and implementation
Understanding the market requires careful attention to how solutions are categorized and the implications for integration, operations, and procurement. Based on Solution Type, the landscape spans Case Management, Collaboration, Incident Response, Orchestration & Automation, and Threat Intelligence Management, each contributing distinct value: case management provides the workflow backbone for investigations, collaboration tools improve cross-team coordination, incident response solutions focus on containment and remediation, orchestration and automation deliver repeatable playbooks, and threat intelligence management enriches context for prioritization. These functional areas increasingly converge within unified platforms, yet organizations must still evaluate maturity and depth across each capability to ensure operational fit.
Based on Component, offerings are organized into Platform and Services, with Services further subdivided into Managed Services and Professional Services, which affects how organizations allocate operational responsibilities and budget. Managed services can accelerate time-to-value by outsourcing routine monitoring and playbook maintenance, while professional services are critical for initial integrations, custom playbook development, and change management. Based on Deployment Mode, organizations choose among Cloud, Hybrid, and On-Premise options, a decision influenced by data residency requirements, latency considerations, and integration complexity. Based on Organization Size, requirements bifurcate between Large Enterprises and Small And Medium Enterprises, where scale, process maturity, and staffing considerations drive different approaches to automation and vendor engagement. Finally, based on End users, needs vary across Banking Financial Services And Insurance, Energy And Utilities, Government And Defense, Healthcare, Information Technology And Telecom, and Manufacturing, with each sector imposing unique regulatory, availability, and threat landscape constraints that the chosen solution must address.
Regional dynamics and operational priorities across the Americas, Europe, Middle East & Africa, and Asia-Pacific that determine deployment preferences and vendor strategies
Regional dynamics influence buyer priorities, regulatory obligations, and the structure of vendor ecosystems. In the Americas, demand trends emphasize rapid innovation cycles, strong cloud adoption, and a robust managed service market that caters to organizations seeking to outsource operational complexity. This region also features advanced legal and compliance frameworks that drive stringent logging and incident reporting practices, prompting solutions with strong audit and case management capabilities.
In Europe, Middle East & Africa, regulatory diversity and data sovereignty concerns encourage hybrid and on-premise deployments, while public sector and critical infrastructure operators demand tailored incident response and resilience features. Procurement processes in this region often require demonstrable certifications and localized support, shaping vendor go-to-market strategies. In Asia-Pacific, rapid digital transformation across industries, coupled with diverse market maturities, fosters both greenfield cloud-native adoption and sustained demand for customizable solutions that address language, regulatory, and latency considerations. Vendors expanding across regions must therefore balance global roadmap consistency with localized implementation and compliance support to succeed.
How vendor strategies, partnerships, integrations, and service-led delivery models are shaping competitive differentiation and buyer evaluation criteria
Competitive dynamics in the SOAR ecosystem reflect a mixture of platform innovation, strategic partnerships, and service-oriented business models. Leading vendors emphasize extensible integration frameworks and robust APIs to ensure interoperability with existing security stacks, while niche specialists focus on depth in areas such as threat intelligence management or incident orchestration for specific verticals. Partnerships with cloud providers, managed security service providers, and systems integrators are increasingly important to extend market reach and to provide the operational support customers require for enterprise-scale deployments.
The rise of professional services and managed offerings underscores the market’s recognition that technology alone does not deliver outcomes; implementation expertise, playbook engineering, and continuous tuning are essential. Consolidation activity has been observed where vendors seek to bundle complementary capabilities, while open standards and community-driven playbooks promote faster adoption and cross-vendor compatibility. These dynamics encourage buyers to evaluate not only feature sets but also the vendor’s ecosystem, services capability, and commitment to open integration standards when selecting a partner for security orchestration and automation.
Actionable strategic steps for security leaders to align automation, governance, integration, and operations in order to maximize defensive effectiveness and resilience
Leaders should prioritize actions that align technical capability with operational readiness and governance requirements. First, establish a playbook-first approach that documents repeatable response procedures and embeds decision gates; this ensures that automation augments human judgment rather than replicating ad hoc habits. Next, invest in integrations that prioritize data fidelity and context enrichment so that orchestration workflows operate on high-quality signals, improving the precision of automated actions and minimizing alert fatigue.
Additionally, modernize governance by implementing change-control practices for playbooks and automation rules to ensure traceability and compliance, and allocate budget for ongoing professional services to adapt workflows as the threat landscape evolves. Embrace hybrid deployment strategies where appropriate to balance resilience, data residency, and operational agility, and cultivate partnerships with managed service providers to scale capabilities while developing internal automation expertise. Finally, measure success through a combination of operational KPIs and risk-reduction metrics, using iterative improvement cycles to refine playbooks and to expand automation into high-value areas.
A rigorous mixed-methods research approach combining practitioner interviews, vendor analysis, and triangulation to validate trends, use-cases, and operational implications
This analysis synthesizes qualitative and quantitative inputs gathered through a structured research process designed to ensure rigor and relevance. The methodology combined primary interviews with security practitioners, program leads, and solution architects, alongside a comprehensive review of vendor documentation, technical white papers, and publicly available regulatory guidance. Triangulation across these sources enabled the identification of consistent patterns, operational pain points, and emerging best practices that informed the findings and recommendations presented herein.
Data validation included cross-verification of use-case descriptions and integration architectures with practitioners operating in enterprise, public sector, and critical infrastructure environments. Limitations are acknowledged where vendor-provided descriptions required supplementary validation through practitioner interviews or where rapidly evolving technology features outpace publicly documented capabilities. Where appropriate, the analysis highlights areas of uncertainty and recommends targeted proof-of-concept activities for organizations seeking to validate vendor claims against their specific environment and operational requirements.
A concise synthesis of findings emphasizing the imperative to align orchestration capabilities, process maturity, and governance to achieve resilient and auditable security operations
The cumulative analysis underscores that orchestration and automation are central to modernizing security operations, but success depends on aligning technology selection with process maturity, governance, and integration depth. Organizations that adopt a disciplined playbook strategy, invest in high-quality integrations, and embrace flexible deployment models are positioned to extract greater operational value while mitigating risks associated with procurement and supply chain disruptions. The interplay between automation and human judgement remains critical, and investments should be directed toward augmenting analyst capacity and enabling consistent, auditable response workflows.
Looking ahead, security leaders should focus on building modular, vendor-neutral architectures that enable rapid adaptation to new telemetry sources and regulatory changes. By coupling strategic procurement decisions with continuous operational improvement and well-scoped managed services partnerships, organizations can accelerate the transition from reactive incident handling to proactive threat orchestration, thereby reducing exposure and improving resilience against advanced threats.
Please Note: PDF & Excel + Online Access - 1 Year
An authoritative orientation to how modern security operations leverage orchestration and automation to strengthen detection and response capabilities across heterogeneous environments
Security orchestration, automation, and response (SOAR) capabilities have emerged as mission-critical enablers for modern security operations centers, blending human expertise with automated workflows to reduce time-to-detect and time-to-respond. This executive summary articulates the shifting dynamics that shape the SOAR ecosystem, summarizes segmentation and regional perspectives, and translates analytical findings into practical guidance for decision-makers. The objective is to present an integrated view that supports both strategic planning and operational improvement initiatives.
In the sections that follow, we dissect the market through multiple lenses: solution capabilities, component models, deployment approaches, organizational scale, and sector-specific demands. Each perspective reveals its own drivers and friction points, and collectively they form a coherent story about where investments can yield the greatest resilience and measurable outcomes. By focusing on use-case alignment, integration maturity, and human-process-technology orchestration, this summary equips security leaders to prioritize actions that increase defender efficiency and reduce systemic risk.
How converging advances in automation, analytics, integration, and regulatory expectations are reshaping security operations and accelerating orchestration adoption
The landscape of security operations is undergoing rapid transformation driven by technological maturity, changing attacker tactics, and evolving expectations from risk governance functions. Advances in machine learning and behavioral analytics have improved contextual detection and automated triage, enabling security teams to reduce false positives and concentrate human effort where complex judgement matters. Simultaneously, the proliferation of cloud-native services and distributed workloads has elevated the importance of seamless integration and API-first architectures that allow orchestration platforms to coordinate diverse telemetry and enforcement points.
Workforce dynamics also contribute to the shift: skills shortages and the need for consistent operational procedures have incentivized automation of repetitive tasks, resulting in playbooks that codify institutional knowledge. Regulatory and compliance pressures further reinforce this trend by demanding demonstrable controls and repeatable audit trails. As a result, organizations are moving from ad hoc automation pilots toward enterprise-wide orchestration strategies that interlink case management, threat intelligence, and incident response to produce measurable reductions in mean time to remediate and to build repeatable, auditable forensic workflows.
Assessing how the 2025 United States tariffs introduced supply chain pressures that reshaped procurement decisions, deployment models, and vendor sourcing strategies for security tooling
Policy decisions and trade measures can have material downstream effects on technology procurement, supply chain planning, and vendor strategies. The United States tariffs enacted in 2025 introduced renewed emphasis on supply chain provenance, component sourcing, and cost structures that technology buyers must navigate. Hardware-dependent aspects of security platforms-such as appliance-based packet capture, cryptographic accelerators, or on-premise logging infrastructure-faced procurement scrutiny as organizations reassessed total cost of ownership and lifecycle replacement plans. This led many security leaders to reevaluate the balance between cloud-managed services and on-premises investments, prioritizing flexibility and vendor ecosystems that support hybrid deployments.
Furthermore, the tariffs heightened interest in partner diversity and vendor-neutral integrations to hedge against regional sourcing constraints. Procurement teams increasingly demanded transparent bills of materials and supply chain attestations, prompting vendors to strengthen supplier due diligence and to explore localized manufacturing or distribution partnerships. In turn, security architects accelerated migration strategies favoring orchestration platforms designed to operate across cloud, hybrid, and on-premise environments, thereby reducing exposure to single-source hardware risks and enabling continuity of operations even when component availability is disrupted.
Comprehensive segmentation analysis revealing how solution types, deployment models, components, organizational scale, and vertical demands shape adoption and implementation
Understanding the market requires careful attention to how solutions are categorized and the implications for integration, operations, and procurement. Based on Solution Type, the landscape spans Case Management, Collaboration, Incident Response, Orchestration & Automation, and Threat Intelligence Management, each contributing distinct value: case management provides the workflow backbone for investigations, collaboration tools improve cross-team coordination, incident response solutions focus on containment and remediation, orchestration and automation deliver repeatable playbooks, and threat intelligence management enriches context for prioritization. These functional areas increasingly converge within unified platforms, yet organizations must still evaluate maturity and depth across each capability to ensure operational fit.
Based on Component, offerings are organized into Platform and Services, with Services further subdivided into Managed Services and Professional Services, which affects how organizations allocate operational responsibilities and budget. Managed services can accelerate time-to-value by outsourcing routine monitoring and playbook maintenance, while professional services are critical for initial integrations, custom playbook development, and change management. Based on Deployment Mode, organizations choose among Cloud, Hybrid, and On-Premise options, a decision influenced by data residency requirements, latency considerations, and integration complexity. Based on Organization Size, requirements bifurcate between Large Enterprises and Small And Medium Enterprises, where scale, process maturity, and staffing considerations drive different approaches to automation and vendor engagement. Finally, based on End users, needs vary across Banking Financial Services And Insurance, Energy And Utilities, Government And Defense, Healthcare, Information Technology And Telecom, and Manufacturing, with each sector imposing unique regulatory, availability, and threat landscape constraints that the chosen solution must address.
Regional dynamics and operational priorities across the Americas, Europe, Middle East & Africa, and Asia-Pacific that determine deployment preferences and vendor strategies
Regional dynamics influence buyer priorities, regulatory obligations, and the structure of vendor ecosystems. In the Americas, demand trends emphasize rapid innovation cycles, strong cloud adoption, and a robust managed service market that caters to organizations seeking to outsource operational complexity. This region also features advanced legal and compliance frameworks that drive stringent logging and incident reporting practices, prompting solutions with strong audit and case management capabilities.
In Europe, Middle East & Africa, regulatory diversity and data sovereignty concerns encourage hybrid and on-premise deployments, while public sector and critical infrastructure operators demand tailored incident response and resilience features. Procurement processes in this region often require demonstrable certifications and localized support, shaping vendor go-to-market strategies. In Asia-Pacific, rapid digital transformation across industries, coupled with diverse market maturities, fosters both greenfield cloud-native adoption and sustained demand for customizable solutions that address language, regulatory, and latency considerations. Vendors expanding across regions must therefore balance global roadmap consistency with localized implementation and compliance support to succeed.
How vendor strategies, partnerships, integrations, and service-led delivery models are shaping competitive differentiation and buyer evaluation criteria
Competitive dynamics in the SOAR ecosystem reflect a mixture of platform innovation, strategic partnerships, and service-oriented business models. Leading vendors emphasize extensible integration frameworks and robust APIs to ensure interoperability with existing security stacks, while niche specialists focus on depth in areas such as threat intelligence management or incident orchestration for specific verticals. Partnerships with cloud providers, managed security service providers, and systems integrators are increasingly important to extend market reach and to provide the operational support customers require for enterprise-scale deployments.
The rise of professional services and managed offerings underscores the market’s recognition that technology alone does not deliver outcomes; implementation expertise, playbook engineering, and continuous tuning are essential. Consolidation activity has been observed where vendors seek to bundle complementary capabilities, while open standards and community-driven playbooks promote faster adoption and cross-vendor compatibility. These dynamics encourage buyers to evaluate not only feature sets but also the vendor’s ecosystem, services capability, and commitment to open integration standards when selecting a partner for security orchestration and automation.
Actionable strategic steps for security leaders to align automation, governance, integration, and operations in order to maximize defensive effectiveness and resilience
Leaders should prioritize actions that align technical capability with operational readiness and governance requirements. First, establish a playbook-first approach that documents repeatable response procedures and embeds decision gates; this ensures that automation augments human judgment rather than replicating ad hoc habits. Next, invest in integrations that prioritize data fidelity and context enrichment so that orchestration workflows operate on high-quality signals, improving the precision of automated actions and minimizing alert fatigue.
Additionally, modernize governance by implementing change-control practices for playbooks and automation rules to ensure traceability and compliance, and allocate budget for ongoing professional services to adapt workflows as the threat landscape evolves. Embrace hybrid deployment strategies where appropriate to balance resilience, data residency, and operational agility, and cultivate partnerships with managed service providers to scale capabilities while developing internal automation expertise. Finally, measure success through a combination of operational KPIs and risk-reduction metrics, using iterative improvement cycles to refine playbooks and to expand automation into high-value areas.
A rigorous mixed-methods research approach combining practitioner interviews, vendor analysis, and triangulation to validate trends, use-cases, and operational implications
This analysis synthesizes qualitative and quantitative inputs gathered through a structured research process designed to ensure rigor and relevance. The methodology combined primary interviews with security practitioners, program leads, and solution architects, alongside a comprehensive review of vendor documentation, technical white papers, and publicly available regulatory guidance. Triangulation across these sources enabled the identification of consistent patterns, operational pain points, and emerging best practices that informed the findings and recommendations presented herein.
Data validation included cross-verification of use-case descriptions and integration architectures with practitioners operating in enterprise, public sector, and critical infrastructure environments. Limitations are acknowledged where vendor-provided descriptions required supplementary validation through practitioner interviews or where rapidly evolving technology features outpace publicly documented capabilities. Where appropriate, the analysis highlights areas of uncertainty and recommends targeted proof-of-concept activities for organizations seeking to validate vendor claims against their specific environment and operational requirements.
A concise synthesis of findings emphasizing the imperative to align orchestration capabilities, process maturity, and governance to achieve resilient and auditable security operations
The cumulative analysis underscores that orchestration and automation are central to modernizing security operations, but success depends on aligning technology selection with process maturity, governance, and integration depth. Organizations that adopt a disciplined playbook strategy, invest in high-quality integrations, and embrace flexible deployment models are positioned to extract greater operational value while mitigating risks associated with procurement and supply chain disruptions. The interplay between automation and human judgement remains critical, and investments should be directed toward augmenting analyst capacity and enabling consistent, auditable response workflows.
Looking ahead, security leaders should focus on building modular, vendor-neutral architectures that enable rapid adaptation to new telemetry sources and regulatory changes. By coupling strategic procurement decisions with continuous operational improvement and well-scoped managed services partnerships, organizations can accelerate the transition from reactive incident handling to proactive threat orchestration, thereby reducing exposure and improving resilience against advanced threats.
Please Note: PDF & Excel + Online Access - 1 Year
Table of Contents
194 Pages
- 1. Preface
- 1.1. Objectives of the Study
- 1.2. Market Segmentation & Coverage
- 1.3. Years Considered for the Study
- 1.4. Currency
- 1.5. Language
- 1.6. Stakeholders
- 2. Research Methodology
- 3. Executive Summary
- 4. Market Overview
- 5. Market Insights
- 5.1. Integration of generative AI models to automate security playbook creation and adaptation within SOAR platforms
- 5.2. Orchestration of cross-cloud incident response workflows to accelerate remediation across multi-cloud environments
- 5.3. Real-time behavioral analytics integration to trigger automated containment actions for insider threat mitigation
- 5.4. Implementation of zero trust principles within SOAR frameworks to enforce dynamic access and response policies
- 5.5. Deployment of API-driven microservices for modular SOAR scalability and seamless third-party security tool integrations
- 5.6. Automation of compliance reporting and audit trail generation to ensure regulatory adherence in incident response operations
- 5.7. Development of unified threat modeling and simulation engines to validate orchestration workflows before deployment
- 5.8. Adoption of context-aware security automation to correlate endpoint, network, and cloud telemetry for holistic response
- 5.9. Integration of threat hunting playbooks with SIEM and endpoint detection platforms using standardized threat intel schemas
- 5.10. Leveraging machine learning anomaly detection to reduce false positives and prioritize automated remediation tasks
- 6. Cumulative Impact of United States Tariffs 2025
- 7. Cumulative Impact of Artificial Intelligence 2025
- 8. Security, Orchestration, Automation, & Response Market, by Solution Type
- 8.1. Case Management
- 8.2. Collaboration
- 8.3. Incident Response
- 8.4. Orchestration & Automation
- 8.5. Threat Intelligence Management
- 9. Security, Orchestration, Automation, & Response Market, by Component
- 9.1. Platform
- 9.2. Services
- 9.2.1. Managed Services
- 9.2.2. Professional Services
- 10. Security, Orchestration, Automation, & Response Market, by End users
- 10.1. Banking Financial Services And Insurance
- 10.2. Energy & Utilities
- 10.3. Government & Defense
- 10.4. Healthcare
- 10.5. Information Technology & Telecom
- 10.6. Manufacturing
- 11. Security, Orchestration, Automation, & Response Market, by Deployment Mode
- 11.1. Cloud
- 11.2. Hybrid
- 11.3. On-Premise
- 12. Security, Orchestration, Automation, & Response Market, by Organization Size
- 12.1. Large Enterprises
- 12.2. Small & Medium Enterprises
- 13. Security, Orchestration, Automation, & Response Market, by Region
- 13.1. Americas
- 13.1.1. North America
- 13.1.2. Latin America
- 13.2. Europe, Middle East & Africa
- 13.2.1. Europe
- 13.2.2. Middle East
- 13.2.3. Africa
- 13.3. Asia-Pacific
- 14. Security, Orchestration, Automation, & Response Market, by Group
- 14.1. ASEAN
- 14.2. GCC
- 14.3. European Union
- 14.4. BRICS
- 14.5. G7
- 14.6. NATO
- 15. Security, Orchestration, Automation, & Response Market, by Country
- 15.1. United States
- 15.2. Canada
- 15.3. Mexico
- 15.4. Brazil
- 15.5. United Kingdom
- 15.6. Germany
- 15.7. France
- 15.8. Russia
- 15.9. Italy
- 15.10. Spain
- 15.11. China
- 15.12. India
- 15.13. Japan
- 15.14. Australia
- 15.15. South Korea
- 16. Competitive Landscape
- 16.1. Market Share Analysis, 2024
- 16.2. FPNV Positioning Matrix, 2024
- 16.3. Competitive Analysis
- 16.3.1. Cyware Labs, Inc.
- 16.3.2. D3 Security, Inc.
- 16.3.3. DFLabs S.p.A.
- 16.3.4. Fortinet, Inc.
- 16.3.5. Google LLC
- 16.3.6. International Business Machines Corporation
- 16.3.7. KnowBe4, Inc.
- 16.3.8. LogRhythm, Inc.
- 16.3.9. Microsoft Corporation
- 16.3.10. Open Text Corporation
- 16.3.11. Palo Alto Networks, Inc.
- 16.3.12. Rapid7, Inc.
- 16.3.13. ServiceNow, Inc.
- 16.3.14. Splunk Inc.
- 16.3.15. Sumo Logic, Inc.
- 16.3.16. Swimlane, Inc.
- 16.3.17. ThreatConnect, Inc.
- 16.3.18. Tines Security Ltd.
- 16.3.19. Torq Automation, Inc.
- 16.3.20. Trellix Corporation
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.


