IBM Verify vs. Splunk Enterprise Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Verify
Score 8.9 out of 10
N/A
IBM Verify, formerly known as IBM Cloud Identity, is an identity-as-a-service (IDaaS) offering that aggregates dynamic user, device and environmental context to automate risk protection and continuously authenticate any user to any resource.
$1.81
per month per user
Splunk Enterprise Security
Score 8.6 out of 10
N/A
Splunk Enterprise Security is an analytics-driven SIEM that helps to combat threats with actionable intelligence and advanced analytics at scale.N/A
Pricing
IBM VerifySplunk Enterprise Security
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IBM VerifySplunk Enterprise Security
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional DetailsSample Pricing Breakdown (NOTE: for competitive pricing per contract, please consult with your IBM Security Account Rep) Users: 5,000 SSO* -- USD 1.71 per user per month MFA* -- USD 1.71 per user per month Adaptive Access* -- USD 1.71 per user per month Lifecycle and provisioning** -- USD 2.01 per user per month Identity analytics** -- USD 2.13 per user per month * Single sign-on (SSO), multifactor authentication (MFA) and adaptive access pricing based on total active monthly users per use case. Costs decrease if users are active less than once per month. ** Lifecycle and provisioning and identity analytics pricing based on total users per use case.
More Pricing Information
Community Pulse
IBM VerifySplunk Enterprise Security
Features
IBM VerifySplunk Enterprise Security
Identity Management
Comparison of Identity Management features of Product A and Product B
IBM Verify
8.8
52 Ratings
7% above category average
Splunk Enterprise Security
-
Ratings
ID-Management Access Control8.747 Ratings00 Ratings
ID Management Single-Sign On (SSO)8.649 Ratings00 Ratings
Multi-Factor Authentication9.448 Ratings00 Ratings
Password Management9.545 Ratings00 Ratings
Account Provisioning and De-provisioning8.444 Ratings00 Ratings
ID Management Workflow Automation8.447 Ratings00 Ratings
ID Risk Management8.745 Ratings00 Ratings
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
IBM Verify
-
Ratings
Splunk Enterprise Security
8.4
105 Ratings
6% above category average
Centralized event and log data collection00 Ratings7.1103 Ratings
Correlation00 Ratings8.9102 Ratings
Event and log normalization/management00 Ratings8.9103 Ratings
Deployment flexibility00 Ratings8.0104 Ratings
Integration with Identity and Access Management Tools00 Ratings9.099 Ratings
Custom dashboards and workspaces00 Ratings9.9105 Ratings
Host and network-based intrusion detection00 Ratings8.099 Ratings
Data integration/API management00 Ratings8.0101 Ratings
Behavioral analytics and baselining00 Ratings8.997 Ratings
Rules-based and algorithmic detection thresholds00 Ratings7.998 Ratings
Response orchestration and automation00 Ratings8.090 Ratings
Reporting and compliance management00 Ratings8.998 Ratings
Incident indexing/searching00 Ratings8.0104 Ratings
Best Alternatives
IBM VerifySplunk Enterprise Security
Small Businesses
Dashlane Password Manager
Dashlane Password Manager
Score 9.1 out of 10
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.6 out of 10
Medium-sized Companies
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
Enterprises
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Sumo Logic
Sumo Logic
Score 8.8 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IBM VerifySplunk Enterprise Security
Likelihood to Recommend
7.9
(47 ratings)
7.0
(100 ratings)
Likelihood to Renew
9.1
(1 ratings)
9.0
(3 ratings)
Usability
7.3
(16 ratings)
6.0
(3 ratings)
Availability
8.6
(21 ratings)
9.1
(1 ratings)
Performance
-
(0 ratings)
8.2
(1 ratings)
Support Rating
8.2
(16 ratings)
6.6
(6 ratings)
In-Person Training
-
(0 ratings)
9.1
(1 ratings)
Online Training
-
(0 ratings)
8.2
(1 ratings)
Implementation Rating
-
(0 ratings)
9.1
(1 ratings)
Configurability
8.3
(21 ratings)
7.3
(1 ratings)
Contract Terms and Pricing Model
7.3
(8 ratings)
7.3
(1 ratings)
Ease of integration
-
(0 ratings)
6.4
(1 ratings)
Product Scalability
-
(0 ratings)
9.3
(96 ratings)
Professional Services
8.3
(5 ratings)
9.1
(1 ratings)
Vendor post-sale
-
(0 ratings)
8.2
(1 ratings)
Vendor pre-sale
-
(0 ratings)
8.2
(1 ratings)
User Testimonials
IBM VerifySplunk Enterprise Security
Likelihood to Recommend
IBM
The software is a unified identity verification platform with robust identity governance systems and multi-factor authentication tools. Effectiveness of the product in privileged access management and real-time activity monitoring. IBM Verify is very affordable and supports single sign-on in the cloud. It has a steep learning curve.
Read full review
Cisco
Well suited: Splunk ES is highly recommended in an environment with many data sources and experienced computer engineers. It has a steep learning curve, but once that hurdle is crossed, it is absolutely a beast. It is also very expensive, so a company putting a high amount of budget in Security is needed. Not well suited: Splunk ES is not recommended if a company has only a few sources and some non-technical IT users. The price won't justify the fewer data sources and scratching just the surface level. Moreover, non-technical IT users would be better off with something that has a query builder, unlike Splunk.
Read full review
Pros
IBM
  • IBM Security Verify provides comprehensive identity and access management (IAM) capabilities.
  • IBM Security Verify provides multi-factor authentication (MFA) capabilities.
  • IBM Security Verify provides robust identity and access governance capabilities.
  • IBM Security Verify provides comprehensive auditing capabilities.
  • IBM Security Verify provides a comprehensive platform for managing and protecting privileged accounts.
Read full review
Cisco
  • Advanced Threat Detection and Correlation: ES stands out in its ability to detect sophisticated threats by correlating data from multiple sources. For instance, it can identify unusual patterns in user behavior, cross-referencing with network logs to flag potential insider threats.
  • Real-time Monitoring and Alerting: ES offers robust real-time monitoring capabilities. It excels in promptly alerting us to critical security events, such as suspicious network traffic spikes or unauthorized access attempts, allowing for immediate response.
  • Comprehensive Log Analysis: ES ingests and analyzes an extensive range of log data. It's particularly adept at parsing and making sense of complex log formats, making it a versatile tool for understanding system activities and security events.
Read full review
Cons
IBM
  • The mobile app can be a bit buggy at times if it gets fixed it would be great.
  • UI seems a bit old compared to modern tools out there.
  • There is a bit of a learning curve; if the developers can make it more intuitive it would be awesome.
Read full review
Cisco
  • ES on the cloud (SaaS) has too many limitations with platform administration.
  • Supported integrations are not always on par with enterprise support especially when dependent on 3rd-party proprietary APIs.
  • In later versions, unforeseen glitches seem to show up that have no resolution except version upgrade. This used to not be the case in prior versions which were very stable.
Read full review
Likelihood to Renew
IBM
It works flawlessly, i have never faced any major issues with this. It has all the features such as Iam and security management. I think its a good investment and the benefits we reap from this software are worth the price.
Read full review
Cisco
We are very happy with Splunk and would advise anyone to take a serious look at it. It might look pricey but the rewards Splunk offers seem endless.
Read full review
Usability
IBM
While setup and implementation takes work and time, the flexibility and possibilities make up for that in the long run. This is not a product you can just install and run, but if you design and implement your ruleset well, it will save you a lot of work afterwards. Just make sure that the systems you want to use it for have an existing and proven connector.
Read full review
Cisco
Maintaining hundreds or even 1000+ SOC use cases is really difficult, considering that the Data sources may not always send the data. A module that detects data freshness issues and detect data format changes would be a great help. the main challenge today using Splunk Enterprise Security is making sure that the detection rules are still working properly given all the changes that occur in data source applications. Also, maintaining the data collects on tens of thousands of servers and more than 100k workstations is a real company IT challenge: the splunkbase forwarder may not support old OS anymore, while these are the most important to monitor. Moving to the Open Telemetry collector has become essential so that only 1 agent is required for both SIEM and application observability.
Read full review
Reliability and Availability
IBM
It has never let us down since its inception and installation. User credentials and secure access have always been guaranteed. Ironclad security (through single sign-on, MFA, etc.) has ensured that our user credential details are safe as is our information/data. The correct access is given to users, based on role-based access with segregation of duty and the principle of least privilege being deployed. The IBM support has also been first class and they have proactively resolved any minor issues we have encountered.
Read full review
Cisco
I don't think I've ever seen Splunk ES go fully offline or have any downtime greater than a few minutes on rare occasions.
Read full review
Performance
IBM
No answers on this topic
Cisco
It takes a long time for items to load if you are just generally searching through logs. It is best to use the data models which load faster but can be strange in terms of what is coming from which logs where. Yes, you can look it up, but this also requires familiarity with where things are and how to look them up.
Read full review
Support Rating
IBM
The support team has always been the primary consultation base when we are faced by performance problems. From the deployment stage the team has managed to monitor the operation lifecycle and give best insights based on their observation. It works 24/7 to enhance productive service delivery to clients. The IBM Security Verify Support team has been the main player in the successful performance of this software.
Read full review
Cisco
It's good when it's responsive, but I've had times where I had to wait quite a while for a response. But these are typically the exceptions rather than the rule. When you do get a response it is always well-informed and appropriate. I would say they've been trending better over time with this.
Read full review
In-Person Training
IBM
No answers on this topic
Cisco
I experienced only on-line training, but the trainers were very professional and competent. Maybe it could be more useful if they also have an experience in projects because sometimes they didn't have a real project experience to communicate to the students. Anyway, it was very interesting and I learned many thing that's very difficoult (or maybe impossible!) to have by myself, aven if I have more than 10 years of Splunk activity experience.
Read full review
Online Training
IBM
No answers on this topic
Cisco
It was very interesting and I learned many thing that's very difficoult (or maybe impossible!) to have by myself. The only problem was that, when I worked with the Splunk Professional Services, I found some difference between the training contents and the information from PS. In addition is required a long experience on Splunk Enterprise for the data ingestion part, in other words I'm able to work with ES because I'm worling on Splunk since 11 years, otherwise I'd some problem.
Read full review
Implementation Rating
IBM
No answers on this topic
Cisco
It's a fantatic product and it was very useful the presence of Splunk Professional Services for the Design Phase and the final Health Check.
Read full review
Alternatives Considered
IBM
We conducted a comparison study between IBM Verify and Okta as well as Duo Security before making our selection. IBM Verify emerged as the perfect fit because its superior capability to integrate with our current system environment surpassed competitor security solutions. IBM Verify demonstrated superior reliability through its enterprise-class scalability and fully transparent auditing mechanisms.
Read full review
Cisco
Splunk enterprise is the only solution that we’ve been able to identify that provides risk based alerting, which allows our SOC to reduce analyst fatigue which would be a huge problem without it. Before RBA, there were thousands of alerts a day and it was impossible to review all of them
Read full review
Contract Terms and Pricing Model
IBM
The licensing terms were favourable due to their flexibility based on the size and purpose of implementation. The billing frequency is done on quarterly basis. The vendor team has enacted best user policies that gives the company the full control of this platform. It is cost-effective as compared to most security verification tools in the market.
Read full review
Cisco
for my exterience, unit pricing and billing frequency are correct. As I already said, I hint to have more discount flexibility, expecially with new customers, because there are competitors less expensive and very aggressive that are dangerous. In addition the possibility to don't pay the license for the development period could be a very interesting feature for the final customers.
Read full review
Scalability
IBM
No answers on this topic
Cisco
- 8 out of 10 and took 2 for the data pipeline and administration part. Even if you'd like to improve yourself or your team, you have to pay a lot of money and it could be more than GIAC education + cert. - Normalization for Data models and CPU-based searches can be a problem sometimes.
Read full review
Professional Services
IBM
In the case of adjustments, we were often able to carry them out completely on our own and only used professional services for new requirements. Particularly in the case of access management, it is very positive that we usually needed IBM for a task in less than an hour and then developed the solution further on our own.
Read full review
Cisco
I had a fantastic experience with Splunk Professional Services: they worked with us in our last SON project (a SOC migration for a very large customer) and helped to build a multi tenent environment even if ES isn't a multi tenant platform. Th Splunk PS was a very professional and competent people, he is italian and was able to speak with our italian customers.
Read full review
Return on Investment
IBM
  • It has allowed us to securely store and access data which is hard to put a price on, but is of tremendous value.
  • It has performed well and we did not have to upgrade any of the current equipment that we had.
  • It has allowed us to branch out slightly and offer more mobile solutions both internally and externally.
Read full review
Cisco
  • ES has highly impacted ROI because as the customer of the ES the work we do for creating use cases for clients in terms of security-related aspects by their logs has given more return than investment.
  • The correlation searches we run to get detailed results from the Data models are very less time-consuming than Splunk Enterprise itself we can get quick responses to the use cases and dashboards populated because of ES.
  • The CIM compliance feature is ES has made more jobs easy in the terms of finding more Authentication related data we can get data onboarded in the Email data model from O365 and search is email data model instead of searching for particular indexes.
Read full review
ScreenShots

IBM Verify Screenshots

Screenshot of IBM Verify (for CIAM) - Privacy and ConsentScreenshot of IBM Verify - Custom Application TemplateScreenshot of IBM Verify - Select Application TypeScreenshot of IBM Verify - Privacy Policy