Overview
What is Splunk Enterprise?
Splunk is software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. It captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.
TrustRadius Insights
Great if you have the money
Splunk Enterprise Rocks !!
Real-time smart meters
Splunk Enterprise in the Cloud empowers me as an analyst
Robust IT Operations and SIEM Management Solution
Great for almost anything
Security/Data Analytics Solution That Comes with SIEM Capabilities
Splunk leads the pack
One Splunk to rule them all!
Splunk Enterprise review
Splunk Enterprise - Log collection & aggregation
Won't you take me to Splunkytown
Excellent product for our cybersecurity team
Splunk Enterprise: A powerful, but expensive tool
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Popular Features
- Custom dashboards and workspaces (54)8.585%
- Centralized event and log data collection (53)6.565%
- Event and log normalization/management (53)6.161%
- Correlation (52)6.060%
Reviewer Pros & Cons
Pricing
What is Splunk Enterprise?
Splunk is software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. It captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
40 people also want pricing
Alternatives Pricing
What is Blumira?
Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more defend against cybersecurity threats in near real-time. It's goal is to ease the burden of alert fatigue, complexity of log management and lack of IT visibility.
Product Demos
Splunk Incident Review Demo
Splunk Threat Intelligence Demo
Splunk Enterprise Security | Splunk Enterprise Installation | Splunk Training | Edureka
Features
Security Information and Event Management (SIEM)
Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools
- 6.5Centralized event and log data collection(53) Ratings
Effectiveness of real-time centralized event and log data collection
- 6Correlation(52) Ratings
Correlation of logs and events to pinpoint significant threats
- 6.1Event and log normalization/management(53) Ratings
Ability to normalize event syntax so that logs can be compared and are machine-understandable
- 7.5Deployment flexibility(49) Ratings
Ability to tune system to maximize threat detection and minimize false positives
- 7.5Integration with Identity and Access Management Tools(49) Ratings
Integration with access control tools like Active Directory and LDAP
- 8.5Custom dashboards and workspaces(54) Ratings
dashboards that can be customized to meet the needs of specific groups
- 7Host and network-based intrusion detection(37) Ratings
Ability to detect both endpoint intrusion and network ingress detection
- 8.3Data integration/API management(5) Ratings
Ease and quality of data integrations between SIEM and other systems
- 7.7Behavioral analytics and baselining(4) Ratings
How effectively activity and behavior baselines are established and maintained
- 7.8Rules-based and algorithmic detection thresholds(4) Ratings
Effectiveness of manually-established rules and algorithmically-determined detection thresholds
- 6.9Response orchestration and automation(4) Ratings
Quality of built-in response orchestration and automation in Next-Gen SIEM
- 7.9Reporting and compliance management(4) Ratings
Ease and quality of reporting and compliance functions
- 8.9Incident indexing/searching(5) Ratings
Effectiveness of searching across structured and unstructured events and incidents within SIEM
Product Details
- About
- Integrations
- Competitors
- Tech Details
- FAQs
What is Splunk Enterprise?
Splunk Enterprise Integrations
Splunk Enterprise Competitors
Splunk Enterprise Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(455)Community Insights
- Pros
- Cons
- Recommendations
Valuable Log Gathering and Summarization: Users have expressed positive opinions about Splunk's ability to gather and summarize log messages from multiple sources. Many reviewers find this feature valuable, as it allows them to easily access and analyze log data in a centralized location without the need for manual aggregation.
Simplicity and Advanced Search Capabilities: Splunk's reporting functionality is highly regarded by users for its simplicity and advanced search capabilities. Several reviewers appreciate how easy it is to use Splunk's reporting features, while also being able to perform complex searches that provide detailed insights into their data.
Effective Web Traffic Catching and Dashboards: The effectiveness of Splunk in catching web traffic and providing helpful dashboards is another aspect praised by users. Many reviewers highlight how Splunk's web monitoring capabilities enable them to track website activity effectively, while the intuitive dashboards allow for quick visualization and analysis of important metrics.
Confusing User Interface: Some users have reported that the user interface in Splunk can be perplexing, leading to difficulties in quickly performing tasks and navigating the software.
Limited Integration with Excel: Users have expressed their desire for improved integration between Splunk and Excel when it comes to creating reports and dashboards. They feel that better connectivity and seamless data transfer would enhance their workflow.
Steep Learning Curve: Several users have mentioned the complexity of Splunk's architecture, requiring a dedicated team of engineers to effectively manage and optimize its performance. This steep learning curve can pose challenges for new users who may need additional time and resources to fully grasp the intricacies of the platform.
Based on user reviews, the following recommendations emerged for using Splunk:
-
Ensure the correct subscription: Users emphasized the importance of having the correct subscription for Splunk to avoid login issues and fully utilize its features. They recommend careful planning of the deployment and learning as much as possible before implementing a large installation.
-
Thoroughly investigate anomalies: While Splunk's great dashboards for troubleshooting are praised, users advise against relying solely on system alerts generated by Splunk. They suggest continuing to investigate any anomalies and carefully setting up sources and background data in Splunk.
-
Utilize Splunk's log analysis capabilities: Many users recommend Splunk as a valuable tool for log analysis and improving the quality of current processes. They find it helpful for debugging integration issues and consider it suitable for large-scale applications/systems. Users appreciate its ability to connect to individual boxes and view multiple logs simultaneously.
It should be noted that some users suggest that there may be better and cheaper alternatives for small to medium-sized businesses, while others propose improvements to the search result UI and pricing structure to attract more users in the industry.
Attribute Ratings
Reviews
(1-2 of 2)Robust IT Operations and SIEM Management Solution
Splunk has the ability to correlate data from disparate data sources and provide root cause hence reducing MTTR and improving our SLA's with our customers. The events logged in Splunk help our IT Analyst and Security Analyst take proactive action before impacting the services which our customer uses. The Event Correlation helps us find RCA and improve MTTD and MTTR.
- Collect data from multiple data sources and correlate. Reduce alert noise from multiple monitoring systems.
- Monitor alerts and report on data collected. Create custom dashboards.
- Powerful machine learning and AiOPS functionality.
- Helps with our security compliance and addresses the security team's need to remain PCI compliant.
- Splunk data sizing and data collected. Worked with Professional Service to scale our environment.
- Capacity data storage for Splunk data.
- TuningSplunk analytics dashboards for performance.
- Centralized event and log data collection
- 90%9.0
- Correlation
- 90%9.0
- Event and log normalization/management
- 100%10.0
- Deployment flexibility
- 90%9.0
- Integration with Identity and Access Management Tools
- 90%9.0
- Custom dashboards and workspaces
- 90%9.0
- Host and network-based intrusion detection
- 90%9.0
- Improved MTTR for all our incidents.
- Reduced alert noise with powerful correlation engine.
- Performance Analytics dashboards.
- Network, Systems and Application Monitoring.
- Aggregation of Machine Data from different sources.
- Meaningful dashboards based on data collected to aid decision making.
- Integration with ticketing tools to automate ticket generation.
- Reduce noise from multiple monitoring tools.
- Automating actions based on alerts triggered.
- More Automation and invest in self healing Infrastructure.
- Price
- Product Features
- Product Usability
- Product Reputation
- Vendor Reputation
- Positive Sales Experience with the Vendor
- Third-party professional services
- Collecting Logs from some Storage Systems.
- Reporting
- Event and alert Correlation
- Ease of collecting Log from any sources
- Managing the data collected from a storage standpoint.
Splunk - the most flexible SIEM tool on the market.
- Splunk is flexible and extensible, able to ingest logs from disparate systems using disparate formats and disparate file types. If the ability exists to make the logs human readable (either natively or via a script), Splunk can ingest it.
- Splunk's flexibility in how you parse, format, and enhance your data is amazingly deep. When you start event typing, tagging, aliasing, and creating data models, you start to really open up Splunk's capabilities.
- Splunk scales very well in large environments. Adding additional indexers as your environment grows is pretty trivial and its ability to do multi-site clustering and search head clustering provides load balancing and redundancy that's inherent to the product.
- Splunk's search language goes very deep. To do some of the more advanced formatting or statistical analysis, there's a bit of a learning curve. Splunk training for learning the search language and manipulating your data can cost anywhere from $500.00 to $1500.00 (although a good number of free training exists).
- Splunk's dashboard capabilities are pretty decent but to do more exciting visualizations requires a bit of development using simple XML, Java script, and CSS.
- Splunk releases minor revisions very quickly but because of the sheer number of bugs we've run into, we've upgraded our environment four times in nine months.
- Centralized event and log data collection
- 100%10.0
- Correlation
- 60%6.0
- Event and log normalization/management
- 100%10.0
- Deployment flexibility
- 100%10.0
- Integration with Identity and Access Management Tools
- 100%10.0
- Custom dashboards and workspaces
- 100%10.0
- Splunk provided immediate results when an Active Directory change was made and our Windows AD team was unable to determine when or who had made the change. We were also able to provide information back to our CIRT for multiple security incidents and correlate what some thought was a DOS attack back to a massive scheduled data download occurring off hours.
- Because of Splunk's role in our PCI-DSS compliance requirements, the compliance office is expanding Splunk's role into SOX compliance as well. We're also being asked by multiple departments to be their official system of record for their system logs.
- Unfortunately, the decision to virtualize our environment means we're tied to some expensive storage solutions. We are currently facing difficult decisions with regards to data retention due to the cost.
- According to our database team, showcasing Splunk's capabilities saved their department $75,000 (USD) when they were able to meet their monitoring needs without buying an additional tool. Our mainframe team is doing a proof of concept with a tool called IronStream that integrates directly with Splunk to provide mainframe monitoring, essentially the only tool in existence to do so. Splunk is also replacing both some end-of-life SCOM tools as well as the soon-to-be EOL Symantec SIEM.
- HP Arcsight and IBM Security QRadar
- Product Features
- Product Usability
- Product Reputation
- Positive Sales Experience with the Vendor
- Analyst Reports
- Third-party Reviews
- Searching indexed data is pretty straight forward. You can do it without even really knowing the Splunk Search Language (SPL). Becoming intimately familiar with the SPL means you have a lot of flexibility in presenting and carving up your data how you want it.
- Splunk's ability to ingest data using a variety of methods makes Splunk stand out among its competitors. You can stream it directly to Splunk, install a forwarder on a system, used scripted inputs, or even just use WMI for Windows environments.
- All of Splunk's configuration files are flat text files which makes editing on the fly a breeze. The individual file specifications are well documented and the community support forum is extremely helpful.
- In large environments, you almost need dedicated Splunk engineers that have formal training to administer, onboard data, normalize data, and perform day-to-day operational tasks.
- The configuration files can be intimidating. Splunk's flexibility can be a double edged sword. Sometimes finding the right way and the best way to do a specific task isn't very easy.
- Sometimes, getting backend performance metrics out of Splunk can be like pulling teeth. While there are a number of Splunk Apps that can provide this information easily, it's not always in the format you want, so learning the SPL is a must.