Splunk Cloud is a great solution for SIEM
October 13, 2019

Splunk Cloud is a great solution for SIEM

Joseph Sweet | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Cloud

Splunk Cloud is being used by our IT security operation and our DevOps team. It is being used similarly to a SIEM for aggregating log data and running analysis on it for generating alerts. It replaced Sumo Logic which was producing too many poor alerts and was not as robust of a solution. It supports our SOC well, and it makes our security team's job much easier. We are also using it in DevOps as a pilot for APM.
  • Reduced the amount of time needed from internal security resources (freed up at least 3 FTEs).
  • Reduced the cost per daily GB ingests of our SIEM by 33%.
  • Allowed us to migrate to a lower cost SOC model.
Splunk Cloud blows Sumo Logic out of the water. The experience is night and day. We went from several highly stressed IT security professionals who were unsure if the data they were getting was valuable, to very happy IT security professionals who can now be more proactive and get all the information they need.
Whenever we have an issue, it gets resolved quickly and beats SLAs. Splunk Cloud support is knowledgeable, responsive and quick. We have never had an issue getting what we need when we need it.

Do you think Splunk Cloud delivers good value for the price?

Yes

Are you happy with Splunk Cloud's feature set?

Yes

Did Splunk Cloud live up to sales and marketing promises?

Yes

Did implementation of Splunk Cloud go as expected?

Yes

Would you buy Splunk Cloud again?

Yes

Splunk Cloud has been great for our security environment and helping us becoming more proactive at addressing security concerns. For us, it has great transparency in terms of cost and allows for good scalability as we right-size our environment. It is great for developing easy to follow dashboards that you can share across your user environment.

Splunk Cloud Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
10
Deployment flexibility
10
Integration with Identity and Access Management Tools
Not Rated
Custom dashboards and workspaces
10
Host and network-based intrusion detection
10