Security Excellence and IT Ops Insights at your fingertips in a single place
January 03, 2024

Security Excellence and IT Ops Insights at your fingertips in a single place

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Cloud

We use Splunk Cloud to aggregate logs from various Cloud and on-premise applications and services into a single place for Security and IT Operations monitoring. This allows us to focus on a single platform and remove duplication of costs, training, data onboarding etc. We have alerts that are sent directly to operations teams and dashboards available for wallboards and aggregate data.
  • Easy to get data in
  • Rich user experience
  • Wide range of Splunk & Community add-ons
  • Unable to download configuration changes easily
  • Splunk Cloud has reduced the need for in-house Infrastructure Engineers due to the service being maintained by Splunk instead of ourselves.
  • We no longer need to pivot between multiple cloud provider tools to monitor multiple services.
We selected Splunk Cloud due to the simplicity to use and get data in. We found that Splunk Cloud gives a unified simple searching and dashboarding interface which can be used to search and visualise data from multiple systems with ease.

Do you think Splunk Cloud delivers good value for the price?

Yes

Are you happy with Splunk Cloud's feature set?

Yes

Did Splunk Cloud live up to sales and marketing promises?

Yes

Did implementation of Splunk Cloud go as expected?

Yes

Would you buy Splunk Cloud again?

Yes

Amazon CloudWatch, Amazon Elastic Compute Cloud (EC2), AWS Lambda, Docker, Cribl Stream, Cribl Search
Splunk Cloud is suitable for a range of scenarios and is outstanding in Security monitoring use-cases. Having the data in Splunk Cloud easily opens up the possibility to implement IT Ops monitoring using the same data, however Splunk Infrastructure Monitoring might be a better IT Ops tool if the data is not already in Splunk Cloud.

Splunk Cloud Feature Ratings

Centralized event and log data collection
8
Correlation
9
Event and log normalization/management
9
Deployment flexibility
8
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
9
Host and network-based intrusion detection
9
Log retention
10
Data integration/API management
9
Behavioral analytics and baselining
9
Rules-based and algorithmic detection thresholds
10
Response orchestration and automation
7
Reporting and compliance management
9
Incident indexing/searching
9