One Splunk to rule them all!
March 12, 2020

One Splunk to rule them all!

Ahmet Fatih IRKLI | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise

Splunk Enterprise is used across the whole department in our organization for Security information
and event management. It improves our security aspect of the assets by collecting logs. Splunk offers log collection from all types of assets in the environment varying from vulnerability scanning tools to network devices. Centralizing all these logs and managing them from one place is the real deal. It manages huge amounts of log data with a robust operation. Every day our environment creates dozens of logs and Splunk enables us to
see anomalies with alarms.
  • Maximize endpoint logging.
  • Can find and store logs from all types of assets.
  • Customization of dashboards.
  • Creating apps based on your needs.
  • Alarm feature alerts relevant people in the organization.
  • Data visualization.
  • Search queries can be saved for future or even can be converted to apps.
  • Slow interface.
  • Has made the security team's job much easier.
The support team has helped a lot.

Do you think Splunk Enterprise delivers good value for the price?

Yes

Are you happy with Splunk Enterprise's feature set?

Yes

Did Splunk Enterprise live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise go as expected?

Yes

Would you buy Splunk Enterprise again?

Yes

Tenable.sc (formerly SecurityCenter), Nessus, Netsparker, Checkmarx, Zimbra
I definitely recommend Splunk Enterprise to security and network teams as it is perfectly scalable for any size environment.
  • Network teams can easily see if there is a problem with the network device.
  • The security team can easily be notified about anomalies that may due to an intrusion.
  • The support team can follow the situation of assets and tools.
  • It can be integrated with most of the tools available on the market.

Splunk Enterprise Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
10
Deployment flexibility
9
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
10
Host and network-based intrusion detection
10