One Splunk to rule them all!
March 12, 2020

One Splunk to rule them all!

Ahmet Fatih IRKLI | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Splunk Enterprise

Splunk Enterprise is used across the whole department in our organization for Security information
and event management. It improves our security aspect of the assets by collecting logs. Splunk offers log collection from all types of assets in the environment varying from vulnerability scanning tools to network devices. Centralizing all these logs and managing them from one place is the real deal. It manages huge amounts of log data with a robust operation. Every day our environment creates dozens of logs and Splunk enables us to
see anomalies with alarms.
  • Maximize endpoint logging.
  • Can find and store logs from all types of assets.
  • Customization of dashboards.
  • Creating apps based on your needs.
  • Alarm feature alerts relevant people in the organization.
  • Data visualization.
  • Search queries can be saved for future or even can be converted to apps.
  • Slow interface.
  • Has made the security team's job much easier.
The support team has helped a lot.

Do you think Splunk Enterprise delivers good value for the price?


Are you happy with Splunk Enterprise's feature set?


Did Splunk Enterprise live up to sales and marketing promises?


Did implementation of Splunk Enterprise go as expected?


Would you buy Splunk Enterprise again?

Yes (formerly SecurityCenter), Nessus, Netsparker, Checkmarx, Zimbra
I definitely recommend Splunk Enterprise to security and network teams as it is perfectly scalable for any size environment.
  • Network teams can easily see if there is a problem with the network device.
  • The security team can easily be notified about anomalies that may due to an intrusion.
  • The support team can follow the situation of assets and tools.
  • It can be integrated with most of the tools available on the market.

Splunk Enterprise Feature Ratings

Centralized event and log data collection
Event and log normalization/management
Deployment flexibility
Integration with Identity and Access Management Tools
Custom dashboards and workspaces
Host and network-based intrusion detection