The main SOC application
February 13, 2026
The main SOC application

Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with Splunk Enterprise Security
Splunk Enterprise Security is used as the primary SIEM solution in my company, used by tens of SOC users for the detection and investigation of suspicious activities
Pros
- Detection of abnormal events at scale
- Support of the SOC activity
- Can be customized in depth
Cons
- the mapping of the data with the Common Information Model is difficult to maintain over time
- Data format changes are not detected automatically
- Splunk Enterprise Security support tens of SOC operators to track and investigate hundreds of security events every day.
- The SOC is a critical activity. Splunk Enterprise Security is one of if not the best solutions that makes it possible, and at scale
- Elastic Security and RSA Access Manager (Discontinued)
The fact that it is used by many large companies was a strong reason for selecting Splunk Enterprise Security.
After several demos and POCs, the teams were convinced of the value it brings: it demands the right amount of customization to fit with the company data sources.
Also the fact that my company also required a solution for application monitoring at the time was an reason to decrease the number of solutions used.
After several demos and POCs, the teams were convinced of the value it brings: it demands the right amount of customization to fit with the company data sources.
Also the fact that my company also required a solution for application monitoring at the time was an reason to decrease the number of solutions used.
Do you think Splunk Enterprise Security delivers good value for the price?
Not sure
Are you happy with Splunk Enterprise Security's feature set?
Yes
Did Splunk Enterprise Security live up to sales and marketing promises?
Yes
Did implementation of Splunk Enterprise Security go as expected?
Yes
Would you buy Splunk Enterprise Security again?
Yes
Comments
Please log in to join the conversation