Splunk Enterprise, Splunk ES, Incident Mgmt and SOAR - provides lots of capabilities for SOC & App teams.
February 21, 2022

Splunk Enterprise, Splunk ES, Incident Mgmt and SOAR - provides lots of capabilities for SOC & App teams.

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

Splunk ES is being used as the SIEM solution and has provided immense value to our cyber security team. A vast list of supporting apps developed by Splunk including the SOAR solutions has improved the capabilities of our team extensively. This has made life easier for Cyber Security Architects, Managers, Security Analysts, and Auditors. Totally Love Splunk and all its Apps. Also, waiting for more improvements in the Splunk ML toolkit.
  • Incident Mgmt
  • Correlation Search and Deep Dive Search
  • Investigations
  • SOAR integration
  • DNS Lookup
  • Data enrichment to make ES dashboard more useful
  • data add-ons
  • Acts as Data Lake
  • Centralized Cyber Security Solution
  • SOAR provides added benefits
  • Faster MTTD and MTTR
  • Better Correlation of data
Splunk has improved the Security posture of Cyber Security teams and provided business validation for fraud detection.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Best Suited 1. SIEM 2. Incident Mgmt 3. SOAR integration 4. Cyber Security Team Less Appropriate for ML

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
7
Deployment flexibility
10
Integration with Identity and Access Management Tools
8
Custom dashboards and workspaces
10
Host and network-based intrusion detection
8
Log retention
10
Data integration/API management
7
Behavioral analytics and baselining
7
Rules-based and algorithmic detection thresholds
7
Response orchestration and automation
10
Reporting and compliance management
9
Incident indexing/searching
10