It's an excellent platform for keeping track of the security of apps that are still being developed.
March 21, 2022

It's an excellent platform for keeping track of the security of apps that are still being developed.

Anonymous | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

Software developers and anyone working in the IT business must pay close attention to the security of the apps they are creating. As a result, Splunk Enterprise Security comes into play, which provides a variety of security services to assist us safeguard our web applications. It allows security teams to carry out security policies and to improve security operations on the system with optimized and smaller response time. It also provides capabilities like end-to-end data visibility from numerous sources, enables us to detect and analyze threats early and faster, conducts data breach practices and analysis, extensive reporting and many more.'
  • On a regular basis, user activity dashboards provide a snapshot of the most common threats.
  • The ability to simultaneously set up several log sources.
  • In addition to safeguarding network equipment, the domains for network protection also provide detailed statistics on the network's usage.
  • The interface might be extremely slow at times, resulting in a prolonged reaction time.
  • It takes a long time and a lot of effort to install it on a server.
  • Duplicating dashboards is a waste of time. Creating new dashboards is a regular occurrence for us.
  • Enhanced Perceptions
  • Organizations may save a lot of money by using artificial intelligence and behavioral analytics to spot abnormalities and dangers before they occur.
  • Machine learning is used to enhance the security framework and provide end-to-end visibility, resulting in increased productivity.
Cloud or on-premises deployment options make it incredibly adaptable. In order to avoid recurrence of incidents, artificial intelligence and behavioral analytics can be used to combine data from several sources. Through the use of saved records and repetitive activities detection, investigations can be conducted out and the relevant responses may be supplied quickly and efficiently.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

No

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Where you need to examine multiple logs to investigate system issues. Aids in large-scale log analysis, which it completes quickly and accurately. As soon as an issue is rectified, it sends out an alert to the relevant persons. This makes true reporting a lot easier. Investigations are aided by the availability of preserved logs.It also provides ideal protection for those of us who design video games to keep system intruders at bay.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
8
Correlation
6
Event and log normalization/management
9
Deployment flexibility
8
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
8
Host and network-based intrusion detection
9
Log retention
9
Data integration/API management
7
Behavioral analytics and baselining
9
Rules-based and algorithmic detection thresholds
8
Response orchestration and automation
9
Reporting and compliance management
7
Incident indexing/searching
8