Automated Reporting and monitoring tool
Updated May 30, 2023

Automated Reporting and monitoring tool

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

We use it for reporting error conditions. For example, whenever there is failed authentication beyond an acceptable rate, then we create alerts to the production support team to look into the actual issue before even the customer complains about it.
  • Error alert
  • Monitoring
  • Reporting
  • Dashboard
  • More clear menus
  • Multiple ways of creating report and alert is confusing
  • Include more help documents
  • Real-time monitoring of error condition had saved lot of time
  • Error log details helps to quickly locate the root cause of the issue
  • Manual report generation and statistics are automated, which made routine work much simpler
It’s good so far. It has so many features that automate routine work and save so much time and with greater accuracy. Real-time monitoring serves as a greater tool to figure out issues even before it’s informed by the customer. So quicker issue fixes and better performance and security can be achieved.
It’s easy to understand and simple to implement

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Well suited for:
1. Creating real-time alerts to monitor login issues by customers.
2. Scheduled Reports - save a lot of time where the routine manual report generation task is automated

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
8
Correlation
8
Event and log normalization/management
9
Deployment flexibility
9
Integration with Identity and Access Management Tools
8
Custom dashboards and workspaces
9
Host and network-based intrusion detection
9
Log retention
9
Data integration/API management
8
Behavioral analytics and baselining
8
Rules-based and algorithmic detection thresholds
9
Response orchestration and automation
9
Reporting and compliance management
9
Incident indexing/searching
8