Splunk SIEM Review
April 25, 2022

Splunk SIEM Review

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

Splunk is mainly used for a single point of correlated data from our security devices, load balancers, networking devices, emails, and proxies. With this, we are able to create dashboards and automation of our XDR technology.
  • Log correlation
  • Automation in XDR
  • Dashboards with recommendations
  • Just a thing that I would like to see differently is for it to provide daily reports of daily unusual behaviors
  • Although costly, Splunk is the best technology and support that is available in the market. The best thing to save up some budget is to avail of cloud-based deployment.
Overall, Splunk has huge log retention (even though it depends on the organization) what I meant here is the data correlated can be retained. Making it available in the cloud and saving it via S3 storage makes it very reliable as well.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Splunk based on its current established name in SIEM definitely meets the expectation in log management and EDR solutions. Enterprises will be able to provide adequate information to their executives because of how informative the data correlates.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
10
Deployment flexibility
10
Integration with Identity and Access Management Tools
10
Custom dashboards and workspaces
10
Host and network-based intrusion detection
10
Log retention
10
Data integration/API management
10
Behavioral analytics and baselining
10
Rules-based and algorithmic detection thresholds
10
Response orchestration and automation
10
Reporting and compliance management
10
Incident indexing/searching
10