mind-blowing product, a complete savior from threats.
May 17, 2022

mind-blowing product, a complete savior from threats.

Sachin Vinay | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

Splunk Enterprise Security (ES) has helped us a lot in threat detection, monitoring, and log analysis in a quick and efficient way. Even though we have Next-generation firewalls with logging systems, Splunk has helped us a lot in getting historic data with clear logs and helped us more in researching vulnerabilities. Best in the business.
  • Highly data oriented and high quality live monitoring system
  • Specific and accurate logging system
  • Helpful for advanced researchers and phd scholars.
  • Should improve on the commercials.
  • User Interface is not really the best.
  • Fit only for knowledgeable professionals, should have friendly dashboard.
  • we were able to enhance the security level.
  • threats could be identified easily.
  • It is bit costly, so budgets got easily exhausted.
Splunk Enterprise Security (ES) deserves 10/10,but requires to be bit user-friendly to all kind of users. Definitely a trustworthy Application for an enterprise.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Splunk Enterprise Security (ES) is well suited for enterprises that are concentrated more on live security and are running highly secure applications that require continuous attention, for example, defense projects. It is not required for small-scale, less confidential businesses where security comes behind other criteria. Overall a top-class and enterprise product.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
8
Correlation
9
Event and log normalization/management
9
Deployment flexibility
9
Integration with Identity and Access Management Tools
Not Rated
Custom dashboards and workspaces
8
Host and network-based intrusion detection
8
Log retention
8
Data integration/API management
9
Behavioral analytics and baselining
9
Rules-based and algorithmic detection thresholds
9
Response orchestration and automation
7
Reporting and compliance management
8
Incident indexing/searching
9