Experience with Splunk
June 01, 2022

Experience with Splunk

Anshuman Vardhan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

Splunk Enterprise Security is used as a risk analysis security monitoring and reporting tool. It helps in real-time treatment detection in our networks and ultimately settles it down. Splunk is such a tool that provides us with deeper insights into our network filling the gap in security intelligence by actively participating in the network. Reporting is another feature that we use regularly.
  • Deeper insights in network.
  • Threat detection.
  • Lightning fast searches.
  • Detailed reporting.
  • Reduction in price.
  • Integrations with more softwares.
  • It has helped us in spending less time in market.
  • Has increased our efficiency.
  • Helpful in reduction of operating cost.
It's because the product is very helpful to us and is helping us daily from a security point of view through all aspects.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Not sure

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

It has proved to be a great help when it comes to threat detection and deep network insights. The best feature of the software that we all admit is the user interface which is quite easy to navigate through the different options. Then comes customizations where we can customize all aspects of the tool and we can automate workflows.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
8
Correlation
9
Event and log normalization/management
8
Deployment flexibility
9
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
8
Host and network-based intrusion detection
7
Log retention
9
Data integration/API management
9
Behavioral analytics and baselining
9
Rules-based and algorithmic detection thresholds
8
Response orchestration and automation
9
Reporting and compliance management
9
Incident indexing/searching
8