New Splunk Enterprise Security user
June 15, 2022

New Splunk Enterprise Security user

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

My organization recently implemented Splunk Enterprise Security into our network environment within the last 60 days. The biggest business problem that we wish to solve with Splunk Enterprise Security is cyber security and network data visualization. Previous to implementing Splunk Enterprise Security, my organization did not have any data visualization tools and we are excited to use the tools found within Splunk Enterprise Security.
  • Data visualization
  • Anomaly detection
  • Investigation Support
  • I feel I am too new of an Enterprise Security user to make an accurate assessment
  • Faster MTTD
  • More detailed analysis
My organization is very happy with the scalability of Splunk Enterprise Security.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Splunk Enterprise Security (ES) go as expected?

I wasn't involved with the implementation phase

Would you buy Splunk Enterprise Security (ES) again?

Yes

So far, I am a fan of Splunk Enterprise Security. As previously stated my organization recently started using the service, so we (my organization) are still trying to learn what we can do with such a powerful tool.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
7
Correlation
8
Event and log normalization/management
8
Deployment flexibility
8
Integration with Identity and Access Management Tools
8
Custom dashboards and workspaces
8
Host and network-based intrusion detection
10
Log retention
10
Data integration/API management
7
Behavioral analytics and baselining
7
Rules-based and algorithmic detection thresholds
8
Response orchestration and automation
9
Reporting and compliance management
10
Incident indexing/searching
9