The Power and Robustness of Spunk Enterprise Security
June 15, 2022

The Power and Robustness of Spunk Enterprise Security

Itsik Bitran | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

Splunk Enterprise Security has helped me be able to have detection of threats in real-time, have analysis of alert generation and investigation.Log management and retention. I also use it for data visualization and analysis.
  • Superb reporting and visualization abilities.
  • Offers for creation and customization of dashboards used for file, log, and data monitoring.
  • Allows for collection of data from multiple sources.
  • The only issue I have with this software is that it's pricing is quite high.
  • Great results in Log management and retention.
  • Excellent system reports that enable us enhance system performance.
Splunk allows the collection of data from multiple sources as well as allowing integration with other apps like dynatrace, moogsoft, SolarWinds, AppDynamics, and many others to simplify work as well as data monitoring.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

No

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Splunk Enterprise Security is well suited to departments or organizations that have to deal with issues of real-time alerting to deal with threats ASAP.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
9
Correlation
8
Event and log normalization/management
8
Deployment flexibility
9
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
9
Host and network-based intrusion detection
9
Log retention
9
Data integration/API management
9
Behavioral analytics and baselining
9
Rules-based and algorithmic detection thresholds
9
Response orchestration and automation
9
Reporting and compliance management
9
Incident indexing/searching
9