Splunk Enterprise Security is one of best solution Splunk has provided.
June 17, 2022

Splunk Enterprise Security is one of best solution Splunk has provided.

Shilpi Jain | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

We use Splunk Enterprise Security to manage threat connect and other security-related issues, as security is the backbone of any industry.WE also used to address akamai, malicious email, and other network-related threats. This is really helpful to address PCI content and is easy to include or exclude or monitor particular email IDs or websites that may be suspicious.
  • Threat Connect
  • PCi compliance
  • Akamai
  • may be more in PCI compliance
  • and more in malicious emails
We are able to cover all the cases we have got in the past but still, there is a lot of scope for improvement as day by day cybercrime is increasing and going to the next level.
We have both of these instances in our organization.

Do you think Splunk Enterprise Security (ES) delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security (ES)'s feature set?

Yes

Did Splunk Enterprise Security (ES) live up to sales and marketing promises?

Yes

Did implementation of Splunk Enterprise Security (ES) go as expected?

Yes

Would you buy Splunk Enterprise Security (ES) again?

Yes

Splunk Enterprise Security search head works so well for threat connect and Paul alto networks along with monitoring incidents and dashboards are working great. We would like to see more AI for help in the detection of suspicious mail activity as day by day these kinds of activities are increasing so if there will be more scanning with the help of AI that would be more helpful.

Splunk Enterprise Security (ES) Feature Ratings

Centralized event and log data collection
6
Correlation
6
Event and log normalization/management
5
Deployment flexibility
5
Integration with Identity and Access Management Tools
6
Custom dashboards and workspaces
5
Host and network-based intrusion detection
5
Log retention
5
Data integration/API management
5
Behavioral analytics and baselining
4
Rules-based and algorithmic detection thresholds
4
Response orchestration and automation
4
Reporting and compliance management
6
Incident indexing/searching
6