Splunk ES Review
September 12, 2023

Splunk ES Review

Sam Babbitt | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise Security (ES)

I was evaluating Splunk for a potential client. Splunk is a great tool for anyone that needs a SIEM to monitor data, networks, users, etc. The customization of the Dashboard is ideal for anyone to setup and use for an easy display of information. The alerts are incredibly helpful for notification of any problems

Pros

  • Develop dashboards and notables to track security-relevant details
  • Data correlation
  • threat monitoring and detection

Cons

  • more efficient searches
  • Multiple ways of creating report and alert is confusing
  • Multiple ways of creating report and alert is confusing
  • Faster MTTR
  • Training ended up being costly, but over projected to be high ROI over time
  • Dashboards provide better context for our executives
Splunk ES has definitely helped us attain our security goals. Within our own organization we have been able to improve our own security hygiene, while with clients we have been able to better present their own security concerns or points of focus and provide relevant solutions through dashboards and custom reports.
We had problems scaling this product out to the floor.
Imperva Web Application Firewall (WAF), Juniper Mist Edge, Wazuh

Do you think Splunk Enterprise Security delivers good value for the price?

Yes

Are you happy with Splunk Enterprise Security's feature set?

No

Did Splunk Enterprise Security live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Splunk Enterprise Security go as expected?

No

Would you buy Splunk Enterprise Security again?

No

It is very easy to connect data sources and manipulate data sets of any size

Splunk Enterprise Security Feature Ratings

Centralized event and log data collection
7
Correlation
7
Event and log normalization/management
8
Deployment flexibility
6
Integration with Identity and Access Management Tools
8
Custom dashboards and workspaces
8
Host and network-based intrusion detection
8
Log retention
6
Data integration/API management
7
Behavioral analytics and baselining
7
Rules-based and algorithmic detection thresholds
7
Response orchestration and automation
6
Reporting and compliance management
8
Incident indexing/searching
7

Comments

More Reviews of Splunk Enterprise Security