Awesome tool for vulnerability analysis, threat detection and penetration testing
July 19, 2022

Awesome tool for vulnerability analysis, threat detection and penetration testing

Sachin Vinay | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk SOAR

We are mostly using SPLUNK SOAR for all our cybersecurity research-oriented sectors, mainly for PhD scholars and pg. students who are doing projects in cybersecurity. Also we have a lot of production servers which require advanced threat monitoring and logging which could be easily satisfied with Splunk SOAR software.
  • precise handling of vulnerabilities with efficient algorithms
  • excellent alerting system with in-detail solutions
  • quality templates of reporting specific security events.
  • Require more advancement in real time threat monitoring
  • dashboards are less user-friendly, not fit for end users with basic networking knowledge.
  • Advanced features come with a high price, when compared to its competitors
  • Reporting errors and rectifying security loopholes are relatively simple.
  • Many required features are available in the free version
  • Data security and management is more controlled with Splunk SOAR
Currently, Splunk SOAR beats all its competitors with its improved algorithms for detecting advanced threats. Moreover, solutions to the existing problems in the infrastructure are also evaluated easily with Splunk. Overall we could suggest it to any cyber security enthusiasts for its remarkable performance in this sector. I would rate it as an above-average product.

Do you think Splunk SOAR delivers good value for the price?

Yes

Are you happy with Splunk SOAR's feature set?

Yes

Did Splunk SOAR live up to sales and marketing promises?

Yes

Did implementation of Splunk SOAR go as expected?

Yes

Would you buy Splunk SOAR again?

Yes

Splunk can be suggested for research-oriented educational institutions, cyber research projects, Ph.D. scholars, etc. as it has scope for detailed information on the threat patterns, vulnerability checks, and advanced networking concepts. It is less suited for normal enterprises that are less concerned with data integrity and also for cloud-based solutions.