Try our new research platform with insights from 80,000+ expert users

ExtraHop Reveal(x) for IT Operations vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 13, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ExtraHop Reveal(x) for IT O...
Ranking in IT Operations Analytics
14th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
8
Ranking in other categories
Network Monitoring Software (74th), Network Diagnostics (13th), Network Packet Capture (8th)
Splunk Enterprise Security
Ranking in IT Operations Analytics
1st
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
327
Ranking in other categories
Log Management (2nd), Security Information and Event Management (SIEM) (1st)
 

Mindshare comparison

As of August 2025, in the IT Operations Analytics category, the mindshare of ExtraHop Reveal(x) for IT Operations is 2.4%, up from 1.7% compared to the previous year. The mindshare of Splunk Enterprise Security is 23.6%, down from 28.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
IT Operations Analytics
 

Featured Reviews

Out West - PeerSpot reviewer
Great for identifying application interdependencies with helpful support but needs better visualizations
We're just trying to identify the application interdependencies, which normally reside on different servers, including web servers, database servers, enterprise service bus, et cetera, up to your presentation layer before we start moving stuff around. Normally, the reason why we use these tools is to understand what assets we have, where they're deployed, and how they enter and operate before we decide to go move something from point A to point B. The solution is going to allow me to establish a wave or migration plan where you have different waves of migration and then you actually have move groups to try and get your application moved from A to B seamlessly. A to B could be on-premise to on-premise. It could be on-premise to cloud. Et cetera. The solution can tell me what components can I deploy, for example, into a cloud space, without having to refactor my applications since that can be quite time-consuming and costly.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are security detections, perimeter detection, dashboards, and alerts."
"The most valuable feature is the way it handles data, from Layer 2 up to Layer 7. We can see everything that happens in the network."
"There are many valuable features in this product, but probably the biggest is the customization capability it has."
"This solution is more applications reference architecture focused. Its benefit is that it specializes in that space."
"Not only can you look at the protocol import level. It also has a live PCAP analysis."
"Wire data analytics."
"The solution's most valuable feature is its data modeling."
"The most valuable feature of Splunk is the management and built-in workflows."
"I haven't had the chance to properly sink my teeth into Enterprise Security but so far I like that they added the MITRE ATT&CK features."
"Splunk's visualizations make it easy for users to understand the data."
"The product is generally stable and forgiving."
"We used it to create a custom anomaly detection data model to monitor the activity of our back-end services on an hourly basis relative to the past three months of activity."
"The solution's most valuable feature is the dashboard, which allows us to see everything on the same page and provides easy visibility into problems."
"The product is good, it satisfies our customers."
 

Cons

"They either have to go broad or decide what their bread and butter is and get really good at that."
"They have a new solution, ExtraHop Reveal(x), and I think it needs improvement."
"Network visibility is something that needs to be improved."
"This solution would be improved if it had the ability to retain data longer."
"We'd like to see a local presence within the region in order to have seamless service whether it's the support, the implementation, or professional services."
"I would improve the Rule-Based Access Control (RBAC) by providing granular access control to the data."
"Make it easy to use and the cost cheaper. This will help all organisations to implement Splunk."
"Their technical support sucks."
"When files are absent, troubleshooting becomes difficult, and performance issues inevitably arise."
"I would like some additional AI capabilities to provide additional information about things going wrong and things going well."
"I would like Splunk to add more integration. QRadar has many indications with more products than Splunk."
"Although the technical support is adequate, there is still room for improvement."
"Areas of Splunk Enterprise Security that could be improved include the need for training and certifications. We are planning to do certifications, and there are many features, such as risk-based score and score detection, where the current training doesn't provide visibility to the analyst."
"Its deployment is difficult. I remember when I first started learning, I faced several challenges, especially when deploying VMware in a virtual environment."
 

Pricing and Cost Advice

"The pricing is higher than other solutions, but with such good features, I think it's worth it."
"The price of this solution for our environment is about £650,000 ($855,000 USD) for three years."
"The pricing is fair considering the value provided."
"The pricing model is expensive and a nightmare based on the amount of data."
"Splunk Enterprise Security is an expensive solution."
"The price can always be lower, but it is fair at the moment. The cost efficiencies depend on the licensing and how much data we are bringing in. We have a fairly large footprint, so it is cost-effective."
"It can be cost-prohibitive when you start to scale and have terabytes of data. Its cost model is based on how much data it processes a day. If they're able to create scaled-down niche or custom package offerings, it may help with the cost. Instead of the full-blown features, if they can narrow the scope where it can only be used for a specific purpose, it would kind of create that market for the product, and it may help with the costing. When you start using it as a central aggregator and you're pumping tons of logs at it, pretty soon, you'll start hitting your cap on what it can process a day. Once you've got that, you're kind of defeating the purpose because you're going to have to scale back."
"The pricing could be made more competitive."
"My customers have found the price of the solution to be high."
"It would be nice if the pricing were cheaper. However, we did purchase it."
"Most people share the same thought that the ingestion rates can get pretty pricey. There is a lot of work we do to curate the data that we send to Splunk so that it is not too noisy or too expensive."
report
Use our free recommendation engine to learn which IT Operations Analytics solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Financial Services Firm
19%
Computer Software Company
13%
Educational Organization
10%
Healthcare Company
8%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Ask a question
Earn 20 points
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Overview

 

Sample Customers

Alaska Airlines, bet365, Concur, McKesson, Microsoft, Morgan Stanley, Practice Fusion, Seattle Children's Hospital, Steward Health Care System
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about ExtraHop Reveal(x) for IT Operations vs. Splunk Enterprise Security and other solutions. Updated: July 2025.
865,295 professionals have used our research since 2012.