Try our new research platform with insights from 80,000+ expert users

Huntress Managed SIEM vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Huntress Managed SIEM
Ranking in Security Information and Event Management (SIEM)
42nd
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Splunk Enterprise Security
Ranking in Security Information and Event Management (SIEM)
1st
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
327
Ranking in other categories
Log Management (2nd), IT Operations Analytics (1st)
 

Featured Reviews

Nick Fletcher - PeerSpot reviewer
Centralized management streamlines log collection while providing valuable resources
We use it for log collection on customers that have compliance requirements The single pane of glass management with the other security products we use from Huntress is incredibly valuable. It allows us to manage multiple Huntress products in a central place, and we don't have ten different…
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Huntress is a great company and incredibly helpful with deployment."
"The single pane of glass management with the other security products we use from Huntress is incredibly valuable."
"It can log more logs than other solutions. It's a good way to troubleshoot problems."
"The most valuable feature is the incident dashboard, and the extensive use of correlation searches, which isn't available with a standard Splunk search package. This feature is important to me because it enables SOC analysts to do their job more efficiently and be able to investigate or mediate incidents at a faster pace."
"What I really like is that even if you have already collected the data, you can extract fields and can build searches."
"It is very stable. We have not had any problems."
"The solution's newly developed dashboard is pretty amazing."
"You can use it to gather syslog messages from anything."
"It helps us uncover bottlenecks in the network."
"If properly built, I'm very impressed with the stability of Splunk ES."
 

Cons

"There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data."
"There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data."
"Data retention can be better. If we want to look at the data for five months or six months, that is not available to us."
"There is a learning curve in order to start using machine learning. We have been trying to do it for three years, and we have not managed anything. It is too complex."
"If possible, we would like to have not only a log monitoring system but a network monitoring feature in this solution as well."
"There can be a bit of complexity around some fields during the initial setup."
"Its search or filtering capability is nice, but it can be improved. It is currently a bit complicated, and it should be simplified. If we can write the search filter in a more simplified way, it would be better."
"Having analysts put their notes directly within the investigation feature in the incident review would be beneficial."
"The Web Application Firewall will send you too much information because it's more dedicated to security than a normal firewall."
"Its interface could be improved."
 

Pricing and Cost Advice

Information not available
"We have seen ROI and improvements as we have continued to use the product, but they are more reactive."
"I think the price could be improved."
"The licensing model can be expensive, but the value it provides is significant."
"This solution is costly. Splunk is obviously a great product, but you should only choose this product if you need all the features provided. Otherwise, if you don't need all the features to meet your requirements, there are probably other products that will be more cost-effective. It's cost versus the functionality requirement."
"Splunk Enterprise Security is affordable."
"Unlike other security tools, Splunk provides a fixed amount of gigabytes per day, and we are required to pay for any additional usage beyond that limit, in addition to our monthly cost."
"Splunk is priced higher than other solutions."
"Splunk ES is quite expensive compared to some products on the market."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Insurance Company
27%
Computer Software Company
11%
Educational Organization
9%
Manufacturing Company
6%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Huntress Managed SIEM?
There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data.
What is your primary use case for Huntress Managed SIEM?
We use it for log collection on customers that have compliance requirements.
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Overview

 

Sample Customers

Information Not Available
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Splunk, Wazuh, Microsoft and others in Security Information and Event Management (SIEM). Updated: August 2025.
865,384 professionals have used our research since 2012.