

Splunk User Behavior Analytics and Lumu are competing products in the cybersecurity field. Lumu appears to have an edge due to its innovative features, despite Splunk User Behavior Analytics being favored for pricing and support.
Features: Splunk User Behavior Analytics specializes in identifying insider threats with anomaly detection and forensic analysis. It provides comprehensive indexing and powerful search capabilities and supports integration with other cybersecurity tools. Lumu excels in enhancing threat intelligence by continuous traffic monitoring to spot compromised assets, offers an easy-to-use interface with minimal alert fatigue, and provides an effective real-time detection system.
Room for Improvement: Splunk User Behavior Analytics could improve by reducing its setup complexity, enhancing user interface simplicity, and offering more cost-effective pricing options. Lumu may benefit from expanding its feature set to cover broader threat scenarios, offering more detailed analytics dashboards, and improving integration with additional third-party tools.
Ease of Deployment and Customer Service: Splunk requires significant integration and configuration effort but is supported by dedicated teams. Lumu provides a streamlined deployment model with minimal setup time and is praised for responsive support that efficiently resolves issues.
Pricing and ROI: Splunk User Behavior Analytics demands higher initial setup costs, considered justified by long-term ROI through scalability and insights. Lumu offers a cost-effective setup with reports of strong ROI due to rapid threat mitigation and lower operational overhead, making it potentially better value with its cost-efficiency in delivering security outcomes.
It self-reports as saving 10 to 20 hours a week of engineer time.
The solution can save costs by improving incident resolution times and reducing security incident costs.
It picks up on borderline issues that matter.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
Stability has been excellent.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
Having some sort of certification or training, along with more periodic webinars might be helpful.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
In our environment, it costs approximately 1200 a month.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
It provides peace of mind knowing that any device on our network, whether it is our own, BYOD device, or an unauthorized device, is being tracked and analyzed at multiple levels.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
| Product | Mindshare (%) |
|---|---|
| Lumu | 2.0% |
| Splunk User Behavior Analytics | 2.9% |
| Other | 95.1% |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
Lumu detects and validates network compromises by analyzing metadata like DNS, NetFlow, and proxy logs. It provides real-time indicators and context to enhance detection, improve threat visibility, and reduce investigation time.
Lumu offers organizations a streamlined solution to identify network compromises through comprehensive metadata analysis, including DNS, NetFlow, and proxy logs. By providing real-time compromise indicators alongside contextual information, Lumu elevates threat visibility and shortens investigation durations. Its simple interface and integration flexibility with platforms, alongside automated incident responses, highlight its value. While users appreciate limited false positives, ease of use, and the context provided, enhancements in SIEM and XDR integration, asset context enrichment, and reporting are areas users would like to see further developed.
What features define Lumu?Organizations use Lumu to monitor outbound traffic, detect compromised endpoints, log firewall activities, and enable active threat blocking. Its integration ease via API supports threat detection across LAN and Wi-Fi, monitoring email traffic, and acting as a managed SOC for security event coordination. Companies appreciate Lumu's adaptability in hybrid environments and its ability to efficiently locate and analyze threats within network metadata, ensuring quick deployment and extendibility across external platforms.
Splunk User Behavior Analytics focuses on data aggregation and threat detection with automation, deepening insights into user behavior. It offers usability, stability, and strong integration capabilities, making it a preferred choice for organizations needing comprehensive security management.
This platform enhances security management through customizable dashboards and real-time updates. Advanced analytics for anomaly detection and behavioral profiling, coupled with powerful indexing and search capabilities, enable thorough user behavior analysis. Users experience streamlined integration with Active Directory and other monitoring tools. However, improvements are needed in dashboard customization, customer support, and analytics tools to boost user experience. Organizations use Splunk User Behavior Analytics primarily for monitoring and analyzing user behavior, integrating various data sources for effective threat detection while maintaining governance.
What are the key features of Splunk User Behavior Analytics?Splunk User Behavior Analytics is widely implemented across industries for threat detection and insider threat identification. By integrating with tools like Active Directory for monitoring and anomaly detection, organizations benefit from robust security management and effective log analysis. It underpins efforts in security, data indexing, and combining data for comprehensive threat prevention.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.