We use Splunk Enterprise Security to monitor our network environment for abnormal activities and threats.
Cyber Security Analyst at Clarusway
Is user-friendly, can easily monitor multiple environments, and reduces alerts
Pros and Cons
- "The most valuable feature of Splunk Enterprise Security is website activity monitoring."
- "While Splunk Enterprise Security offers valuable features, its cost is high and could be more competitive."
What is our primary use case?
How has it helped my organization?
We easily monitor multiple cloud environments with Splunk Enterprise Security.
Insider threat detection helps our security posture.
I use the threat intelligence management feature whenever I do a threat analysis.
When Splunk detects breaches and malicious activities it notifies our IT team so they can analyze the notifications and respond accordingly.
Splunk has helped our organization by allowing us to gain valuable insight through the analysis of large datasets.
The customizable dashboards are user-friendly and visually appealing.
It has helped reduce our alert volume.
It has helped speed up our security investigations.
What is most valuable?
The most valuable feature of Splunk Enterprise Security is website activity monitoring.
What needs improvement?
While Splunk Enterprise Security offers valuable features, its cost is high and could be more competitive.
Buyer's Guide
Splunk Enterprise Security
September 2025

Learn what your peers think about Splunk Enterprise Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Splunk Enterprise Security for around five months.
What do I think about the stability of the solution?
Splunk Enterprise Security is stable.
How are customer service and support?
We frequently connect with the support team to review our options. They resolve our issues quickly.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We also use IBM QRadar but Splunk Enterprise Security is more functional and user-friendly.
What's my experience with pricing, setup cost, and licensing?
Splunk Enterprise Security is expensive.
What other advice do I have?
I would rate Splunk Enterprise Security eight out of ten.
For someone who wants to use the cheapest solution, I would tell them that this is the best solution and worth the cost.
I recommend Splunk Enterprise Security to others.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Analyst, TSG Information Security Cyber Operations at a consultancy with 5,001-10,000 employees
Lots of learning materials, responsive support, and good visualization capabilities
Pros and Cons
- "There are lots of free learning materials on their website."
- "The level of scalability depends on the license you have. You can expand or reduce it based on the environment. It does cost more money to scale, however."
What is our primary use case?
We use the product mostly just to pull out the reports, medical investigations, et cetera. As a security analyst, we can look at and pull data. You can make a central hub for a lot of different sources, including servers and endpoints. It makes it easy to check logs for every device connected.
How has it helped my organization?
If you are a data analyst, security analyst, or anyone who basically requires a set of data in your database job, and you have to have normalized data represented or, just to check for any patterns, this is quite helpful. With Splunk, you can pull in the data, you can transform it, and represent the data via graphs or pull the data and export it into Excel and perform further investigations. The use cases are quite deep.
What is most valuable?
With this product, you can go for an in-depth search or just perform a surface-level search. There are different modes in which you can perform searches, and that basically defines the speed of how fast you can get the data. If you are going for a more detailed version offered, it'll take a bit of time. However, they'll give you more and more data. There's also a fast mode in it.
The data which you can pull, you can basically visualize it, you can normalize the data, evaluate it, and convert the data into tables. It's much easier to pull the data, organize it, and normalize it as you are performing the searches. That's quite helpful.
I prefer working with cloud infrastructure like this as you can increase the storage capacity or the license at any time and search for a number of different endpoints. If you want to ingest more and more data, having something like Splunk available on the cloud is preferable.
I take advantage of the incident response part of the solution. If anything happens at the endpoint, if anything happens at the user system, servers, or something like that, my role is to look into the logs, go through other investigations, perform a time scan, and create a timeline of all the events. This helps do that job.
I'm also aware they have a Mission Control. I have actually attended a few surveys on that, however, I haven't really implemented it due to the fact that we are in the middle of a few of the projects, and things are at higher priority as of now. So we haven't really focused on that.
Using Splunk, we can check out what server versions we have. If we just cross-check with the database, we can see if we have any availability and then we can pull in the files. If you have a database, you can perform a query to check for any particular problems in the entire environment. For the threat notifications, it's quite helpful.
Indirectly, it's helped us reduce our alert volume. If you have a list of files, you can run it through the environment and, based on that, create rules and exceptions. This indirectly helps reduce alert amounts. You can go through false positives and sort them out as well and create a rule against them.
It's helped speed up security investigations. Being a central hub of logs, we can jump into a different log or source and jump into any investigation. You don't have to jump from one tool to another. This automatically reduces the investigation time.
There are lots of free learning materials on their website.
Overall, things are quite easy. It's a simple solution.
What needs improvement?
I haven't explored beyond the security aspect as a data analyst. I haven't noticed any shortcomings so far.
For how long have I used the solution?
I've been using the solution for more than a year now.
What do I think about the stability of the solution?
There are different modules, and I haven't activated all yet, however, the stability is okay. I would rate it seven out of ten. If we run into issues, there are materials they provide and online support. You can even call them.
What do I think about the scalability of the solution?
The solution is deployed to one location. It's deployed across the entire environment.
The level of scalability depends on the license you have. You can expand or reduce it based on the environment. It does cost more money to scale, however.
I would rate scalability seven out of ten.
How are customer service and support?
Support is quite responsive. They also offer 24/7 support services.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Palo Alto XDR.
I also used an email solution whose name I can't recall. You could check emails flowing into or out of your environment.
How was the initial setup?
I wasn't involved in the deployment; the solution was set up when I arrived.
That said, I did go through some setup videos, and the process does not look difficult. They provide the steps for every aspect. There's also always support you can reach out to if you have questions.
There may be some maintenance required in terms of upgrading. When you upgrade the version, you may need to upgrade your sensors on the endpoints. However, Splunk is quite compatible with other devices, so it's not difficult. In our company, the administrators handle maintenance.
What was our ROI?
I haven't witnessed an ROI in terms of how I'm using the tool.
What's my experience with pricing, setup cost, and licensing?
It's mostly for EDR. You can cover servers as well; however, that requires additional licenses. Pricing is based on usage. As an EDR specialist, I interact with the tools and perform investigations. I don't deal with licensing directly.
This is quite new to me. I've only recently started working with Splunk. I used to work in EDR. It took me two to three months to understand the internal architecture of the organization, and based on that, I can use Splunk for all kinds of searches. So, how long it takes to realize the benefits of Splunk depends on the person and the complexity of the environment.
Which other solutions did I evaluate?
I did not evaluate other options. I adopted this tool when I joined my current organization.
What other advice do I have?
We're a Splunk customer.
To those considering just going with the cheapest solution, it depends on your level of comfort with support. If you have a cheaper tool, the support would be addressed. With Splunk, that's the difference - their support response. If you have a tool with a good license, you will be able to get immediate help if there's any vulnerability.
I'd rate the solution eight out of ten.
I'd advise others to take time to learn the solution and develop skills. It's all about DSL queries. If you are off on queries, it won't give you any results. You need to be accurate with your SQL commands.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Splunk Enterprise Security
September 2025

Learn what your peers think about Splunk Enterprise Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Senior Consultant at Ernst & Young
Excellent data dashboards, visualization effects, and threat detection
Pros and Cons
- "Recently, Splunk upgraded to version 9.0.02, which includes excellent data dashboards and visualization effects."
- "We will receive alerts only for the administrators and deployment servers, but not for all servers."
What is our primary use case?
We provide services to our clients as a security operations center and we utilize Splunk Enterprise Security for enterprise security purposes, encompassing various use cases based on client requirements. These include network attacks, malware-related attacks, inbound traffic-related attacks, recurrent activities, web-related detections, internal detections related to root flows, and service account-related use cases.
We are working to secure the enterprise's networks, devices, and infrastructure, as well as enhance overall security. Our goal is to monitor and protect against all types of external cyber-attacks. We will diligently monitor the systems and address any issues at the earliest stage possible.
Splunk Enterprise Security can be deployed both on-premises and in the cloud. We have primarily deployed the solution on Splunk Cloud.
How has it helped my organization?
We utilize Splunk Enterprise Security for monitoring multiple cloud environments. By employing an API, we can deploy various forwarders within Splunk. These forwarders gather logs from diverse cloud sources and other types of sources. Consequently, we have the ability to install an API from the Splunk store, enabling us to seamlessly connect with cloud sources such as CloudWatch, AWS, and other similar platforms. Splunk Enterprise Security offers comprehensive visibility across numerous environments.
Splunk Enterprise Security offers excellent threat detection capabilities to help our organization identify unknown threats. Additionally, we utilize threat feeds that index various anomalies. We have integrated threat intelligence platforms, which provide indicators such as advisories and engagement in case of compromises and attacks. This integration assists us in preventing attacks within our environment. Initially, we can obtain this information through the threat feeds. Consequently, we can restrict and block operating systems either within Splunk itself or through other security tools.
We also utilize threat intelligence. We have access to threat feeds from various sources, such as VPN. The threat intelligence management feature allows us to collect detailed information in the event of a data breach affecting an organization on other websites or within the dark web itself. We receive such information, along with details of any attacks or incidents occurring in different environments worldwide. We can obtain these threat feeds instantly through the cyber news channel mentioned.
The threat topology and MITRE ATT&CK features are integrated, allowing us to obtain the tactics, techniques, and processes necessary to solve any remediation process. By deploying the TTP MITRE ATT&CK framework in any use case, we can acquire a detailed explanation and determine the appropriate course of action to follow. Checking the MITRE enables us to easily resolve and remediate any issues. This helps us address any errors or crashes effectively, by following the simple steps outlined by MITRE. It allows us to easily identify and rectify issues, without the need to involve a senior person if they are unfamiliar with the specific use case. Additionally, it enables us to quickly verify and provide remediation, specifically tailored to the respective team that needs to take action.
Splunk Enterprise Security's ability to analyze malicious activities and detect breaches is advantageous to me. When compared to other tools I have used previously, it involves a straightforward SQL query, allowing me to quickly modify the reports in less than five minutes.
Splunk Enterprise Security has helped us detect threats faster. We can integrate multiple security tools, and we can retrieve logs at any time using simple queries, utilizing various indexes and forwarders. These components handle log parsing and aggregation, enabling us to easily identify all the security rules detected using Splunk. For instance, if we provide a hostname or IP source, we can obtain a list of the security details detected in that specific instance.
Splunk Enterprise Security has helped our organization reduce the threats and breaches from security attacks across various threat factors.
Our clients quickly realize the benefits of Splunk Enterprise Security, which is why they have continued to use it for so many years.
Splunk Enterprise Security has helped us reduce our alert volume. The total reduction in volume depends on the new use cases or devices that are onboarded. Initially, there may be a high alert volume, but we will analyze and work based on those alerts. Through this process, we cannot definitively state the exact percentage reduction, but it does significantly reduce the number of false positives in the environment, thanks to fine-tuning the use cases.
Splunk Enterprise Security has helped accelerate our security investigations. Splunk also offers the Phantom SOAR, although I am not currently utilizing it. However, I am familiar with the Splunk platform, which can automate the process and promptly detect and block various types of actions. We can also easily analyze the Splunk programming language.
Splunk can save our analysts ten minutes of additional time compared to our previous solution when resolving alerts, provided that we have the necessary query knowledge.
What is most valuable?
Recently, Splunk upgraded to version 9.0.02, which includes excellent data dashboards and visualization effects. This upgrade makes it easier for me to implement all the dashboards. I have created a dashboard that showcases all the VPN monthly data in one place, which is a beneficial feature of the new visualization effects.
What needs improvement?
There are deployment servers and other servers, and sometimes Splunk may encounter issues if there are non-reporting devices. We will receive alerts only for the administrators and deployment servers, but not for all servers.
When upgrading Splunk, we encounter certain issues. For instance, it does not accept older versions of the other tools we use. This is the main problem. For example, if we are using a ticketing tool or any other XDR or EDR solutions, we need to upgrade them when we upgrade Splunk. During this process, we will encounter some difficulties, resulting in delays. Ideally, the upgrade process should first accept the current versions and then prompt for an upgrade, allowing us sufficient time to upgrade the other solutions. This helps ensure business continuity, although it may introduce some delays in upgrading all these processes.
For how long have I used the solution?
I have been using Splunk Enterprise Security for five years.
What do I think about the stability of the solution?
Splunk Enterprise Security is stable.
What do I think about the scalability of the solution?
We are satisfied with the scalability of Splunk Enterprise Security. It can increase its capacity and functionality based on our demands.
How are customer service and support?
Splunk technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used ArcSight for Level 1 monitoring in my previous company, and my current company was using Splunk Enterprise Security when I joined.
What was our ROI?
We have witnessed a 60 percent return on investment due to the security that the solution offers to our organization.
What's my experience with pricing, setup cost, and licensing?
Unlike other security tools, Splunk provides a fixed amount of gigabytes per day, and we are required to pay for any additional usage beyond that limit, in addition to our monthly cost. I believe this pricing structure is reasonable for medium and large organizations.
What other advice do I have?
I rate Splunk Enterprise Security nine out of ten.
An organization that wants a CM solution but prefers to go with the cheapest option may work for a small organization, but not for medium and large ones. Splunk Enterprise Security is worth the cost for larger organizations.
Splunk Enterprise Security is deployed in a single location where it collects logs from various assets, infrastructure, and security tools. It serves as a monitoring tool, allowing us to view all the logs in a unified platform, including security tools, network scanners, portability management tools, and other infrastructure components such as Windows servers, Mission servers, and devices. Integration of these components occurs through different platforms like SCM or other platforms, enabling us to monitor everything in a single user interface using Splunk.
Maintenance is necessary for updates and patches. Additionally, we must be prompt with deployments as we need to monitor the health checks of the devices reporting to Splunk. It's crucial to remain active in this process to avoid any potential impact, so we should be mindful of that. Two admins are usually enough for maintenance, and if we encounter any issues, we can contact Splunk client support.
Resilience is important to capture all threat activities and threat speeds, such as IOCs, but we primarily focus on the ESF application. We integrate various threat intelligence platforms, including Splunk, which provides threats from different sources.
I recommend Splunk Enterprise Security as long as it fits within the budget.
Splunk Enterprise Security's single pane of glass enables us to easily monitor everything from one centralized location. Additionally, with its simple query language, we can retrieve all the logs in one place and generate reports quickly. This is exactly what security personnel require: fast reports and comprehensive log monitoring. It allows us to efficiently check all the security tools simultaneously.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
SIEM engineer at Broadcom Inc.
Fantastic tool that we couldn't do our work without
Pros and Cons
- "It has increased our business resilience. It's a top-of-the-line SIEM security product. It's the best tool for our security analysts which helps them do their job better. That then protects our company from adversary actors."
- "I've never had too many issues with the stability. Years ago we had indexes crash but that was more on us. We didn't understand how to properly size Splunk."
What is our primary use case?
Our use cases are mostly for security and detection, basic use cases. It's always been a security use case. We never used it for observability or ITSI.
Our analysts use it a lot.
What is most valuable?
I like that it's a review panel, you can see all of your alerts. Another valuable feature is that it integrates with other apps like UBA and SOAR.
I also like the guided alert creation. The guided alert creation is useful, especially for new people who don't know CPL.
It's a premium app, it's easy to use and intuitive.
Enterprise Security has one pane of glass for all of our alerts. We still use the Enterprise Security page where we keep track of everything.
It's very important to us that Splunk offers end-to-end visibility into our environment. It has the ability to identify any security events or if data is reingested, we'll get an alert for that. End-to-end visibility is very important for a mature security program.
Splunk helped to ingest and normalize data. Anytime that we put data in, we always normalize the SIEM model. ES runs off of that so it helps us to dot our I's and cross our T's. It helps us to use our data effectively.
It has tools to reduce our alert volume. We get a lot of alerts. It's more of a tuning thing than anything that the app can help with.
It provides us with the relevant context to help guide our investigations. It's really useful in that aspect.
It hasn't reduced our MTTR. SOAR would do that. It has helped our mean time to detect.
It has increased our business resilience. It's a top-of-the-line SIEM security product. It's the best tool for our security analysts which helps them do their job better. That then protects our company from adversary actors.
What needs improvement?
For how long have I used the solution?
I have been using Splunk Enterprise Security for about five years.
What do I think about the stability of the solution?
I've never had too many issues with the stability. Years ago we had indexes crash but that was more on us. We didn't understand how to properly size Splunk. If you work within the required parameters, it's stable.
How are customer service and support?
Their support is great. I've never had any issues with them.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup was pretty straightforward unless you add a search head cluster. Then it becomes a lot more complicated very fast. Other than that, it's not too bad. It's pretty simple and intuitive. I've done it before and it's not difficult especially if you have the docs to help you.
What was our ROI?
I can't speak to the dollar amount but we see ROI in the way that it helps the analysts to better do their work. It helps keep track of things and having one pane of glass for all things data.
What other advice do I have?
I would rate Splunk Enterprise Security a nine out of ten. It's a top-of-the-line product. It allows analysts to do their jobs better. It's a single pane of glass. It's a fantastic tool that we couldn't do our work without.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head Senior Manager, Security Operations Center at a financial services firm with 10,001+ employees
Helps us normalize our data because it comes with predefined dashboards
Pros and Cons
- "The most valuable function is the notable events. When I joined the team, I asked them what they could currently see, and they said nothing. I was pretty shocked. I know for a fact that they're using Enterprise Security or at least they had purchased it. I told them that there are several dashboards within Splunk that we can leverage. There is also notable events where we can see potential incidents or potential alerts about the infrastructure and the network itself."
- "I would like to have fraud detection features. Fraud is within the same turf as with security operations. Fraud and cybersecurity work hand in hand. I would like to have detection capabilities, or at least dashboards in Enterprise Security for fraud."
What is our primary use case?
We use Splunk Enterprise Security for a lot of use cases. We use the predefined use cases and dashboards for AWS, notable events, endpoint detection network, and audit notable events.
What is most valuable?
The most valuable function is the notable events. When I joined the team, I asked them what they could currently see, and they said nothing. I was pretty shocked. I know that they were using Enterprise Security or at least they had purchased it. I told them that there are several dashboards within Splunk that we can leverage. There is also notable events where we can see potential incidents or potential alerts about the infrastructure and the network itself.
The dashboards give us numbers for malware infection. So long as those dashboards are actionable, they help the SOC team a lot.
It's important to respond to incidents in a timely manner. Having end-to-end visibility across the board equips the team to make sure that whatever incident happens, it has a very minimum impact on the business. It also allows us to fix things that need to be fixed immediately. That's the asset of having end-to-end visibility across the board.
Enterprise Security really helps us normalize our data because it comes with predefined dashboards, so we only need to ingest the logs and Splunk will do the work to display what we need to see on a day-to-day basis.
When we started using Splunk, we had tons of false positives. We reduced our alerts by 90%. Most of our alerts now are actionable.
What needs improvement?
I would like to have fraud detection features. Fraud is within the same turf as with security operations. Fraud and cybersecurity work hand in hand. I would like to have detection capabilities, or at least dashboards in Enterprise Security for fraud.
There's already a fraud offering from Splunk for fraud use cases but it's different. I need to get professional services for me to get that feature. It would be much more cost-efficient for customers if all those dashboards could be readily available within ES.
For how long have I used the solution?
I have been using Splunk Enterprise Security since I joined my company in 2019, so it's been roughly five years.
What do I think about the stability of the solution?
Cisco just acquired Splunk so I expect the stability to still be the same since Cisco is established.
How are customer service and support?
I would rate support a nine out of ten because there's always room for improvement.
How would you rate customer service and support?
Positive
What other advice do I have?
I would rate Splunk Enterprise Security an eight out of ten. To make it a perfect ten, I would like to see them implement the fraud detection features.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
MSP ENGINEER at bitsIO Inc.
Helps streamline incident responses, provide visibility into our environment, and reduce alert volume
Pros and Cons
- "Splunk Enterprise Security stands out for its ability to integrate with existing security tools, provide informative dashboards, and offer IT Service Assurance functionality that goes beyond basic threat detection to include service performance monitoring."
- "Splunk Enterprise Security offers a vast amount of information to learn and comprehend, resulting in a challenging initial learning curve."
What is our primary use case?
Our security relies on Splunk Enterprise Security to analyze data models for malware, threats, and MITRE ATT&CK techniques. Pre-built dashboards and multiple correlation searches help us identify anomalies. Any suspicious events flagged by the MITRE framework are categorized and assigned as tickets to our engineers for investigation and mitigation.
How has it helped my organization?
Splunk has streamlined our incident response by automating key processes. For instance, alerts trigger upon exceeding three failed login attempts, automatically assigning tickets for review. Similarly, unauthorized access attempts from unfamiliar regions are automatically blocked. These automated data-driven responses significantly improve our overall incident response efficiency.
The customizable dashboards offer great visualization and extra add-ons.
Splunk Enterprise Security helps us to easily monitor multiple cloud environments.
Mission Control lets us monitor and manage our security from a single panel.
Based on my short experience, I would rate Splunk Enterprise Security eight out of ten for its ability to analyze malicious activity.
Splunk Enterprise Security helps reduce our alert volume.
Splunk Enterprise Security streamlines our security investigations by providing a central platform and offering a growing library of add-ons that expand our investigative capabilities.
What is most valuable?
Splunk Enterprise Security stands out for its ability to integrate with existing security tools, provide informative dashboards, and offer IT Service Assurance functionality that goes beyond basic threat detection to include service performance monitoring.
What needs improvement?
Splunk Enterprise Security offers a vast amount of information to learn and comprehend, resulting in a challenging initial learning curve.
Extracting logs from Splunk for analysis in other applications is crucial for me. This would allow me to identify correlations between data sets and make informed decisions about next steps. Unfortunately, the current Splunk workflow seems to hinder data verification.
The licensing cost could be more competitive, as some of our competitors offer lower prices.
For how long have I used the solution?
I have been using Splunk Enterprise Security for one year.
What do I think about the stability of the solution?
We have encountered issues when updating features where Splunk Enterprise Security doesn't work properly. I would rate the stability of Splunk Enterprise Security seven out of ten.
How are customer service and support?
The technical support team is always supportive but their response time and knowledge can be improved.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment was straightforward.
What's my experience with pricing, setup cost, and licensing?
The license for Splunk Enterprise Security is expensive.
What other advice do I have?
I would rate Splunk Enterprise Security eight out of ten.
We have Splunk Enterprise Security deployed across multiple locations.
The resilience Splunk offers is good.
I recommend Splunk Enterprise Security to others.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Consultant at Sitael
Is flexible, and provides good actionable intelligence, but is expensive
Pros and Cons
- "Splunk Enterprise Security offers two valuable features: the Common Information Model and arrangement modules."
- "While Splunk offers SOAR as a separate product, integrating it into the next version of Splunk Enterprise Security as a unified solution would be beneficial."
What is our primary use case?
Splunk Enterprise Security is used for security monitoring. It helps manage the governance of the security monitoring from the start of an incident to the resolution.
How has it helped my organization?
Splunk Enterprise Security offers excellent visibility across multiple environments. It's a flexible platform with virtually no limitations.
The actionable intelligence provided by the threat intelligence management feature is good.
Splunk Enterprise Security does a good job analyzing malicious activities and detecting breaches.
Splunk Enterprise Security helps us detect threats much faster than before.
Depending on the client and their configuration, Splunk Enterprise Security can help reduce their alert volume by under 50 percent.
Splunk Enterprise Security helps our clients expedite security investigations. It achieves this by streamlining the process of finding evidence and incident logs within Splunk's data module.
What is most valuable?
Splunk Enterprise Security offers two valuable features: the Common Information Model and arrangement modules. The CIM helps standardize data for efficient searches, while arrangement modules automate incident log processing by enriching them with contextual client information.
What needs improvement?
While Splunk offers SOAR as a separate product, integrating it into the next version of Splunk Enterprise Security as a unified solution would be beneficial.
For how long have I used the solution?
I have been using Splunk Enterprise Security for 2 years.
What do I think about the stability of the solution?
Splunk Enterprise Security is stable.
What do I think about the scalability of the solution?
Splunk Enterprise Security is scalable.
How are customer service and support?
The technical support experience is moderate. It can take a long time to resolve issues, and I often need to explain the problem to multiple support representatives. Ideally, I would have a single point of contact assigned to my ticket throughout the entire process.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup of Splunk Enterprise Security involves moderate complexity. Deployment time can vary significantly, ranging from one hour to one month, depending on the environment's complexity.
What's my experience with pricing, setup cost, and licensing?
Splunk Enterprise Security is expensive.
What other advice do I have?
I would rate Splunk Enterprise Security 7 out of 10.
I suggest integrating SOAR with Splunk Enterprise Security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. consultant
Cyber Security Trainer and Programmer at Freelancer
Quickly identifies threats, secures our environment faster, and reduces alert volumes
Pros and Cons
- "The Splunk queries are valuable."
- "I would like the ability to view logs for specific instances and not have to pull the logs for the entire Cloud environment in Splunk."
What is our primary use case?
We use Splunk Enterprise Security to teach our students about security awareness in a more positive way. We can show them how these tools work and the benefits they bring. This will help them understand the importance of using Splunk Enterprise Security, not just for our clients, but for ourselves as well.
How has it helped my organization?
The Splunk dashboards are user-friendly.
I would rate Splunk's threat topology an eight out of ten. The threat topology provides a complete map so we can investigate security incidents quickly.
To effectively utilize Splunk for malicious activity analysis, a comprehensive understanding of the different event types and their functionalities is crucial. This involves examining specific events associated with potential malware, such as changes in system behavior. By gaining clear visibility into these events, we can identify the malware's goals within our environment and stop it.
Splunk helps us detect threats within three minutes.
We realized the benefits of Splunk within eight months. Splunk Enterprise Security helped secure our environment faster than other security solutions.
Splunk has helped reduce our alert volume.
What is most valuable?
The Splunk queries are valuable. There are a lot of query options available in Splunk compared to Sumo Logic.
What needs improvement?
It is difficult to monitor multiple cloud environments using Splunk.
I would like the ability to view logs for specific instances and not have to pull the logs for the entire Cloud environment in Splunk.
As the number of environments monitored by Splunk increases, the resource demands also grow, potentially slowing down the system.
Splunk's threat intelligence system gets a seven out of ten. There are frequent delays in updates, which can take up to three months for Splunk to make available.
For how long have I used the solution?
I have been using Splunk Enterprise Security for one year.
What do I think about the stability of the solution?
I would rate the stability of Splunk Enterprise Security ten out of ten.
The resilience is good. I have not faced any issues.
What do I think about the scalability of the solution?
I would rate the stability of Splunk Enterprise Security nine out of ten.
How are customer service and support?
The technical support team is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward. Splunk provides wonderful documentation to help with the deployment.
What's my experience with pricing, setup cost, and licensing?
Splunk Enterprise Security is priced lower than competitors.
Splunk Enterprise Security is a good choice for startup companies because of the lower cost.
What other advice do I have?
I would rate Splunk Enterprise Security nine out of ten.
Maintenance is required to address the false positive alerts.
I recommend Splunk Enterprise Security to others.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Splunk Enterprise Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Security Information and Event Management (SIEM) Log Management IT Operations AnalyticsPopular Comparisons
CrowdStrike Falcon
Microsoft Sentinel
IBM Security QRadar
Elastic Security
Grafana Loki
Splunk AppDynamics
Elastic Observability
Graylog Enterprise
Security Onion
Cortex XSIAM
Palantir Foundry
Buyer's Guide
Download our free Splunk Enterprise Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which would you recommend to your boss, IBM QRadar or Splunk?
- What are some of the best features and use-cases of Splunk?
- What SOC product do you recommend?
- Splunk as an Enterprise Class monitoring solution -- thoughts?
- What is the biggest difference between Dynatrace and Splunk?
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- What are the advantages of ELK over Splunk?
- How does Splunk compare with Azure Monitor?
- New risk scoring framework in the Splunk App for Enterprise Security -- thoughts?
- Splunk vs. Elastic Stack