We use Splunk Enterprise Security for 24-hour monitoring and security log checks.
Archtect at a financial services firm with 1,001-5,000 employees
It's easy to use and provides clear visibility, but we have a high volume of alerts
Pros and Cons
- "We evaluated several solutions and selected Splunk due to the functionality and cost."
- "Splunk Enterprise Security is complicated in terms of developing specific cybersecurity use cases."
What is our primary use case?
How has it helped my organization?
It is easy to monitor multiple cloud environments with Splunk Enterprise Security. The visibility into multi-cloud environments is good.
We have some open-source tools integrated with Splunk that help with threat intelligence.
Even though we already have several SIEM solutions in place, their similarities make adopting Splunk Enterprise Security a breeze.
Splunk Enterprise Security helps speed up our investigations.
What needs improvement?
Splunk Enterprise Security is complicated in terms of developing specific cybersecurity use cases.
Our alert volume is still high and we are working on reducing those.
For how long have I used the solution?
I have been using Splunk Enterprise Security for six months.
Buyer's Guide
Splunk Enterprise Security
February 2026
Learn what your peers think about Splunk Enterprise Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,933 professionals have used our research since 2012.
What do I think about the stability of the solution?
Splunk Enterprise Security is stable.
How are customer service and support?
The technical support was responsive and knowledgeable.
Which solution did I use previously and why did I switch?
Compared to Sumo Logic which is organized, Splunk Enterprise Security is complicated.
How was the initial setup?
While the deployment was straightforward, it took a few months to complete because we had to make customizations to fit our specific environment.
What's my experience with pricing, setup cost, and licensing?
Splunk is priced similarly to other SIEM solutions.
Which other solutions did I evaluate?
We evaluated several solutions and selected Splunk due to the functionality and cost.
What other advice do I have?
I would rate Splunk Enterprise Security seven out of ten.
We're currently integrating our log sources with Splunk. Once logs are flowing, we'll deploy security monitoring use cases with alerts. We'll then explore Splunk's further capabilities.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Architecture Associate Director, Infrastructure at a tech vendor with 10,001+ employees
Provides good granularity and log analysis
Pros and Cons
- "The solution's most valuable features are the granularity and analysis of the logs."
- "Splunk Enterprise Security incurs a significant cost because of the amount of data we send, but we are fine with the value we're getting for that price."
What is our primary use case?
We're using the solution for log analysis and our internal infrastructure. We may use it for customer offering at some point, but currently, it's completely internal.
What is most valuable?
The solution's most valuable features are the granularity and analysis of the logs. Once you learn the syntax, it's a great tool. These features are important to us because they enable us to drill down to certain users doing certain things and perform trend analysis.
For how long have I used the solution?
I have been using Splunk Enterprise Security for well over a year.
What do I think about the stability of the solution?
We’ve had no issues with the solution’s stability.
What do I think about the scalability of the solution?
We have 90,000 users and deal with massive amounts of data volume.
How are customer service and support?
The solution’s technical support is fantastic.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using IBM's TSM backup tool and our own internal tool. We switched to Splunk Enterprise Security because we wanted to be more of a cloud-forward company and didn't want to host everything on-premises.
What about the implementation team?
We installed the solution mostly by ourselves, but we did have a little help. We installed heavy forwarders at a relatively low cost. Since we already had a VMware environment, we just set up the VMs for the forwarding.
What was our ROI?
We have seen a return on investment with the tool in terms of seeing what users are doing.
What's my experience with pricing, setup cost, and licensing?
Splunk Enterprise Security incurs a significant cost because of the amount of data we send, but we are fine with the value we're getting for that price.
What other advice do I have?
The tool provides much more insight into what users and our apps do. We also use the solution to monitor a lot of machine-to-machine traffic.
We have a hybrid environment. All of our internal tooling is in our internal data centers, but we also have a big cloud presence for some of our other tooling and mostly for our customers. Speaking from the internal side, Splunk Enterprise Security has been fantastic in helping us find all kinds of security events every day.
Splunk Enterprise Security has helped improve our organization's ability to ingest and normalize data. The solution has helped us have everything in one place and grab everything at once. The tool has also helped us solve problems in real time. The Ops team will approach us when they are stuck with a problem ticket. We can look instantly, see what's happening, and track it down.
The solution provides us with the relevant context to help guide our investigations. This context information makes things easier and faster for us. We get more information about exactly what's going on.
Splunk Enterprise Security has helped us save around 50% of our time.
Splunk Enterprise Security has helped reduce our mean time to resolve by 50%.
Overall, I rate the solution ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Splunk Enterprise Security
February 2026
Learn what your peers think about Splunk Enterprise Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,933 professionals have used our research since 2012.
Manager at a consultancy with 1-10 employees
Provides constant monitoring and good visibility, but is not user-friendly
Pros and Cons
- "Compared to IBM QRadar, Splunk Enterprise Security offers faster alert resolution."
- "Splunk has a steeper learning curve, making it feel less user-friendly."
What is our primary use case?
We use Splunk Enterprise Security for security correlation and event management.
Splunk Enterprise Security is deployed as a hybrid model where the core component is on the cloud and is integrated with an on-premises solution.
How has it helped my organization?
Splunk Enterprise Security offers strong visibility through readily available use cases and supports integrations with most standard log sources. Its search capabilities are also commendable. Compared to other tools, Splunk Enterprise Security delivers superior visibility.
While we haven't integrated UEBA yet, it's in our plans. As a proactive monitoring solution, UEBA offers several benefits. It can identify Indicators of Compromise based on historical threat intelligence and generate alerts for suspicious activities. This allows us to potentially detect compromised accounts or ongoing attacks before they cause significant damage.
Splunk offers its threat intelligence service, which helps prevent IP replication and malicious threats. This information can be integrated or configured for our specific use cases, delivering more relevant and high-value insights.
Threat topology and MITRE ATT&CK are frameworks used to understand and analyze attack patterns and techniques, which can then be used to formulate and refine IOCs.
Splunk Enterprise Security's effectiveness in analyzing malicious activities or detecting breaches depends heavily on its configuration and correlation settings. Therefore, it's impossible to definitively label any tool as inherently good or bad. Ultimately, its success hinges on the organization's implementation. This includes onboarding the tool with the appropriate block sources for security detection, employing a sound risk assessment methodology, and aligning the tool's capabilities with both business and security use cases. When configured correctly, Splunk Enterprise Security can undoubtedly contribute to improvements in MTTD and MTDL.
Splunk Enterprise Security helps us detect threats faster. It allows us to define use cases, integrate with multiple threat feeds, and even connect to vulnerability solutions. In essence, by configuring all relevant log sources and defining appropriate use cases, we can achieve the primary objective of any SIEM solution: reducing mean time to protection.
Splunk Enterprise Security has reduced our investigative time by 25 percent by consolidating all logs into a central console. This eliminates the need to log into individual tools for log retrieval.
Splunk Enterprise Security helps reduce the number of false positive alerts.
What needs improvement?
In terms of monitoring capabilities, Splunk Enterprise Security performs adequately. However, its user interface requires training for efficient use. Compared to competitors like IBM QRadar, McAfee Nitro, and RSA Security Analytics, Splunk has a steeper learning curve, making it feel less user-friendly.
For how long have I used the solution?
I have been using Splunk Enterprise Security for almost four months.
How are customer service and support?
We use a licensed third-party Splunk partner for support, and I haven't heard of any issues so far.
Which solution did I use previously and why did I switch?
Compared to IBM QRadar, Splunk Enterprise Security offers faster alert resolution. Its superior indexing and searching capabilities deliver quicker query results. While QRadar boasts a more user-friendly interface, Splunk provides numerous pre-built use cases that effectively reduce false positives and feature comprehensive application dashboards.
For instance, I encountered a use case unavailable in QRadar which appears to utilize the Cyber Kill Chain framework. MITRE ATT&CK enjoys wider adoption, and Splunk leverages this framework whereas QRadar persists with the Cyber Kill Chain. Additionally, Splunk integrates with a third-party app exchange, offering functionalities like vulnerability dashboards, threat intelligence, correlation dashboards, and EPS dashboards. This extensive library of applications caters to diverse business use cases. Users can install these applications as needed, making Splunk a highly customizable and feature-rich solution. Although undeniably expensive, its capabilities justify the cost.
What's my experience with pricing, setup cost, and licensing?
While Splunk is a powerful enterprise tool, I'm new to it myself. I've heard Splunk is often preferred over other options, but the cost can be prohibitive for smaller organizations.
There are cheaper SIEMs available, but they require much more manual configuration, typically by developers with scripting knowledge. Splunk does not require this manual configuration, and its parsing, indexing, and visibility are superior.
What other advice do I have?
Based on the limited time I have been using the solution and the feedback I have received from other users, I would rate Splunk Enterprise Security a six out of ten.
Without a SIEM solution, we rely on individual point solution consoles. For example, logging into a firewall reveals only local logs. Imagine the firewall detects suspicious IPs generating unusual traffic. Confirming this as a true or false positive is difficult solely based on firewall rules. Conversely, a SIEM offers multiple options for correlation. Say the firewall denies traffic, and threat intelligence identifies the source IP as malicious. Additionally, web server logs might show suspicious activity or bad actors attempting an attack. With multiple logs and threat indicators, the chance of false positives drops significantly. Correlation enables confirmation of genuine traffic versus malicious activity. Without a SIEM, pinpointing true attacks from false positives becomes challenging.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Project Manager at Hilti
Offers valuable logs, has good visibility, and accelerates our security investigations
Pros and Cons
- "The most valuable features are the logs, which allow us to identify what happened and who interacted with the web repository."
- "Some of the queries are difficult to run and have room for improvement."
What is our primary use case?
I utilize Splunk Enterprise Security to gather logs, and subsequently, I provide the team with access to the servers through a change management ticket or incident. I wasn't involved in the installation process during my tenure as a Windows server lead. I also verify whether all our actions adhere to the compliance framework.
Our deployment of Splunk Enterprise Security was all on-premises.
How has it helped my organization?
The visibility that Splunk Enterprise Security provides is beneficial and valuable.
Splunk Enterprise Security helped analyze malicious activities.
With Splunk Enterprise Security we were able to detect threats faster.
Splunk Enterprise Security contributed to a reduction in alert volume as our employees became aware of being monitored and ceased accessing the server without proper authorization.
Splunk Enterprise Security has significantly accelerated our security investigations by centralizing all log data and enabling us to quickly retrieve the necessary information through simple queries.
What is most valuable?
The most valuable features are the logs, which allow us to identify what happened and who interacted with the web repository.
What needs improvement?
Some of the queries are difficult to run and have room for improvement.
For how long have I used the solution?
I am currently using Splunk Enterprise Security.
What do I think about the stability of the solution?
I would rate the stability of Splunk Enterprise Security ten out of ten. We have never had an issue with stability.
What do I think about the scalability of the solution?
Splunk Enterprise Security is scalable.
Splunk Enterprise Security's resilience is a valuable asset.
What's my experience with pricing, setup cost, and licensing?
Organizations seeking a more affordable solution should first carefully evaluate their specific business requirements. While cheaper alternatives exist, they may lack the necessary features to adequately address their security needs. In such cases, Splunk Enterprise Security could be a more suitable option.
Splunk Enterprise Security is a worthwhile investment given the comprehensive range of features it offers.
What other advice do I have?
I would rate Splunk Enterprise Security eight out of ten.
I recommend Splunk Enterprise Security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Helps reduce threat detection time, security investigation time, and alert volumes
Pros and Cons
- "The most valuable feature of Splunk Enterprise Security is the comprehensive logging capabilities it provides."
- "Given the ever-increasing number of threats, I would like Splunk to update its threat signatures more frequently."
What is our primary use case?
We use Splunk Enterprise Security to identify and resolve critical issues and errors within our environment.
How has it helped my organization?
The visibility that Splunk Enterprise Security provides is good. We can easily find the data we need using the logs.
Monitoring multiple cloud environments using Splunk Enterprise Security was not difficult.
Splunk Enterprise Security's insider threat detection capabilities enable us to effortlessly identify unknown threats and anonymous user behavior.
Splunk Enterprise Security helped us analyze malicious activities and detect breaches between 50 to 90 percent faster.
Splunk Enterprise Security has helped reduce alert volumes by up to 90 percent.
Splunk Enterprise Security has helped speed up our security investigation time by almost 90 percent.
What is most valuable?
The most valuable feature of Splunk Enterprise Security is the comprehensive logging capabilities it provides.
What needs improvement?
The price of Splunk Enterprise Security is high and can be improved.
Given the ever-increasing number of threats, I would like Splunk to update its threat signatures more frequently.
For how long have I used the solution?
I have been using Splunk Enterprise Security for one and a half years.
What do I think about the stability of the solution?
Splunk Enterprise Security is stable.
What do I think about the scalability of the solution?
Splunk Enterprise Security is scalable.
The resilience of Splunk allows organizations to protect their data and resolve vulnerabilities quickly.
How are customer service and support?
The technical support provides good resolution.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I had previously used Loggly, developed by SolarWinds and Elastic. However, I found it to be inaccurate and slow. Elastic offers a free version of its solution, which is more commonly used by smaller businesses.
What about the implementation team?
The implementation was completed by a third party.
What's my experience with pricing, setup cost, and licensing?
Splunk Enterprise Security is expensive. I would rate the cost an eight out of ten with ten being the most expensive.
I recommend Splunk Enterprise Security over cheaper SIEM solutions because of its offerings.
What other advice do I have?
I would rate Splunk Enterprise Security nine out of ten.
Splunk Enterprise Security does not require any maintenance. It is plug-and-play.
I recommend Splunk Enterprise Security for organizations that want to detect threats quickly.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Defense protection study manager at Ministère de la Défense
The search feature is fast and comprehensive
Pros and Cons
- "I like the search feature and the indexing. It's very fast and comprehensive."
- "Splunk is very expensive. The license is based on the volume of the logs ingested. I was responsible for managing the contract with our service integrator. I don't know the precise details of the competing solution, but I have heard that Splunk is more expensive than others. I don't know what the going rate is on the market, but I think there are at least two competitors that are less expensive. We have experienced a few issues with our service providers in terms of log filtering and ingestion, so we continue to pay a bit more per day for our logs."
What is our primary use case?
We use Splunk for log analytics, blocking dangerous files, etc. It helps to shape our security policies. Splunk is managed by our service provider, but we regularly get security insights from them.
What is most valuable?
I like the search feature and the indexing. It's very fast and comprehensive. It's easily tuned by your service provider, so I can quickly find the results I'm seeking. So it's very practical. We are working with the search feature and using multiple indexes that combine devices from different environments, so it's easy to collect information across environments.
We can relatively quickly detect some malicious activities based on attack patterns and implement use cases configured by our service provider with help from Splunk. It improves the speed of threat mitigation because you can gather information about the attack patterns from a few days of online activity to block threats and take the necessary actions.
For how long have I used the solution?
We implemented Splunk at the end of 2020, so it's been around three years.
What do I think about the scalability of the solution?
Splunk Enterprise Security is scalable.
How are customer service and support?
We have not been in direct contact with Splunk except for a workshop where I met a few of them. My impression was that they were skilled, experienced experts. They seemed helpful, so I had a good impression.
How was the initial setup?
The service provider deployed Splunk, so I wasn't involved. I had heard that they experienced some difficulties setting it up, but I don't think it was harder to install than other solutions.
What's my experience with pricing, setup cost, and licensing?
Splunk is very expensive. The license is based on the volume of the logs ingested. I was responsible for managing the contract with our service integrator. I don't know the precise details of the competing solution, but I have heard that Splunk is more expensive than others. I don't know what the going rate is on the market, but I think there are at least two competitors that are less expensive. We have experienced a few issues with our service providers in terms of log filtering and ingestion, so we continue to pay a bit more per day for our logs.
What other advice do I have?
I rate Splunk Enterprise Security eight out of 10.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director at a consultancy with 10,001+ employees
Mature, highly customizable, and good integration capability
Pros and Cons
- "If I need to integrate devices for logs, it is easier with Splunk. We can integrate different applications, network devices, and databases. It is also very rich in documents. It is the best."
- "Splunk does not provide any default threat intelligence like Microsoft Sentinel, but you can integrate any third-party threat intelligence with Splunk. By default, no threat intelligence suite is there, whereas, with IBM QRadar or Microsoft Sentinel, the default feature of threat intelligence is there. It is free. If Splunk can provide a default threat intelligence suite, it would be better."
What is our primary use case?
We mainly use the Splunk Enterprise Security app to use Splunk as a SIEM. I have worked with Splunk on-premises, which is Splunk Enterprise, and I have worked with Splunk Cloud as well.
We mostly use Splunk for the SOC environment. We use Splunk for security incident monitoring.
How has it helped my organization?
Splunk Enterprise Security fastens our security investigations.
Our organization monitors multiple cloud environments. We have more than 50 customers. Customers have their own licenses, and for some customers, they are shared. We have a single Splunk console. We have customized Splunk, and we have onboarded multiple customers. For some customers, we have integrated Splunk with SOAR. There is a single console to monitor SIEM and other devices. It saves the analysis work. It provides good visibility as compared to the other SIEM products I have worked with.
We use the Threat Topology and MITRE ATT&CK framework features. You can map your use cases with the MITER ATT&CK framework. It is common in all SIEMs nowadays. It is good. It gives a good mapping of the use case and a better understanding.
Splunk Enterprise Security has not helped reduce our alert volume. It behaves as we configure it. The engineer handles the fine-tuning of the use case and reduction in the alerts.
What is most valuable?
The fast search is valuable. As compared to other SIEMs, Splunk is very fast in terms of the search and providing data.
The customization of the use cases is another valuable feature. It is query-based, and now, there is a feature to have machine learning as well. We can write advanced-level use cases, which is a limitation of other SIEMs.
The third point is the device integration. It is very smooth. If I need to integrate devices for logs, it is easier with Splunk. We can integrate different applications, network devices, and databases. It is also very rich in documents. It is the best.
What needs improvement?
Splunk does not provide any default threat intelligence like Microsoft Sentinel, but you can integrate any third-party threat intelligence with Splunk. By default, no threat intelligence suite is there, whereas, with IBM QRadar or Microsoft Sentinel, the default feature of threat intelligence is there. It is free. It would be better if Splunk could provide a default threat intelligence suite.
The second issue is that Splunk is expensive compared to many other SIEM tools in the market. A competitive price will work better.
The third issue is that Splunk Cloud is sometimes slow. If I create more use cases, Splunk will be slow because they provide limited resources in Splunk Cloud. They can do some optimization there.
The last issue is that they used to give a trial version of the Splunk Enterprise Security app that we could showcase to customers for demonstration, but they have stopped that free trial version. If they can start that again, it will be better. It will help to showcase the capability of Splunk.
For how long have I used the solution?
I have been using Splunk Enterprise Security for seven years.
What do I think about the stability of the solution?
It is sometimes slow. It also depends on the number of use cases or queries. You need to optimize the use cases or queries that are running and consuming a lot of resources. I have also seen Splunk Cloud hanging a bit. I would rate it a seven out of ten in terms of stability.
How are customer service and support?
We have contacted their support many times. Their support is average. We sometimes have a hard time with their support. They are not very reliable, but this is the case with all SIEM products.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We are also using Microsoft Sentinel and IBM QRadar. We have also used ArcSight. For some customers, we are using LogRhythm and the RSA solution. Different customers have different SIEM tools, but I find Microsoft Sentinel and Splunk better than the others in the market. I feel Splunk is the most mature tool at this time. It is very easy to customize. You can do whatever you want.
IBM QRadar is the cheapest option available in the market. It is a traditional SIEM tool. It is not as fast as Splunk or Microsoft Sentinel, but from a costing perspective, it is convenient. There are also a few open-source SIEM tools. Many companies are using those, but if you go with a commercial tool, IBM QRadar is very good in terms of cost value. When it comes to customization and maturity, Splunk Enterprise Security is definitely number one. Microsoft Sentinel comes second, and IBM QRadar comes third.
How was the initial setup?
It is easier than other tools.
What about the implementation team?
We implement it for our clients. The number of people involved depends on the license utilization, the number of devices, and the time frame. Two to three months are normally required for the full integration of a customer environment, and a minimum of two people are required for the integration.
What's my experience with pricing, setup cost, and licensing?
It is expensive. That is why many customers have moved to IBM QRadar. The price is definitely a challenge for customers.
What other advice do I have?
If budget is not an issue, you can go ahead with Splunk Enterprise Security. Nowadays, Splunk is ready to negotiate. With good negotiation, you might get a good deal. If you are a large organization with more than 2,000 devices or more than 500 licenses, Splunk is the best choice. If price is not an issue, you can blindly go with Splunk because it is the most mature tool in the market at this time. Microsoft Sentinel is scaling up, but it is still not there where Splunk Enterprise Security is.
Overall, I would rate Splunk Enterprise Security a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Owner at Py Concepts
Good notifications, a well-designed dashboard, and helpful logs
Pros and Cons
- "It gives me notifications of notable events."
- "Sometimes, there is latency in the logs."
What is our primary use case?
We use the solution for tracking successful and unsuccessful logins. We track privileged account activities and also a variety of other things, like developing use cases for data exfiltration or integration with ETRs and other security tools for data analysis.
How has it helped my organization?
We wanted to solve the issue of unauthorized access, brute force attacks, and exfiltration. It's helped with MITRE ATT&CK frameworks.
The organization has been able to quickly triage issues and investigate if something is a true threat or not. Most times, it helps our security posture. The level of confidence we have is high. With Splunk, you can query accounts when you see some strange activity.
What is most valuable?
It gives me notifications of notable events.
The default dashboard is very good. We can see our security posture from there.
On-prem and cloud data analysis are good. You can aggregate it if you need to in order to get good data.
Splunk has proven to be great when tracking down anomalous behavior. The logs are excellent. It is the platform in the industry. You can integrate anything. The amount of information and usability you get out of Splunk is very good.
We do use the Threat Intelligence Manager. It can be integrated with third parties. The actionable intelligence we get is useful. There is sequencing where you can gauge some actionable steps.
I use the MITRE ATT&CK framework when I am developing a new use case. It helps us discover the overall scope of an incident. Using Splunk is essential in developing that.
It's good for analyzing malicious activities and detecting breaches. I'd rate it highly in its capabilities. However, if you don't have the knowledge, it may be difficult. You might get a lot of false positives.
It's helped us detect threats very fast, in almost real time.
We have reduced our alert volume. I'm not sure of the exact number, however, instead of having 100 to 200 false positives, we might get 20 to 30.
It has helped us speed up our security investigation, although I don't handle it directly. I simply do triage, and it definitely helps there.
What needs improvement?
There are a lot of false positives which can cause a lot of fatigue.
Sometimes, there is latency in the logs.
When you deploy Splunk, you need a high level of knowledge. You really need to know what you are doing. It requires a lot of things.
They need to come up with straight steps to get things done, to have a step-by-step process to achieve this or that.
For how long have I used the solution?
I've been using the solution since 2020.
What do I think about the stability of the solution?
The stability is okay.
Splunk would tell you, especially on the different licenses they have, your storage, and your level of ingesting, it can vary.
Splunk needs to be more clear between storage and performance.
We worked with a client where almost immediately their storage was already in red. They didn't understand their storage needs as that wasn't clear.
What do I think about the scalability of the solution?
The solution cuts across countries. I'm not sure how many end-users we have.
The scalability is okay. It scales well even though you have to consider your licensing and storage.
How are customer service and support?
Technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used ELK previously.
How was the initial setup?
I have been involved in the deployment of Splunk in the past.
The initial setup is not so straightforward for those new to it. I'm accredited and have four years of implementation. You really need that level of knowledge. It's straightforward to make a feed, make it compliant, and do field mapping, however, there are many things you need to do before deployment.
We had six to eight people deploying Splunk. They were all mostly Splunk professionals, who understood the product and devised a plan and timeline for implementation. We integrated the relevant stakeholders into the process. We were connecting to the Splunk Cloud.
There is a little bit of maintenance required to maintain the infrastructure.
What about the implementation team?
We used all in-house resources to implement Splunk.
What was our ROI?
I have witnessed an ROI while using Splunk. There were some incidents previously in which the company lost millions of dollars. Bringing in Splunk has curbed that.
What's my experience with pricing, setup cost, and licensing?
The pricing is on the high side. It's not a solution for SMEs.
Which other solutions did I evaluate?
I'm not sure if any other options were evaluated by the company.
What other advice do I have?
Currently, we are just Splunk customers.
We do not monitor various clouds; we only monitor one. However, they have a good solution in that we don't need to worry about maintenance if we do.
We've never used the Mission Control feature.
If someone is looking for the cheapest SIEM solution, there are a lot of open-source options out there. However, Splunk definitely is an option. If a company is bigger, it would benefit from Splunk. They will be paying some money for it, however, it's worth it.
Resilience is important. To some extent, Splunk addresses this as we haven't had any issues. It's important to have resiliency. If your solution is not resilient, you risk security issues.
I'd rate the solution eight out of ten.
I would advise others to spell out what you really need and make it measurable so that you will understand if Splunk is right for you. If you are going to use Splunk, it's important to do your due diligence.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Splunk Enterprise Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Security Information and Event Management (SIEM) Log Management IT Operations AnalyticsPopular Comparisons
CrowdStrike Falcon
Microsoft Sentinel
IBM Security QRadar
Splunk AppDynamics
Elastic Security
Grafana Loki
Elastic Observability
Palantir Foundry
Graylog Enterprise
Security Onion
Buyer's Guide
Download our free Splunk Enterprise Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which would you recommend to your boss, IBM QRadar or Splunk?
- What are some of the best features and use-cases of Splunk?
- What SOC product do you recommend?
- Splunk as an Enterprise Class monitoring solution -- thoughts?
- What is the biggest difference between Dynatrace and Splunk?
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- What are the advantages of ELK over Splunk?
- How does Splunk compare with Azure Monitor?
- New risk scoring framework in the Splunk App for Enterprise Security -- thoughts?
- Splunk vs. Elastic Stack

















