Our primary use case of the solution is for fine tuning. We provide professional services for our customers to enhance their ability to use the functionalities of Splunk. We're integrators of the solution.
Technical Lead at Paladion Networks
Good security orchestration and when we face challenges with it we can find a solution in the documentation
Pros and Cons
- "Very flexible integration with other tools"
- "The most valuable feature of Splunk is a very flexible integration with other tools, it is very user friendly and not very complicated compared to other products in the market, it integrates with most of the endpoints, the documentation is great, and since it is cloud-based there is a lot of flexibility."
- "And most of the challenges that I have faced with the solution can be found in the documentation itself."
- "I would rate Splunk Phantom a seven out of 10."
What is our primary use case?
What is most valuable?
The most valuable feature of Splunk is a very flexible integration with other tools. Compared to other products in the market, Splunk is very user friendly, and not very complicated. It integrates with most of the endpoints and that's a very positive side of the solution. There's no need to remember a lot of things and documentation is great. I really appreciate that aspect. Since it is cloud-based there is a lot of flexibility. And most of the challenges that I have faced with the solution can be found in the documentation itself.
At this point, I'm very happy with the solution. There's nothing there that disturbs me. Security orchestration is a new emerging issue in the market. If I have to compare with other security orchestration tools, Splunk is a good solution. Many vendors have opted for Splunk because of easy usability and connectivity to radius devices.
For how long have I used the solution?
I've been using this solution for about six months.
What do I think about the stability of the solution?
Stability is good
Buyer's Guide
Splunk SOAR
April 2026
Learn what your peers think about Splunk SOAR. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,244 professionals have used our research since 2012.
What do I think about the scalability of the solution?
Scalability is good, allows flexibility. That's what makes life easy.
How are customer service and support?
There's great documentation and most of the challenges I've faced, I've found the solution via the documentation. I've never contacted the technical support which attests to the quality of the documentation.
Which solution did I use previously and why did I switch?
I know RSA and Splunk are similar solutions even though I've never used RSA. I know that Splunk is user friendly and doesn't require in-depth knowledge. Everything is file based, applications like RSA rely on databases. I have the confidence of being able to use Splunk efficiently and there are a lot of features I can handle myself the way I want to.
How was the initial setup?
Initial setup is very straightforward and simple. Much easier than other tools, it takes a couple of days depending on the architecture.
What's my experience with pricing, setup cost, and licensing?
The solution is for our clients so we don't deal with the licensing aspect.
What other advice do I have?
It's important to know your customer's requirements so you can choose the correct solution. The budget also needs to be taken into account. Most customer's budgets suit a Splunk solution whereas RSA is much more expensive.
I would rate Splunk Phantom a seven out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Good protocol flexibility and team collaboration for threat detection, but the API integration needs to be expanded
Pros and Cons
- "The most valuable feature is the risk-based access control."
- "The most valuable feature is the risk-based access control."
- "We want to see improvements made to the APIs such that we can connect to many different systems and data sources."
- "Overall, this product is fairly good but it's not quite mature yet. It needs some enhancement and some stabilization in some areas."
What is our primary use case?
We are a consulting firm and this is a solution that we use for ourselves, as well as implement it for our customers.
Our use case is to establish a platform for threat analysis across different data sources that we have in the company. Essentially, it is an orchestration platform and we want to make sure that we can tie into different endpoints or data sources from which traffic originates. We need to then detect and analyze threats.
What is most valuable?
The most valuable feature is the risk-based access control.
The team collaboration when it comes to detecting a threat is helpful.
I like the fact that we can leverage the API to be able to establish a connection and share information across different repositories.
The flexibility that it has when using different protocols, like TLP, for communicating, is fairly good.
This solution supports the automated handling of phishing attempts through the collection of potentially malicious emails from end-users. It analyzes them, identifies threats, and assesses risk.
What needs improvement?
Phantom was only recently acquired by Splunk so it is not fully integrated yet. Our area of concern is that Splunk Phantom works with the other Splunk products. At this point, there are certain things that are not fully operational across the rest of the product line.
The extension of the product to allow for better integration with other data sources is something that needs attention. We want to see improvements made to the APIs such that we can connect to many different systems and data sources.
The search capability could be improved by way of better indexing and also integration with third-party solutions such as Elasticsearch.
I would like to see escalation management and integration with communication tools like Slack.
I would like to have more capability around analytics.
There needs to be a better facility for documenting and storing issues, as well as being able to find those issues. Splunk does a good job of that, so I think that it will be done.
What do I think about the stability of the solution?
The solution overall is stable, but it could be more so. It is an application server and there is a vulnerability when a traffic overload occurs, or if there is an incompatibility with a backend or another data source. There is a risk that something can freeze up.
High Availability / Disaster Recovery (HA/DR) is key and Splunk Phantom’s product offerings must ensure sharding and clustering to enable scalability and automated failover
What do I think about the scalability of the solution?
Because this is an orchestration platform, it's supposed to offload the users from being directly involved in looking at and analyzing security issues. It is something that you just let run. From an administration standpoint, we have a team of ten people that work around this platform.
How are customer service and technical support?
Prior to Splunk acquiring Phantom, the support for this solution was subpar. Now, however, the support model has changed and it is pretty reasonable.
How was the initial setup?
The initial setup takes some time because you have to configure it and then connect it to different data sources and make sure that they operate properly. It requires an engineer who's fairly knowledgeable in security, interaction, setup, and administration.
In terms of the deployment time, I think that it is something that you can get up and running in perhaps two or three months. I don't think that you could get this up and running fully in a week, for example.
What's my experience with pricing, setup cost, and licensing?
It is a subscription-based licensing model that varies depending on how much data is processed by Spunk. There are built-in volume discounts.
There are some additional costs if you want to get some front-end support or installation or setup, which is part of professional services. There are also some modules, such as analytics, that Splunk will provide for an additional fee.
What other advice do I have?
My advice to anybody who is considering this solution is to first really understand the requirements that you have, well enough. You need to identify and understand the data sources that you need, prior to purchase, to ensure that there is a need and also that there are no issues with incompatibility or connectivity. You also need to have the right resources to assess, implement, or oversee the implementation. You're going into an environment that requires a little bit of understanding of artificial intelligence because the SOAR platform requires setting up some rules. You also need to have a technical support group in-house to be able to help, otherwise, you would be dependent on Splunk for assistance.
Overall, this product is fairly good but it's not quite mature yet. It needs some enhancement and some stabilization in some areas.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Splunk SOAR Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Product Categories
Security Orchestration Automation and Response (SOAR)Popular Comparisons
IBM Security QRadar
Microsoft Sentinel
Elastic Security
AWS Security Hub
Palo Alto Networks Cortex XSOAR
Exabeam
Stellar Cyber Open XDR
Sumo Logic Security
Logpoint
Tines
Google Security Operations
ThreatConnect Threat Intelligence Platform (TIP)
ServiceNow Security Operations
Fortinet FortiSOAR
Buyer's Guide
Download our free Splunk SOAR Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which Do You Recommend, Phantom or Demisto?
- What are the Top 5 cybersecurity trends in 2022?
- What is the difference between SIEM and SOAR platforms?
- What is an incident response playbook and how is it used in SOAR?
- What are the latest trends in Security Operations Center (SOC)?
- What tools and solutions do you use for automated incident response in an enterprise in 2022?
- How to evaluate SIEM detection rules?
- Why a Security Operations Center (SOC) is important?
- What types of Security Operations Center (SOC) deployment models do exist?
- Why is Security Orchestration Automation and Response (SOAR) important for companies?
















