Try our new research platform with insights from 80,000+ expert users

Akamai mPulse vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Akamai mPulse
Average Rating
6.6
Number of Reviews
6
Ranking in other categories
Application Performance Monitoring (APM) and Observability (57th)
Splunk Enterprise Security
Average Rating
8.4
Number of Reviews
301
Ranking in other categories
Log Management (1st), Security Information and Event Management (SIEM) (1st), IT Operations Analytics (1st)
 

Mindshare comparison

While both are Application Lifecycle Management solutions, they serve different purposes. Akamai mPulse is designed for Application Performance Monitoring (APM) and Observability and holds a mindshare of 0.4%, down 0.5% compared to last year.
Splunk Enterprise Security, on the other hand, focuses on Security Information and Event Management (SIEM), holds 10.9% mindshare, down 14.3% since last year.
Application Performance Monitoring (APM) and Observability
Security Information and Event Management (SIEM)
 

Featured Reviews

Arivu Arumugam - PeerSpot reviewer
Oct 18, 2022
Lacking in regard to observation of the entire platform but does dynamic injections from within
The primary use case of mPulse is for real-time user monitoring. Our use case was to observe the entire platform from the user all the way to the backend system and that's what it did. It's all in the discovery state. We explored a variety of different tools and the pros and cons of each within our…
Sameep Agarwal. - PeerSpot reviewer
Oct 23, 2023
It has a drag-and-drop interface, so you don't need to know SQL or Java to construct a query
The ingestion happens quickly, so you can run up the data costs if you use the default settings. It isn't a problem for government agencies in the Saudi market, but many of the corporations in India are small or medium-sized enterprises that cannot afford that kind of ingestion system. Splunk needs to be tweaked in JSON so you can limit what is coming from the endpoints, especially the events. One needs to filter that out so that only certain events are ingested, like login failures, Active Directory changes, password reset requests, privilege modifications, etc. Each Windows machine generates about 310 KB of information per event, but we can tweak that down to about 50 KB.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Enables dynamic injections from within the product which is great."
"The most valuable feature is the solutions overall performance. It is very efficient and accurate for our usage."
"The solution's most valuable feature is threat intelligence correlations."
"To get visibility from your network devices, servers, and security devices is a great feature."
"The metrics and trends that Splunk Enterprise Security generates using all the data points we send allow customers to understand better what their users are doing."
"We used it to create a custom anomaly detection data model to monitor the activity of our back-end services on an hourly basis relative to the past three months of activity."
"Deployment server for deploying changes in one go."
"It has a rapid response search environment in the event of an incident."
"We can present to our management in real time the security of the batch management for the PCs, security regarding the network equipment. We're currently working in the Azure Cloud project, so we can send any logs from the cloud to Splunk. We can monitor them and we can present to the managers and customers. It's a very good solution for reporting. We use Splunk for reporting and monitoring of any solution in the company."
"I am satisfied with the support."
 

Cons

"In the next release, I would like to see the possibility of sharing the metric from this solution with other solutions."
"The end-to-end distributor tracing connectivity isn't there."
"Sometimes the communication with support happens with multiple staff. They should reduce the time to resolution."
"There are limitations with Splunk not detecting all user activity, especially on mainframes and network devices."
"Splunk does not build apps. They only go back and validate the apps that somebody has already built. They should have remote consulting support. They have a wonderful solution. They have 24/7 security. Nobody needs to depend on any third party and will therefore just buy Splunk on the cloud."
"One issue is that we are getting a lot of false positives. We are trying to reduce them by customizing the default rules, changing thresholds, and using white-listing and black-listing. It's getting better and better as a result. But they need to build components that would reduce the false positives."
"The glass table feature does not perform as expected."
"Splunk should align its security principles with those of other vendors like SentinelOne. Splunk has mature APIs that can communicate with various security applications and devices. Splunk can process more to produce an understandable dashboard."
"More training on PetaData using artificial intelligence techniques to identify the events which are not normal and exceptions that would help the organization identify threats and malware on the go with results."
"Resource usage can probably be described as an area with shortcomings in the product where improvements are required."
 

Pricing and Cost Advice

Information not available
"Setup cost is cheap: It is free, it is user-friendly, and it is fast."
"The pricing seems good relative to the other vendors that we have had here. However, they need to find ways to be more flexible with the licensing and be able to deal with situations where we start generating more logs. Maybe having some controls in the Splunk interface to turn it off, so we don't have to change anything in our application."
"We have an unlimited one, and we pay yearly, but I don't know how much it costs. Previously, I worked for a startup, and when they started building it up, it was complicated for them because they didn't have the budget for that many licenses. It was very costly for them. So, startups might find it a little bit problematic because of the licensing, but for bigger companies, there is no issue."
"The pricing model is expensive and a nightmare based on the amount of data."
"There is an annual license required to use this solution."
"I assume that the pricing is reasonable, because if it was too costly, there are other alternatives."
"It's definitely worth it."
"Splunk is a bit pricier, but the benefits and ROI are huge."
report
Use our free recommendation engine to learn which Application Performance Monitoring (APM) and Observability solutions are best for your needs.
814,763 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Financial Services Firm
23%
Computer Software Company
17%
Retailer
9%
Manufacturing Company
7%
Financial Services Firm
16%
Computer Software Company
14%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Akamai mPulse?
Enables dynamic injections from within the product which is great.
What needs improvement with Akamai mPulse?
The end-to-end distributor tracing needs some work because the connectivity from the user to the backend wasn't there. Akamai mPulse was not able to deliver on our requirements regarding observatio...
What is your primary use case for Akamai mPulse?
The primary use case of mPulse is for real-time user monitoring. Our use case was to observe the entire platform from the user all the way to the backend system and that's what it did. It's all in ...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

SOASTA mPulse
No data available
 

Learn More

 

Overview

 

Sample Customers

Nordstrom, Gatwick, DirecTV, MSN, SquareSpace, SAP, Lenovo, Hallmark, myspace, Intuit, Kentucky Derby, Toys "R" Us, Netflix, Newsweek, The Washington Post, Lowe's, Nike, REI, Apple, Sears, Verizon, Wendy's, Huawei
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Akamai mPulse vs. Splunk Enterprise Security and other solutions. Updated: March 2023.
814,763 professionals have used our research since 2012.