Splunk Enterprise Security and Cortex XSIAM compete in the cybersecurity software market. Splunk seems to have the upper hand due to its comprehensive data management and rapid search capabilities.
Features: Splunk Enterprise Security is known for its rapid search capabilities and comprehensive data management, making it valuable for organizations with complex IT environments. It integrates data from multiple sources and provides actionable insights with fast incident detection and resolution through its robust analytics and visualization tools. Users praise its operational intelligence to prevent or react faster to outages. Cortex XSIAM is commended for its integration capabilities, user-friendly design, and threat detection using machine learning, which automates identification of vulnerabilities and integrates seamlessly with third-party systems.
Room for Improvement: Splunk Enterprise Security users suggest enhancements in visualization, documentation, and third-party integration. Its architecture and learning curve are also noted as complex, needing interface improvements and granular user permissions. Cortex XSIAM could expand its integration to include more cybersecurity solutions, which would enhance detection and response capabilities, streamlining the user experience.
Ease of Deployment and Customer Service: Splunk Enterprise Security accommodates various environments, including on-premises, public, and hybrid clouds, with strong technical support, despite occasional response delays. Cortex XSIAM primarily focuses on public cloud deployment, offering ease of use with comprehensive technical support and seamless integration, although additional support might be necessary for complex setups.
Pricing and ROI: Splunk Enterprise Security is recognized for its higher costs, mainly due to a pricing structure based on data ingestion volume, which can be costly when scaling. It provides significant ROI by enhancing security posture and operational efficiencies. Cortex XSIAM, while also considered expensive, offers a competitive pricing model with solid value through effective threat detection and response capabilities. Users find its cost justified by the benefits, making it a viable option for integrated security solutions.
For smaller organizations, other products may provide better value for money.
If you want to write your own correlation rules, it is very difficult to do, and you need Splunk's support to write new correlation rules for the SIEM tool.
The technical support for Splunk met my expectations.
They struggle a bit with pure virtual environments, but in terms of how much they can handle, it is pretty good.
The product was easy to install and set up and worked right.
It provides a stable environment but needs to integrate with ITSM platforms to achieve better visibility.
It is very stable.
Cortex could improve the detection and online resolution of security vulnerabilities.
An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.
Splunk Enterprise Security would benefit from a more robust rule engine to reduce false positives.
The first impression is that XSIAM would be more expensive than others we tried.
I saw clients spend two million dollars a year just feeding data into the Splunk solution.
Splunk is priced higher than other solutions.
One of the valued aspects of the product is its use of artificial intelligence to detect security vulnerabilities.
The Splunk Enterprise Security's threat-hunting capabilities have been particularly useful in later releases.
They have approximately 50,000 predefined correlation rules.
Cortex XSIAM acts as a critical element for SOC foundations, integrating SIEM and EDR capabilities, valued for threat detection and seamless security orchestration with Palo Alto Networks products.
Organizations find Cortex XSIAM beneficial for SOC foundations due to its capability to integrate SIEM and EDR tools, facilitating data collection, detection, and response. It connects with third-party data sources while reducing management effort and offering cost-effective alternatives to competitors like CrowdStrike and Trend Micro. Featuring automation and integration with Palo Alto Networks products, Cortex XSIAM enhances threat detection. Unified architecture allows a comprehensive view of attacks, further supported by machine learning and integration with existing vendor solutions, ensuring that users gain insights without significant manual log analysis.
What are Cortex XSIAM's key features?
What benefits are evident in Cortex XSIAM reviews?
Industries implement Cortex XSIAM mainly in technology-driven sectors where centralized endpoint protection and automation of forensic investigation are paramount. By integrating several third-party systems for incident response, companies in competitive markets leverage its attributes for heightened operational security efficiency. However, users note areas for improvement, such as Attack Surface Management and integration enhancements, to better suit tech-heavy industries needing extensive connectivity with cybersecurity solutions.
Splunk Enterprise Security is widely used for security operations, including threat detection, incident response, and log monitoring. It centralizes log management, offers security analytics, and ensures compliance, enhancing the overall security posture of organizations.
Companies leverage Splunk Enterprise Security to monitor endpoints, networks, and users, detecting anomalies, brute force attacks, and unauthorized access. They use it for fraud detection, machine learning, and real-time alerts within their SOCs. The platform enhances visibility and correlates data from multiple sources to identify security threats efficiently. Key features include comprehensive dashboards, excellent reporting capabilities, robust log aggregation, and flexible data ingestion. Users appreciate its SIEM capabilities, threat intelligence, risk-based alerting, and correlation searches. Highly scalable and stable, it suits multi-cloud environments, reducing alert volumes and speeding up investigations.
What are the key features?Splunk Enterprise Security is implemented across industries like finance, healthcare, and retail. Financial institutions use it for fraud detection and compliance, while healthcare organizations leverage its capabilities to safeguard patient data. Retailers deploy it to protect customer information and ensure secure transactions.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.