Try our new research platform with insights from 80,000+ expert users

Hubble vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Hubble
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Business Performance Management (30th), Financial Performance and Strategy Management (9th), Data Visualization (28th), Financial Close Software (23rd)
Splunk Enterprise Security
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
301
Ranking in other categories
Log Management (1st), Security Information and Event Management (SIEM) (1st), IT Operations Analytics (1st)
 

Mindshare comparison

Hubble and Splunk Enterprise Security aren’t in the same category and serve different purposes. Hubble is designed for Business Performance Management and holds a mindshare of 0.3%, down 0.4% compared to last year.
Splunk Enterprise Security, on the other hand, focuses on Security Information and Event Management (SIEM), holds 11.2% mindshare, down 15.0% since last year.
Business Performance Management
Security Information and Event Management (SIEM)
 

Featured Reviews

PG
Excellent for budgeting and forecasting, but long-term it will no longer be developed or supported
The fact that in a few years' time it is no longer going to be supported is a big concern. Therefore, I would advise against Hubble. Additionally, I think we underestimated the time for deployment, we thought it would be a few months and it took much longer than expected because the consultants didn't understand our process in detail before committing to the process. On a scale of one to ten, I would give Hubble a seven.
Avinash Gopu. - PeerSpot reviewer
Offers good visibility into multiple environments, significantly reduces our alert volume, and speeds up our security investigations
There are limitations with Splunk not detecting all user activity, especially on mainframes and network devices. This is because Splunk relies on agents, which cannot access certain workstations. In these cases, we have to rely on application data. For example, with mainframes, manual reports are generated and sent to Splunk, limiting visibility to what's manually reported. This lack of automation for specific platforms needs improvement from Splunk. Additionally, API access is limited for other applications that rely on API calls and requests. This requires heavy customization on Splunk's end. These are the main challenges we've encountered. Monitoring multiple cloud platforms, like Azure, GCP, and AWS, with Splunk Enterprise Security presents some challenges. While Splunk provides different connectors for each provider, consolidating data from two domains across distinct cloud environments can be complex. However, leveraging pre-built templates and Splunk's data collation capabilities can help overcome these hurdles. Despite initial difficulties, I believe Splunk can effectively address this task, earning it an eight out of ten rating for its multi-cloud monitoring capabilities. While Splunk Enterprise Security offers insider threat detection capabilities, its effectiveness could be enhanced by integrating with additional tools, such as endpoint security solutions. This integrated approach is particularly crucial for financial institutions, which often require dedicated endpoint security teams. While using multiple tools is valuable, further improvements within Splunk itself are also necessary. Considering both external integration and internal development, I would rate its current insider threat detection capabilities as three out of ten. Threat detection is where Splunk falls behind. While it offers tools, other use cases require additional work. PAM is an enterprise tool that centralizes information about users, servers, and everything else. It needs real-time monitoring, which I haven't seen in any of the companies I've worked for. They only rely on Splunk for alerting, but real-time monitoring should be handled by the endpoint security team's tools. This means there's no detection or analysis at the machine or endpoint level. Additionally, threat analysis reporting is also absent.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are both its budgeting and forecasting."
"The client site login is pretty extensible and probably cost-effective."
"The consolidated overview of all the events that come in through our environment and an easy-to-access interface for all our end users are valuable."
"We solve issues that we previously could not since we now have the data."
"It is very scalable."
"The correlation capabilities are the first value that our clients say they like with Splunk."
"Without Splunk Enterprise Security, it would be difficult for us to manage and prioritize alerts. There's a potential to lose track of important notifications, and it's essential to our security that we do not miss anything. Splunk has improved our investigations because the reporting and dashboarding make things so much easier. We can provide weekly or monthly reports. I also like Splunk's ability to integrate."
"It gives us the liberty to do more in terms of use cases."
"The ability to analyze huge amounts of sales data and accurate prediction of sales forecasting is the most valuable feature."
 

Cons

"We have been advised by the owners that the budgeting tool is no longer going to be supported with future development, so my recommendation would be for them to continue to invest in development. Otherwise, at some point we will have to migrate to another technology."
"Previously, they developed custom connectors or add-ons for a lot of applications. But that number can be upgraded still. There are a lot of applications in the world that are not supported."
"The high cost of Splunk Enterprise Security prevented us from using its full capabilities."
"There are limitations with Splunk not detecting all user activity, especially on mainframes and network devices."
"The solution has a high learning curve for users. It's a little complicated when you're trying to figure out all the features and what they do."
"The algorithms customization of Splunk could improve. They have limited algorithms for machine learning support. If they can allow the user to add more machine learning algorithms, such as the ability to choose the algorithm that a user might want. Additionally, they should provide the required libraries for those algorithms, and then analyzes the data for use."
"The difficult part is related to integration with sources of data that are used to create the logs as this depends on the infrastructure of the client."
"The configuration had a bit of a learning curve."
"Technical support needs to be more responsive."
 

Pricing and Cost Advice

Information not available
"Truly evaluate the data you want to ingest and go slow. Pulling in data that can provide no use to your mission only wastes data against your license."
"The pricing is very complicated, and it is very pricey. You do require a lot of different licenses in order to get a comprehensive solution that is not just the SIEM solution."
"It's a little bit expensive for a small to medium enterprise."
"It's more expensive than the other tools, but it's worth it. Every penny is worth it."
"Pricing and licensing is quite expensive. But for the value the product provides, it seems at par in the market."
"Personnel costs are saved by not having to involve the domain developers from multiple teams when tracing a problem that spans multiple platforms."
"Pricing is pretty fair."
"Splunk Enterprise Security incurs a significant cost because of the amount of data we send, but we are fine with the value we're getting for that price."
report
Use our free recommendation engine to learn which Business Performance Management solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Government
12%
Financial Services Firm
11%
Manufacturing Company
9%
Financial Services Firm
15%
Computer Software Company
14%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Learn More

 

Overview

 

Sample Customers

Dole, Ghiradelli, Ninetendo, Avon, Hallmark, Treasury Wine Estates, Kitchener-Wilmot Hydro, City of Prince George, Weingarten Realty Investors, Coloplast A/S, Western Forest Products Inc, The Deltic Group Ltd, Financial Times, Johnson & Johnson, Mitsubishi, National Geographic Maps
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Anaplan, Oracle, IBM and others in Business Performance Management. Updated: November 2024.
824,053 professionals have used our research since 2012.