We performed a comparison between Lumu and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The context provided by the tool is very complete, it includes the miter matrix, playbooks, links, hashes, and much more."
"Lumu protects against threats immediately and handles them in time."
"It's been helpful for overall extended network visibility."
"Most of it is automated, so I do not have to watch it to get alerts."
"You can access external links, playbooks, MITRE Matrix, and a lot of information."
"The product is at the forefront of auto-remediation networking. It's great."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"It is a solution that helps test and measure customer satisfaction."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"This is a good security product."
"The integration with different vendors and endpoints could be improved."
"I am happy with the current features. However, one important one is to improve the reports."
"It would be good if we could access the physical logs."
"The reports need improvement."
"Nothing so far needs to be improved."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"We'd like the ability to do custom searches."
"I'm not aware of any lacking features."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
"There are occasional bugs."
More Splunk User Behavior Analytics Pricing and Cost Advice →
Lumu is ranked 13th in Intrusion Detection and Prevention Software (IDPS) with 5 reviews while Splunk User Behavior Analytics is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. Lumu is rated 9.8, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of Lumu writes "Protects against threats and handles it in time with moderate pricing". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Lumu is most compared with ExtraHop Reveal(x), Darktrace, Stellar Cyber Open XDR, LogRhythm NDR and NextRay NDR, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Cynet and Exabeam Fusion SIEM. See our Lumu vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.