Splunk Enterprise Security and Microsoft Sentinel compete in the SIEM market. Microsoft Sentinel has a slight advantage due to its seamless Microsoft tool integration and lower cost options.
Features: Splunk offers robust log management, real-time alerting, and a powerful Search Processing Language (SPL) for in-depth analysis. Its ability to manage large datasets across diverse environments is noteworthy. Microsoft Sentinel features strong AI and user and entity behavior analytics (UEBA), making threat detection seamless within Microsoft's ecosystem. It integrates well with other Microsoft tools, enhancing automation and data visualization.
Room for Improvement: Splunk could improve its user interface, pricing, and machine learning models. Enhancing cloud support and search language integration outside proprietary systems would be beneficial. Microsoft Sentinel has a steep learning curve for non-Microsoft integrations and could improve documentation and automation capabilities.
Ease of Deployment and Customer Service: Splunk offers flexibility, supporting various deployment modes like on-premises and hybrid cloud. However, customer support receives mixed reviews for response times. Microsoft Sentinel, being cloud-native, ensures straightforward deployment for Azure users and benefits from comprehensive Azure support, though extra services can raise costs.
Pricing and ROI: Splunk's cost, based on data volume, is a concern as it becomes expensive with large datasets. Microsoft Sentinel offers a more economical consumption-based pricing model, benefiting existing Microsoft ecosystem users, allowing competitive pricing for data integration and initial Azure setups.
For smaller organizations, other products may provide better value for money.
Their solutions' integration simplifies resolving issues compared to those caused by third-party products.
Working with a Sentinel engineer helped us tune settings effectively.
If you want to write your own correlation rules, it is very difficult to do, and you need Splunk's support to write new correlation rules for the SIEM tool.
The technical support for Splunk met my expectations.
Office 365 and Exchange are running on it, covering about 35,000 users efficiently.
As our organization uses Microsoft Azure and Defender, everything grows together, and we can integrate various features seamlessly.
They struggle a bit with pure virtual environments, but in terms of how much they can handle, it is pretty good.
So far, we have not experienced any issues, and it has been stable from the beginning.
Sentinel's stability is great.
It provides a stable environment but needs to integrate with ITSM platforms to achieve better visibility.
It is very stable.
We have some tools, such as our off-site Meraki firewalls, that have not fully integrated with Sentinel.
Currently, we are happy to have a way in the middle with not so much cost, but it would be nice to have the ability to enhance the automation of workflows based on learned incidents.
An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.
Splunk Enterprise Security would benefit from a more robust rule engine to reduce false positives.
We already had the necessary licensing for Sentinel, so we didn't need to spend extra money.
I saw clients spend two million dollars a year just feeding data into the Splunk solution.
Splunk is priced higher than other solutions.
Custom workbooks are valuable. It is one of the crucial points in dealing with potential security threats in an automated way without requiring too much manpower.
The Splunk Enterprise Security's threat-hunting capabilities have been particularly useful in later releases.
They have approximately 50,000 predefined correlation rules.
Microsoft Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. With Microsoft Sentinel, you can:
- Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds
- Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft
- Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft
- Respond to incidents rapidly with built-in orchestration and automation of common tasks
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Splunk Enterprise Security is widely used for security operations, including threat detection, incident response, and log monitoring. It centralizes log management, offers security analytics, and ensures compliance, enhancing the overall security posture of organizations.
Companies leverage Splunk Enterprise Security to monitor endpoints, networks, and users, detecting anomalies, brute force attacks, and unauthorized access. They use it for fraud detection, machine learning, and real-time alerts within their SOCs. The platform enhances visibility and correlates data from multiple sources to identify security threats efficiently. Key features include comprehensive dashboards, excellent reporting capabilities, robust log aggregation, and flexible data ingestion. Users appreciate its SIEM capabilities, threat intelligence, risk-based alerting, and correlation searches. Highly scalable and stable, it suits multi-cloud environments, reducing alert volumes and speeding up investigations.
What are the key features?Splunk Enterprise Security is implemented across industries like finance, healthcare, and retail. Financial institutions use it for fraud detection and compliance, while healthcare organizations leverage its capabilities to safeguard patient data. Retailers deploy it to protect customer information and ensure secure transactions.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.