Try our new research platform with insights from 80,000+ expert users

Palo Alto Networks Advanced Threat Prevention vs Splunk User Behavior Analytics comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Palo Alto Networks Advanced...
Ranking in Intrusion Detection and Prevention Software (IDPS)
7th
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
26
Ranking in other categories
No ranking in other categories
Splunk User Behavior Analytics
Ranking in Intrusion Detection and Prevention Software (IDPS)
14th
Average Rating
8.2
Reviews Sentiment
6.5
Number of Reviews
20
Ranking in other categories
User Entity Behavior Analytics (UEBA) (4th)
 

Mindshare comparison

As of January 2025, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Palo Alto Networks Advanced Threat Prevention is 7.2%, down from 8.1% compared to the previous year. The mindshare of Splunk User Behavior Analytics is 2.2%, down from 3.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Carlos Bracamonte - PeerSpot reviewer
Robust, reliable, simple to install and good technical support
We are attempting to improve the use of URL filtering beyond threat protection. I'm not sure what the remaining threat protection features are off the top of my head. But beyond that, we use URL filtering. We have three approved cases for using external dynamic lists that are stored in a bucket repository. Then, for each URL site that needs to be whitelisted, we add it to the external dynamic list in order to gain access to this email. I would like Wildfire to be implemented. We use the equivalent in Cisco is the integration policies. We have the Wildfire but we are not currently implementing it. We don't have the license to use it, but we are not currently implementing it until we present the use cases that the company gives some value to and they approve the use of it.
AnupChapalgaonkar - PeerSpot reviewer
Efficient behavior analysis with potential for improved reporting
I use Splunk User Behavior Analytics for SAML authentication, behavior analysis, and integration purposes. Integration allows me to identify version controls in CRM systems and analyze remote users. Additionally, I use it for streaming and machine learning kit integration, focusing on behavior…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's very easy to use and configure. What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked."
"The initial setup was straightforward. It's quite easy. Deployment took one to two weeks."
"It effectively prevents malware, ransomware, and other attacks."
"The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention."
"I like the solution's interface."
"Most of the features of Palo Alto Threat Prevention are alright. I recommend features like content filtering, IP address, & intelligent firewalls. The reporting feature is very good."
"You can scale the product."
"The application control and vulnerability protection are the most valuable features."
"It's easily scalable."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"Splunk is more user-friendly than some competing solutions we tried."
"The solution is fast, flexible, and easy to use."
"It is a solution that helps test and measure customer satisfaction."
"Splunk is highly valuable for query purposes."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
 

Cons

"The initial setup is complex."
"Sometimes when you want to group a set of ports, and communicate with Palo Alto, you cannot group TCP and UDP ports together. This needs to be adjusted."
"The documentation needs to be improved. I need better information about how to configure it and what the best practices are."
"The application’s pricing and dashboard need improvement. It could be user-friendly."
"The solution could benefit from improved AI analytics to predict potential attacks before they occur, similar to NDR systems."
"Generally, to deploy it will take some downtime, about a day."
"It's not so easy to set up a test environment, because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get."
"The solution needs to improve its local technical support services. There is no premium support offered in our market."
"In terms of improvements, advanced reporting could see enhancements as there are some issues with latency. Additionally, there are challenges with configuration findings during lexical analysis."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"In terms of improvements, advanced reporting could see enhancements as there are some issues with latency."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"There are occasional bugs."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
 

Pricing and Cost Advice

"It is an expensive solution and I would like to see a drop in price."
"The product’s pricing is expensive for small companies."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
"The price of the solution is higher than others on the market. A price reduction would be beneficial if it does not impact their database quality."
"It's not too expensive."
"If you want to have all of the good features then you have to pay extra for licensing."
"Palo Alto Networks Threat Prevention could improve by having consistent pricing at system levels."
"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"Pricing varies based on the packages you choose and the volume of your usage."
"I am not aware of the price, but it is expensive."
"The licensing costs is around 10,000 dollars."
"There are additional costs associated with the integrator."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
831,265 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
11%
Manufacturing Company
9%
Government
8%
Computer Software Company
15%
Financial Services Firm
13%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
The pricing is competitive, and with current campaigns and discounts, it provides an excellent device for a reasonable price.
What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
Splunk is up to the mark in terms of pricing. However, I cannot provide specific comments on the pricing at the moment.
What needs improvement with Splunk User Behavior Analytics?
In terms of improvements, advanced reporting could see enhancements as there are some issues with latency. Additionally, there are challenges with configuration findings during lexical analysis.
 

Also Known As

No data available
Caspida, Splunk UBA
 

Learn More

Video not available
 

Overview

 

Sample Customers

University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Find out what your peers are saying about Palo Alto Networks Advanced Threat Prevention vs. Splunk User Behavior Analytics and other solutions. Updated: January 2025.
831,265 professionals have used our research since 2012.