No more typing reviews! Try our Samantha, our new voice AI agent.

Seceon Open Threat Management Platform vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 25, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Seceon Open Threat Manageme...
Ranking in Security Information and Event Management (SIEM)
44th
Average Rating
7.8
Reviews Sentiment
7.5
Number of Reviews
13
Ranking in other categories
No ranking in other categories
Splunk Enterprise Security
Ranking in Security Information and Event Management (SIEM)
1st
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
381
Ranking in other categories
Log Management (2nd), IT Operations Analytics (1st)
 

Mindshare comparison

As of April 2026, in the Security Information and Event Management (SIEM) category, the mindshare of Seceon Open Threat Management Platform is 0.8%, up from 0.7% compared to the previous year. The mindshare of Splunk Enterprise Security is 7.1%, down from 9.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM) Mindshare Distribution
ProductMindshare (%)
Splunk Enterprise Security7.1%
Seceon Open Threat Management Platform0.8%
Other92.1%
Security Information and Event Management (SIEM)
 

Featured Reviews

Vaibhav Patkar - PeerSpot reviewer
CISO at Orient Technologies Pvt. Ltd.
Offers remediation capabilities and provides a bird's-eye view of events happening in your environment, summarizing critical events that need attention
One drawback is that it becomes so easy to use that users may lose the habit of manual checks and balances. As a security person, you should always worry about potential threats. If you have a very useful and easy tool, you might lose the ability to think differently and critically. For example, in a group of ten people, if nine think the same way and one thinks differently, you should consider the tenth person's perspective because they might have valuable insights. Having a great product is not always beneficial because you may become too dependent on it, which can be problematic in the long term. If you lose your critical thinking skills, you might not recognize when something abnormal is happening. While the system will notice, systems can have their own challenges and issues. I'm not criticizing the product itself but emphasizing the importance of not being overly dependent on machines. Similar to what we see with Tesla cars, no matter how advanced, there is always a chance things may not work as expected. So, the users need to prepare for that eventuality. Seceon Open Threat Management Platform has some add-ons that they sell as part of the whole suite, but not individually. If they sold them individually, they could potentially get more business.
Sathis-Kumar - PeerSpot reviewer
Senior Manager at Bank of America
Helps us detect cyber threats quickly and integrate multiple feeds effectively
Overall, the product is good, but when it comes to some infrastructure issues, we have to dig into more logs. There is no straightforward indication of an issue. Health check kind of dashboards are not available. More AI would help us, and more optimization, since security products run more queries. The AI module could suggest solutions, optimizing queries or workload balancing. If the product itself advises on running queries during peak times, it would be similar to what ChatGPT currently offers. We see quite a few issues on stability. Even last week, we faced something, and identifying bottlenecks is not easy. We need more SMEs, and there is no mechanism to tell us about indexer or search head issues. Self-monitoring dashboards could be beneficial. The technical support still requires more improvement. Often, primary support takes a lot of time and forwards most solutions to the engineering side. The primary support team has very limited knowledge to provide.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is effective because it has threat intelligence from across the world and constantly checks and updates for new threats."
"Seceon Open Threat Management Platform notifies only genuine alerts. It offers plenty of options that are suitable for MSPs."
"Seceon Open Threat Management Platform provides a more straightforward implementation that is better than Splunk and offers an AI-based platform with machine learning and deep learning capabilities."
"We only recently started using Seceon, so we aren't taking advantage of all its features yet. We have enabled some proactive alerts about utilization and bottlenecks from high traffic."
"The most valuable feature of this solution is its artificial intelligence."
"The main thing is the value proposition. It is one of the most sophisticated yet affordable solutions that I've come across. It is also one of the easiest-to-manage yet comprehensive solutions for a SOC analyst. Its customizations are really good, and it has a lot of integrations. It is multi-tenant and very fast to onboard. Its stability is 100%. We've never had an outage with it. It doesn't require extensive hardware resources. Its level of support is also very good. They have a very responsive technical team."
"The solution is very cost-effective compared to Splunk and LogRhythm."
"The most valuable features are behaviour analytics, threat intelligence, endpoint detection, and response features."
"It's similar to having a car. It's a necessity. I don't have to prove to the business executives that it provides return on investment. It's a necessary function and a must-have."
"Splunk Enterprise Security helped improve our organization’s ability to ingest and normalize data."
"Splunk is quite flexible for our customers. Splunk does not filter from a specific lock, you can define it later."
"Splunk has a very knowledgeable support staff and the Splunk support website is outstanding."
"The most valuable feature is the ability to look at threats and link them to the MITRE ATT&CK framework."
"The most valuable function is the notable events. When I joined the team, I asked them what they could currently see, and they said nothing. I was pretty shocked. I know for a fact that they're using Enterprise Security or at least they had purchased it. I told them that there are several dashboards within Splunk that we can leverage. There is also notable events where we can see potential incidents or potential alerts about the infrastructure and the network itself."
"We are using Microsoft 365 and we're using the Exchange Mail Service. It's good for monitoring that in particular."
"Being able to aggregate detection and alerts from various sources is valuable. Like everyone else, we have a wide range of tools in our shop. We are able to stop at one spot and look at all the data. All the data is able to come through, and we can then jump from source to source or index to index. We can dig deep whenever we need to and get a good high-level understanding."
 

Cons

"It is a standalone solution now. They need to make it into a cloud-based subscription model. It needs more compatibility for co-managed solutions. It can also have more threats and deeper integration with Microsoft."
"The SOP they provided wasn't great. They offered training over Sherp Virtualization, and the Seceon leadership visited our location to explain everything in detail, but the documentation and training could be better. It isn't as effective as it could be. There's some room for improvement there."
"For small to medium-sized customers, Seceon Open Threat Management Platform is good. However, for large enterprises, it is not as effective."
"It would be ideal with the processing was more manageable. Not many customers are willing to have a dedicated server with two CPUs and one TB of memory. The cost of this is huge for a smaller organization."
"For future releases, integrating incident response tools and improving communication on incident reporting could be beneficial."
"Seceon Open Threat Management Platform sells some add-ons as part of the whole suite but not individually. If they sold them individually, they could potentially attract more business."
"The management console could use some enhancements."
"We are at the client’s end, offering services. They don’t know about security rules and benchmarks. We are working on the discovery and remediation but we don’t really have the intelligence that was available while working with other tools. Human working is also very essential for the solution. The automatic session is impossible to play since it needs to touch Redfin for further analysis. No one has breached our clients."
"The glass table feature does not perform as expected."
"Its search or filtering capability is nice, but it can be improved. It is currently a bit complicated, and it should be simplified. If we can write the search filter in a more simplified way, it would be better."
"Adding custom visualization in Splunk has been improved over the years but can still be made better by integrating more and more JavaScript visualization sources."
"Cybersecurity and infrastructure monitoring have room for improvement."
"Splunk Enterprise Security is great but can have some frustration points. It can sometimes be slower to use."
"Improving the infrastructure behind Splunk Enterprise Security is vital—enhanced cores, CPUs, and memory should be prioritized to support better processing power."
"The cluster environment should be improved. We have a cluster. In the Splunk cluster environment, in the case of heavy searches and heavy load, the Splunk cluster goes down, and we have to put it in the maintenance mode to get it back. We are not able to find the actual culprit for this issue. I know that cluster has RF and SF, but it has been down so many times. There should be something in Splunk to help users to find the reason and the solution for such issues."
"Splunk Enterprise Security could improve in automation, flexibility, and providing more content out of the box."
 

Pricing and Cost Advice

"The pricing is very competitive. It's not expensive."
"The price is quite reasonable."
"The solution is cheap and very competitive. It offers good tuning in terms of the pricing. Other solutions like Palo Alto and IBM are more expensive."
"We used the solution's trial version for two months and later purchased it."
"I find Seceon OTM's pricing to be reasonable, not too high or low, just okay for the market standards. I can't disclose specific figures, we pay on a quarterly basis under a service model. I would rate it eight out of ten. As a customer, I always hope for better pricing options."
"Seceon Open Threat Management Platform is cost-effective because it's a comprehensive platform that offers high availability."
"It has a per-asset model instead of an ingestion-based model, which gives predictable pricing. In terms of price, it is in the middle to lower range of SIEMs that it competes against. It is the most affordable solution that we have implemented so far. It was much more affordable than anything else I've implemented."
"Splunk Enterprise Security is priced lower than competitors."
"The pricing depends on the bandwidth of an organization and is good compared to some SIEM tools. IBM, for example, is quite costly. But Microsoft Sentinel is notably cheaper."
"Splunk Enterprise Security is a bit expensive overall, but it provides good value."
"Pricing is pretty fair."
"The pricing of Splunk Enterprise Security is somewhat high, but comparing it with its benefits, it's acceptable. It depends on the type of business."
"The licensing costs are high for Splunk Enterprise Security."
"Splunk has always been on the expensive side."
"The price of Splunk is reasonable."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
886,174 professionals have used our research since 2012.
 

Comparison Review

VS
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
11%
Financial Services Firm
10%
Outsourcing Company
8%
Financial Services Firm
14%
Computer Software Company
9%
Manufacturing Company
9%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise5
Large Enterprise1
By reviewers
Company SizeCount
Small Business112
Midsize Enterprise50
Large Enterprise267
 

Questions from the Community

What do you like most about Seceon Open Threat Management Platform?
The algorithm used in Seceon OTM is clear and logical, categorizing events as needed. This helps us identify and respond to threats effectively.
What is your experience regarding pricing and costs for Seceon Open Threat Management Platform?
The pricing of Seceon Open Threat Management Platform is very reasonable.
What needs improvement with Seceon Open Threat Management Platform?
There are areas for improvement in the customization options. Every ( /products/every-reviews ) quarter, they are developing the platform with new updates based on feedback provided.
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

Seceon OTM, Seceon aiSIEM, aiSIEM, Seceon Open Threat Management
No data available
 

Overview

 

Sample Customers

Caduceus, SUNY
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Seceon Open Threat Management Platform vs. Splunk Enterprise Security and other solutions. Updated: March 2026.
886,174 professionals have used our research since 2012.