Try our new research platform with insights from 80,000+ expert users

Seceon Open Threat Management Platform vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 29, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

Sentiment score
9.5
Seceon is praised for responsive customer service, efficient technical support, and effective problem-solving with comprehensive integration assistance.
Sentiment score
7.2
Splunk Enterprise Security's support is generally praised for responsiveness and knowledge but criticized for delays and inconsistent quality.
 

Room For Improvement

Sentiment score
4.5
Seceon Platform needs cloud transition improvements, better CPU efficiency, enhanced features, global coverage, and improved documentation and management tools.
Sentiment score
6.2
Splunk Enterprise Security is costly and complex, with users seeking better integration, usability, support, and enhanced features like AI.
 

Scalability Issues

Sentiment score
9.3
Seceon Platform is scalable, easily adapts to virtual environments, but some users are uncertain about large-scale deployments.
Sentiment score
6.0
Splunk Enterprise Security is scalable and adaptable, handling large data volumes and multiple users easily but can be costly.
 

Setup Cost

Sentiment score
7.0
Seceon Open Threat Management Platform offers cost-effective per-asset pricing, competitive rates, and flexibility without hidden fees.
Sentiment score
7.7
Splunk Enterprise Security's pricing is perceived as high due to its licensing model and extensive features, often deterring SMEs.
 

Stability Issues

Sentiment score
9.3
Seceon Open Threat Management is stable and efficient, quickly integrates, and receives positive feedback for resolving minor issues.
Sentiment score
4.8
Splunk Enterprise Security is praised for stability, reliability, low maintenance, and high performance, with minor issues quickly resolved.
 

Valuable Features

Sentiment score
8.2
Seceon Platform offers cost-effective, AI-driven cybersecurity with real-time threat detection, ease of management, and comprehensive integrations.
Sentiment score
8.7
Splunk Enterprise Security excels in dashboards, reporting, flexibility, scalability, support, log aggregation, alerting, integration, and efficient large data handling.
 

Categories and Ranking

Seceon Open Threat Manageme...
Ranking in Security Information and Event Management (SIEM)
23rd
Average Rating
8.2
Reviews Sentiment
7.8
Number of Reviews
12
Ranking in other categories
No ranking in other categories
Splunk Enterprise Security
Ranking in Security Information and Event Management (SIEM)
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
301
Ranking in other categories
Log Management (1st), IT Operations Analytics (1st)
 

Mindshare comparison

As of November 2024, in the Security Information and Event Management (SIEM) category, the mindshare of Seceon Open Threat Management Platform is 0.6%, up from 0.4% compared to the previous year. The mindshare of Splunk Enterprise Security is 10.9%, down from 14.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM)
 

Featured Reviews

Dipesh Jain - PeerSpot reviewer
Has the ability to categorize alerts and reporting dashboards are useful
The algorithm used in Seceon OTM is clear and logical, categorizing events as needed. This helps us identify and respond to threats effectively. The ability to categorize alerts and the reporting dashboards are valuable features. AI-driven analysis aids in identifying critical alerts, and real-time threat detection improves our response time.
Avinash Gopu. - PeerSpot reviewer
Offers good visibility into multiple environments, significantly reduces our alert volume, and speeds up our security investigations
There are limitations with Splunk not detecting all user activity, especially on mainframes and network devices. This is because Splunk relies on agents, which cannot access certain workstations. In these cases, we have to rely on application data. For example, with mainframes, manual reports are generated and sent to Splunk, limiting visibility to what's manually reported. This lack of automation for specific platforms needs improvement from Splunk. Additionally, API access is limited for other applications that rely on API calls and requests. This requires heavy customization on Splunk's end. These are the main challenges we've encountered. Monitoring multiple cloud platforms, like Azure, GCP, and AWS, with Splunk Enterprise Security presents some challenges. While Splunk provides different connectors for each provider, consolidating data from two domains across distinct cloud environments can be complex. However, leveraging pre-built templates and Splunk's data collation capabilities can help overcome these hurdles. Despite initial difficulties, I believe Splunk can effectively address this task, earning it an eight out of ten rating for its multi-cloud monitoring capabilities. While Splunk Enterprise Security offers insider threat detection capabilities, its effectiveness could be enhanced by integrating with additional tools, such as endpoint security solutions. This integrated approach is particularly crucial for financial institutions, which often require dedicated endpoint security teams. While using multiple tools is valuable, further improvements within Splunk itself are also necessary. Considering both external integration and internal development, I would rate its current insider threat detection capabilities as three out of ten. Threat detection is where Splunk falls behind. While it offers tools, other use cases require additional work. PAM is an enterprise tool that centralizes information about users, servers, and everything else. It needs real-time monitoring, which I haven't seen in any of the companies I've worked for. They only rely on Splunk for alerting, but real-time monitoring should be handled by the endpoint security team's tools. This means there's no detection or analysis at the machine or endpoint level. Additionally, threat analysis reporting is also absent.
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
27%
Financial Services Firm
14%
Comms Service Provider
6%
Educational Organization
6%
Financial Services Firm
16%
Computer Software Company
14%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Seceon Open Threat Management Platform?
The algorithm used in Seceon OTM is clear and logical, categorizing events as needed. This helps us identify and respond to threats effectively.
What is your experience regarding pricing and costs for Seceon Open Threat Management Platform?
The implementation cost is extra, but the license cost is reasonable with no hidden costs.
What needs improvement with Seceon Open Threat Management Platform?
Certain features, such as DLP, need to be improved as they are superficial and not in-depth. Additionally, the non-core features need to increase in depth.
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

Seceon OTM, Seceon aiSIEM, aiSIEM, Seceon Open Threat Management
No data available
 

Learn More

 

Overview

 

Sample Customers

Caduceus, SUNY
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Seceon Open Threat Management Platform vs. Splunk Enterprise Security and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.