Try our new research platform with insights from 80,000+ expert users

Splunk User Behavior Analytics vs Trellix Intrusion Prevention System comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Splunk User Behavior Analytics
Ranking in Intrusion Detection and Prevention Software (IDPS)
11th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
21
Ranking in other categories
User Entity Behavior Analytics (UEBA) (4th)
Trellix Intrusion Preventio...
Ranking in Intrusion Detection and Prevention Software (IDPS)
15th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2025, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Splunk User Behavior Analytics is 2.1%, down from 2.9% compared to the previous year. The mindshare of Trellix Intrusion Prevention System is 3.3%, up from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Subhayu Chakraborty - PeerSpot reviewer
Automatic reports streamline tasks and offers easy report gathering
The dashboard part could be improved. While using it, I noticed two options: Classic, which is adequate yet only in black and white, and another one that is more advanced or smart, though I forgot the exact term. I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
Juan Muriel - PeerSpot reviewer
Protects from attacks in real-time and provides accurate threat intelligence updates
I rate the ease of setup a seven or eight out of ten. The platform functions very well. We need technical support to make improvements to the platform. The deployment takes eight months. We need two or three system engineers and one electronic engineer specialized in Trellix platforms to deploy the tool. We need only one system engineer to maintain the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Splunk User Behavior Analytics is a one hundred percent stable solution."
"Features like alerts and auto report generation are valuable."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"It is a solution that helps test and measure customer satisfaction."
"The solution appears to be stable, although we haven't used it heavily."
"Splunk is highly valuable for query purposes."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The most valuable feature is the ability to search through a large amount of data."
"It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware."
"There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks."
"The initial setup is straightforward."
"The threat intelligence updates are very accurate."
"The product is worth the investment."
"The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS."
"Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network."
"Great monitoring feature."
 

Cons

"In terms of improvements, advanced reporting could see enhancements as there are some issues with latency."
"The dashboard part could be improved."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"There are occasional bugs."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"The dashboard part could be improved. While using it, I noticed two options: Classic, which is adequate yet only in black and white, and another one that is more advanced or smart."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
"In the future I would like to see simplified statistics and analytical threats."
"The management console needs to be less complex and easier to navigate."
"Some of the documentation is not as straightforward as it could be."
"The area of concern where the tool needs improvement is how the product prompts users at a network level that helps prevent any wireless network attacks through alerts and notifications."
"The Network Security Managers could be more stable, agile, and work faster. When it comes to instability, there is room for improvement."
"The solution could improve some aspects of detection."
"The technical support has room for improvement."
"The management component could be simplified."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler."
 

Pricing and Cost Advice

"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"The licensing costs is around 10,000 dollars."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
"I am not aware of the price, but it is expensive."
"There are additional costs associated with the integrator."
"Pricing varies based on the packages you choose and the volume of your usage."
"I rate the product’s pricing an eight out of ten."
"The tool is competitively priced."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
839,422 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
12%
Government
9%
Manufacturing Company
8%
Financial Services Firm
14%
Computer Software Company
13%
Manufacturing Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
Splunk is up to the mark in terms of pricing. However, I cannot provide specific comments on the pricing at the moment.
What needs improvement with Splunk User Behavior Analytics?
The dashboard part could be improved. While using it, I noticed two options: Classic, which is adequate yet only in black and white, and another one that is more advanced or smart, though I forgot ...
What do you like most about McAfee Network Security Platform?
The threat intelligence updates are very accurate.
What is your experience regarding pricing and costs for McAfee Network Security Platform?
The tool is competitively priced. I rate the pricing a six out of ten.
What needs improvement with McAfee Network Security Platform?
Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must provide better help with configurations of devices and enabling NTBA.
 

Also Known As

Caspida, Splunk UBA
McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
 

Overview

 

Sample Customers

8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Find out what your peers are saying about Splunk User Behavior Analytics vs. Trellix Intrusion Prevention System and other solutions. Updated: March 2025.
839,422 professionals have used our research since 2012.