Try our new research platform with insights from 80,000+ expert users

Splunk User Behavior Analytics vs Trend Micro Deep Discovery comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Splunk User Behavior Analytics
Ranking in Intrusion Detection and Prevention Software (IDPS)
16th
Average Rating
8.2
Number of Reviews
18
Ranking in other categories
User Entity Behavior Analytics (UEBA) (5th)
Trend Micro Deep Discovery
Ranking in Intrusion Detection and Prevention Software (IDPS)
5th
Average Rating
8.2
Number of Reviews
26
Ranking in other categories
Advanced Threat Protection (ATP) (18th), Network Detection and Response (NDR) (6th)
 

Mindshare comparison

As of November 2024, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Splunk User Behavior Analytics is 2.3%, down from 3.2% compared to the previous year. The mindshare of Trend Micro Deep Discovery is 7.0%, up from 6.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Sharath Chander - PeerSpot reviewer
Mar 10, 2023
It's more user-friendly than other solutions we tried, but it could use more features like process mining and automation
We have an application running for our e-commerce site, and we use Splunk primarily to detect anomalous behavior like false orders and other bot-related threats. Splunk helps us analyze and eliminate threats using machine learning.  Splunk is more user-friendly than some competing solutions we…
Rejwana Rahman - PeerSpot reviewer
Mar 7, 2024
Good threat detection capabilities and offers flexibility for hosting options
As a security product, managing threats is crucial for my clients.  According to feedback from my client base, Trend Micro has good threat detection capabilities and offers flexibility for hosting options. It also includes features like an advanced scan engine – those are definitely strong…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a solution that helps test and measure customer satisfaction."
"The most valuable feature is the ability to search through a large amount of data."
"The solution appears to be stable, although we haven't used it heavily."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The solution is definitely scalable."
"The product is at the forefront of auto-remediation networking. It's great."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"The solution is fast, flexible, and easy to use."
"The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox."
"The product's initial setup phase was not difficult."
"The tool's stability and performance are good."
"Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
"The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files."
"Initial setup is easy. It can be done by yourself."
 

Cons

"The initial setup was complex because some of the configurations that we required needed customization."
"We'd like the ability to do custom searches."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"In the future I would like to see simplified statistics and analytical threats."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"The correlation engine should have persistent and definable rules."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The solution could be more secure."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"The tool's configuration can be made easier."
"Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
"The solution needs to be able to integrate better with third-party infrastructure."
"The solution needs improvement in terms of pricing."
"The scalability is sometimes limited."
 

Pricing and Cost Advice

"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"There are additional costs associated with the integrator."
"Pricing varies based on the packages you choose and the volume of your usage."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
"I am not aware of the price, but it is expensive."
"The licensing costs is around 10,000 dollars."
"The price of the solution is lower compared to the competition."
"Trend Micro Deep Discovery is quite expensive compared to other endpoint security products."
"The licensing cost is a bit pricey. We pay a yearly subscription."
"Overall, the price is good."
"The tool’s licensing costs depend on the customers."
"Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions."
"Compared to its competitors, Trend Micro Deep Discovery is a little expensive."
"The tool's licensing costs are yearly. There are no additional costs associated with the product."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
13%
Government
9%
Manufacturing Company
7%
Computer Software Company
19%
Financial Services Firm
11%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
I am not aware of the price, but it is expensive. A rough estimate would be around 150 gigabytes, given the huge amount of data. At the moment there are no additional costs for maintenance.
What needs improvement with Splunk User Behavior Analytics?
Sometimes, we need to write explicit queries. It would be good if the solution had an analytics tool that allowed us to analyze the data without writing specific queries. The solution's user interf...
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What is your experience regarding pricing and costs for Trend Micro Deep Discovery?
I would rate the pricing a three out of ten, where one would be very expensive, and ten would be very cheap.
What needs improvement with Trend Micro Deep Discovery?
The price range is a little high, which can deter customers from buying the product. Additionally, cloud sandboxing features are valuable now, and their inclusion would be a significant improvement...
 

Also Known As

Caspida, Splunk UBA
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Learn More

Video not available
 

Overview

 

Sample Customers

8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Splunk User Behavior Analytics vs. Trend Micro Deep Discovery and other solutions. Updated: October 2024.
814,649 professionals have used our research since 2012.