We are really pleased with Splunk and its features. It would be practically impossible to function without it.
To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential.
Learn what your peers think about Splunk User Behavior Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Security PS Supervisor at a tech services company with 1,001-5,000 employees
Real User
2019-08-13T10:41:00Z
Aug 13, 2019
It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap.
Director of Technology at a insurance company with 10,001+ employees
Real User
2019-05-09T00:25:00Z
May 9, 2019
The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus.
The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides...
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
We are really pleased with Splunk and its features. It would be practically impossible to function without it.
To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential.
Splunk is more user-friendly than some competing solutions we tried.
The solution is fast, flexible, and easy to use.
The solution appears to be stable, although we haven't used it heavily.
This is a good security product.
The product is at the forefront of auto-remediation networking. It's great.
The most valuable features are the indexing and powerful search features.
The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk.
The solution is definitely scalable.
This intelligent user behavior analytics package is easy to configure and use while remaining feature filled.
It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap.
The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus.
The most valuable feature is the ability to search through a large amount of data.
The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them.
Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks.
It is a solution that helps test and measure customer satisfaction.