Many users discuss valuable features such as threat protection and dynamic data input, while also addressing a common need for an improved reporting interface.
Ultimately, how have users benefitted from their security information and event management tools?
Splunk delivers a holistic view of an application (the big picture).
Splunk provides immediate visibility into key business metrics and new business insights that deliver immediate value.
Significant reduction in mean-time-to-investigate (MTTI) and mean-time-to-resolve (MTTR) production incidents from days to hours.
Splunk’s visualization capabilities help pinpoint problem areas, spikes, and anomalies easier and faster.
Ability to monitor and resolve integration problems before they impact the business user area.
Splunk is being used as part of the development life cycle, resulting in better quality and more efficient applications.
Provides additional insights into a 360-degree view of the customer.
However, Kline then adds, “We usually have to follow up with technical support on our open cases. Otherwise, Splunk listens to customers and is constantly incorporating their feedback in future releases.”
“The threat protection network is the most valuable feature because when you get an offense, you can actually trace it back to where it originated from, how it originated, and why…
Normally, an offense comes in and an offense is something negative, to put it plainly, that impacted your environment. Once it comes through, you can then see from the QRadar log sources, who or what triggered the offense.”
In the future, adds this vulnerability manager, “I would like to see a more user-friendly product. I would like them to make it much more user-friendly. At this stage, you need to use a lot of widgets to do your searches.”
“Multiple use cases were only possible to be created due to this feature list. The feature list allows us to input data dynamically to list it as a rule action.
For example: If you need to take a Source IP from an IPS event and put it in an ActiveList suspicious IP, you can create another rule for AntiVirus events, where it only matches IPs within that list.”
For room for improvement, this product specialist points to the tool’s GUI interface, suggesting that “Although a lot of improvements were made on the GUI in the last version (6.9.1), there are still a lot of configurations that need to be done using the console.
The console is not a bad tool to use. I personally like to use it. However, compared to competitive solutions (Splunk, QRadar), it appears to be a weakness.”
AlienVault
Aaron Balillio, a Security Architecture and Operations Lead at a university with 1,001-5,000 employees, writes about AlienVault’s NIDS/HIDS features:
“The NIDS/HIDS features have probably been the best features for us in our environment. We've had some open-source options and, while they work, it isn't the same as having commercial support. SIEM is the second-most useful feature.”
Baillio also adds that AlienVault’s reporting capabilities “still need a lot of work, especially on the vulnerability side”, and that the vulnerability management UI “could be improved as well.”
“The ability to write my own parsers for the devices that are not supported by Fortinet is the most valuable feature. It’s impossible to find an application that supports every device/manufacturer that we have. Thus, being able to write my own parsers for device logs, allows for greater scalability…
It provides extremely fast and flexible querying of logs/events on the network. For example, it’s easy to write a quick query for all the “authentication” requests on the network, regardless of where they came from, i.e., during the past days, weeks or months.”
In terms of how Fortinet FortiSIEM (AccelOps) could improve later down the line, Korosi notes that “The reporting feature is not very attractive for the upper management and I am not able to perform complex/nested queries. However, it does function well for our day-to-day operations.”
Hi, in my opinion, because it is still the best at giving you visibility of what's happening in your IT infrastructure, and at detecting threats.
Visibility and detection may seem simple tasks. but actually, they require a lot of capabilities in understanding, integrating, logging, and alarms from a huge multitude of devices. Such tasks go under the line of log ingestion, normalization, etc., and that is far from easy. QRadar has done a lot of work in that direction.
Another aspect is event correlation. And here, either you write the correlation rules yourself, spending $$$$ of professional services, and by the way, it'll take forever to test, implement and maintain up to date, or your access to a very long list of preset correlation rules, that are already available and waiting to be activated.
Finally, visibility and threat detection is just the beginning of a journey pointed at becoming aware of what's happening in your IT and taking relevant and effective action. There are several other technologies that have to be used to minimize exposure, and contain, and remediate relations to an attack. I believe IBM has a few of those, that can be integrated. But whichever you use at the end of this journey, if the original feed is not correct, not relevant, or not complete, you missed your goal in the first place.My 5 cents :)VS
Cyber Security Specialist at a tech vendor with 10,001+ employees
May 12, 2022
Licensing is mostly dependent on the EPS, events per second. Depending upon the number of products that are integrated with the platform, we have to come to an optimal EPS value. I'm not very sure about the financials, however, the licensing cost cannot be as much as that for Sentinel, which is not very low. For customers who need medium EPS values, we advise QRadar. The basic out the box cost covers, the EPS value that you have specified, and then some archiving maybe. It should include at least six months of archiving and other functionalities. Most of the customers will go for the standard package and we don't have to go for extra archival or enhanced DPS. 10% to 15% of DPS can always be increased. It will not completely shut down the system, however, it'll start sending us notifications that the DPS is getting increased and then we can go for a higher licensing.
Today, Security Information and Event Management (SIEM) solutions play a pivotal role in bolstering organizational defenses against an array of cybersecurity threats. Through the lens of real-world success stories and an evaluation of top SIEM technologies, this comprehensive article illustrates the transformative impact of SIEM systems across industries and highlights leading solutions, includ...
Enterprise Cloud and AI Security Architect at a security firm with 10,001+ employees
Feb 6, 2025
Apart from these, Google Chronicle SIEM is also the best solution for threat hunting and threat detection. We can also use Google Chronicle (Google SecOps) as a SIEM tool and even can be integrated with Mandiant ( third-party tool) for real-time threat intelligence. Google Chronicle is a cloud security service in GCP.
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Splunk, IBM, Exabeam, and more! Updated: January 2026.
arcsight - splunk - rsa