

Splunk User Behavior Analytics and Check Point IPS compete in the security and threat detection category. Check Point IPS has the upper hand in terms of threat prevention features, being perceived as a more worthwhile investment despite its higher cost.
Features: Splunk User Behavior Analytics provides advanced machine learning for identifying anomalous behavior patterns and strong integration with various data sources. Check Point IPS offers a comprehensive intrusion prevention system, real-time threat mitigation, and an expansive threat intelligence database.
Room for Improvement: Splunk User Behavior Analytics could enhance its real-time threat prevention capabilities and reduce upfront costs. It may also benefit from expanding its threat intelligence database. Check Point IPS could improve its configuration process, decrease setup complexity, and boost customer service responsiveness.
Ease of Deployment and Customer Service: Splunk User Behavior Analytics is praised for its streamlined deployment process and robust technical support, facilitating quick integration in various IT environments. Check Point IPS also offers efficient deployment but requires more configuration effort. Its customer service is considered commendable but less responsive than Splunk’s.
Pricing and ROI: Splunk User Behavior Analytics involves higher upfront costs, reflecting its advanced analytics, but offers significant ROI by optimizing security operations. Check Point IPS is initially more affordable but incurs potential additional costs due to complex setup, with its superior threat prevention capabilities justifying its expense. Both products yield high ROI, yet value perception varies based on specific organizational security needs.
I have seen a return on investment as it results in money saved and time saved because the security tool is very complete and modern.
I have seen a return on investment more in the risk saved since it catches a lot of stuff security-wise that is good to catch.
I have seen a return on investment since using Check Point IPS, as evidenced by fewer incidents.
The solution can save costs by improving incident resolution times and reducing security incident costs.
Our technical teams have personal relationships with our account executives and direct support people.
The customer support for Check Point IPS is excellent.
I have had an excellent experience with Check Point IPS's customer team, as their technical knowledge and troubleshooting skills are excellent.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
We have moved to a hyper-scale master environment, allowing us to scale by adding additional gateways to the clusters.
The scalability of Check Point IPS is on point.
The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
Check Point IPS provides a very stable and reliable environment.
Check Point IPS is very stable.
Check Point IPS is very stable with no problems regarding this solution.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
Automated attack path correlation in SmartEvent to improve situational awareness.
At least 60% of all the alarms generated by the IPS are false positives or something that's not important to look at, and this generates a significant workload for my team.
More granular policy customization for Check Point IPS would allow protection to be tailored more precisely to specific applications or services, which would reduce unnecessary overhead and improve accuracy.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
Comparisons with Fortinet show that Check Point IPS is relatively more expensive, but we found it cheaper to retain it rather than switch.
My experience with pricing, setup cost, and licensing for Check Point IPS is good; it's baked into the firewall licensing, so that's very good.
My experience with pricing, setup cost, and licensing for Check Point IPS is great, and I have no problem with the price.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures.
The solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines.
Whenever any zero-day attack is detected, it downloads that signature into the firewall and prevents that threat.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
| Product | Mindshare (%) |
|---|---|
| Check Point IPS | 3.4% |
| Splunk User Behavior Analytics | 2.9% |
| Other | 93.7% |
| Company Size | Count |
|---|---|
| Small Business | 50 |
| Midsize Enterprise | 22 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
Check Point IPS provides robust real-time threat prevention by blocking threats before they can harm critical systems, integrating seamlessly with ThreatCloud for enhanced security management and efficiency while minimizing false positives.
Check Point IPS enhances network security through AI-powered behavioral analysis, centralized management, and customizable policies. It ensures strong protection against known and unknown threats, including zero-day attacks, and its integration with ThreatCloud allows for automatic updates, minimizing manual interventions. However, improvements in documentation, support responsiveness, and a more intuitive interface could enhance user experience. Pricing flexibility for cloud environments and quicker signature updates are needed along with better support for high traffic and enhanced visual analytics.
What Are the Key Features of Check Point IPS?Check Point IPS is widely deployed to protect networks from unauthorized access and security threats, ensuring communication channel integrity and preventing exploits. Used across sectors, it aids in compliance with security policies, supporting enterprises in maintaining secure operations.
Splunk User Behavior Analytics focuses on data aggregation and threat detection with automation, deepening insights into user behavior. It offers usability, stability, and strong integration capabilities, making it a preferred choice for organizations needing comprehensive security management.
This platform enhances security management through customizable dashboards and real-time updates. Advanced analytics for anomaly detection and behavioral profiling, coupled with powerful indexing and search capabilities, enable thorough user behavior analysis. Users experience streamlined integration with Active Directory and other monitoring tools. However, improvements are needed in dashboard customization, customer support, and analytics tools to boost user experience. Organizations use Splunk User Behavior Analytics primarily for monitoring and analyzing user behavior, integrating various data sources for effective threat detection while maintaining governance.
What are the key features of Splunk User Behavior Analytics?Splunk User Behavior Analytics is widely implemented across industries for threat detection and insider threat identification. By integrating with tools like Active Directory for monitoring and anomaly detection, organizations benefit from robust security management and effective log analysis. It underpins efforts in security, data indexing, and combining data for comprehensive threat prevention.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.