Try our new research platform with insights from 80,000+ expert users

Cisco Secure Cloud Analytics [EOL] vs Splunk User Behavior Analytics comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Cloud Analytic...
Average Rating
8.6
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Splunk User Behavior Analytics
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
25
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (13th), User Entity Behavior Analytics (UEBA) (5th)
 

Featured Reviews

SP
Security Analyst at Orange España
Efficiently generates alerts for suspicious activities and scales easily
There are two areas of improvement. Firstly, extend the log retrieval limit to at least three months. For example, there is a limit on the number of log messages that can be received. So, I would like to expand the log retrieval limit. And another thing, if we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration. If a new user wants to learn how it should work, how policies work, and where we can configure policies, there should be some learning material for this product.
SK
Enterprise Architect at Wipro Limited
Offers intuitive deployment with strong customer support and advanced analytics features
There are improvements that could be made to Splunk User Behavior Analytics as any product will have advantages and disadvantages. Scalability is one consideration. For example, the advantages include rapid auto scaling to meet demand. A disadvantage is that it can lead to cost overrun if not properly factored or governed. The speed of deployment offers faster provisioning as an advantage, but it can require substantial automation skills and infrastructure as code expertise, which can be challenging. Cloud provides major operational benefits such as agility, automation, resilience, and global access when setting up on Cloud. However, it introduces challenges such as cost control, complexity, and vendor dependency. For example, global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Monitoring the traffic, making sure you have the visibility."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"The product helps me to see malware."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The solution appears to be stable, although we haven't used it heavily."
"The dashboards are one of the very core functions of Splunk User Behavior Analytics; they are very good in dashboarding, and the dashboards themselves are nice, very good, and very helpful."
"The most valuable feature is the ability to search through a large amount of data."
"This is a good security product."
"It is a solution that helps test and measure customer satisfaction."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
 

Cons

"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"The initial setup is a bit complex in terms of deployment and configuration"
"The initial setup of Cisco Stealthwatch Cloud is complex."
"The product's price is high."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"In the future I would like to see simplified statistics and analytical threats."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"The price of Splunk UBA is too high."
"The machine learning algorithm in Splunk User Behavior Analytics is actually the core thing that needs to be updated because this feeds all the other functions inside it."
"I'm not aware of any lacking features."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"The dashboard part could be improved."
"There are occasional bugs."
 

Pricing and Cost Advice

"Cisco Stealthwatch Cloud is an expensive enterprise solution."
"The solution is quite expensive."
"The price of Cisco Stealthwatch Cloud is expensive."
"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
"There are additional costs associated with the integrator."
"The licensing costs is around 10,000 dollars."
"Pricing varies based on the packages you choose and the volume of your usage."
"I am not aware of the price, but it is expensive."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
879,259 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
25%
Manufacturing Company
11%
Government
9%
University
9%
Computer Software Company
19%
Financial Services Firm
9%
Government
8%
Educational Organization
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise6
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise5
Large Enterprise12
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
Splunk User Behavior Analytics is a premium product. Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the ...
What needs improvement with Splunk User Behavior Analytics?
Splunk User Behavior Analytics is still an immature product, so it still needs some R&D to be able to be mature in the market. The prediction, algorithms, and ML codes behind Splunk User Behavi...
 

Also Known As

Cisco Stealthwatch Cloud, Observable Networks
Caspida, Splunk UBA
 

Overview

 

Sample Customers

Options, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: December 2025.
879,259 professionals have used our research since 2012.