Try our new research platform with insights from 80,000+ expert users

ClearSkies SaaS NG SIEM vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 6, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ClearSkies SaaS NG SIEM
Ranking in Security Information and Event Management (SIEM)
51st
Average Rating
7.6
Reviews Sentiment
7.3
Number of Reviews
2
Ranking in other categories
No ranking in other categories
Splunk Enterprise Security
Ranking in Security Information and Event Management (SIEM)
1st
Average Rating
8.4
Reviews Sentiment
7.6
Number of Reviews
306
Ranking in other categories
Log Management (2nd), IT Operations Analytics (1st)
 

Mindshare comparison

As of May 2025, in the Security Information and Event Management (SIEM) category, the mindshare of ClearSkies SaaS NG SIEM is 0.1%, up from 0.0% compared to the previous year. The mindshare of Splunk Enterprise Security is 9.5%, down from 12.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM)
 

Featured Reviews

ZH
Has good integration capability and provides information and events but improvement is needed in information retrieval speed
The best features are the comprehensive event collection and analysis. Once set up properly, we receive all events and information. The team analyzes our data and presents incidents to us. We can communicate with their team to escalate and resolve incidents. It has a feature we use to search for information about our environment and past incidents. This is very valuable. The integration capability is very good - the ClearSkies SaaS NG SIEM team is collaborative. We've integrated most of our systems, including EDR and NDR. They have agents to collect events from servers and assets.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The correlation rules and the user platform are most valuable."
"The integration capability is very good - the ClearSkies SaaS NG SIEM team is collaborative. We've integrated most of our systems, including EDR and NDR. They have agents to collect events from servers and assets."
"Splunk has give us the capability to easily track problems and their status."
"Splunk Enterprise Security offers two valuable features: the Common Information Model and arrangement modules."
"Scalability-wise, the tool is awesome since you can add or reduce your resources in an easy way."
"Overall, Splunk is among the top three SIEM tools due to its capabilities and agility in bridging business analytics with security needs."
"The data analysis part is good in Splunk, which is something that I like the most. It is also quite easy to use. Its dashboards, visualizations, and analytics are good."
"The solution's most valuable feature is its data modeling."
"It is a very stable solution. I never really had a hiccup with the tool."
"Splunk has significantly reduced the time in performing the task of aggregating logs, reviewing as well as time spent during investigations."
 

Cons

"The main issue for improvement is the platform's slowness in presenting information. Retrieving information can take a little time when clicking on something."
"They can add behavior analytics and AI or machine learning technology. They also improve their correlation engine. In addition to collecting logs from devices, they can collect the traffic and then correlate these logs and the traffic information."
"Its search or filtering capability is nice, but it can be improved. It is currently a bit complicated, and it should be simplified. If we can write the search filter in a more simplified way, it would be better."
"It could be more user friendly, in terms of the end-user experience."
"Make it easy to use and the cost cheaper. This will help all organisations to implement Splunk."
"I would like to see more SIEM functionality and a better ticket tool."
"I would like to see the asset and identity lookups be more automatic and less manual."
"It is important to make sure that everything is built off of the threat models and all the underlying items within Splunk."
"Splunk Enterprise Security should provide a better and richer integration."
"The GUI could be improved to include some of the capabilities that other BI solutions have. The layout is a little restrictive where you can’t resize all the panels to exactly how you would like them without tweaking some XML code."
 

Pricing and Cost Advice

"Regarding pricing, I'd say it's in the middle range. Pricing is very good compared to others."
"They have changed the pricing policy. Its price is competitive. Its price is less than half of the price of QRadar, LogRhythm, and Splunk."
"Be upfront about your needs and expectations. Splunk is great to work with."
"I believe that Splunk Enterprise Security is worth the price, but it is expensive."
"Splunk Enterprise Security incurs a significant cost because of the amount of data we send, but we are fine with the value we're getting for that price."
"Splunk Enterprise Security is expensive."
"The price can always be lower, but it is fair at the moment. The cost efficiencies depend on the licensing and how much data we are bringing in. We have a fairly large footprint, so it is cost-effective."
"It can be expensive, especially the licensing costs. However, there is added value in what it can do, not just log aggregation."
"Splunk is really expensive."
"Splunk has always been on the expensive side."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for ClearSkies SaaS NG SIEM?
Regarding pricing, I'd say it's in the middle range. Pricing is very good compared to others.
What needs improvement with ClearSkies SaaS NG SIEM?
The main issue for improvement is the platform's slowness in presenting information. Retrieving information can take a little time when clicking on something.
What is your primary use case for ClearSkies SaaS NG SIEM?
I use the solution as a SIEM and managed SOC. It collects events and incidents from all our systems like, EDR, NDR, servers, and switches. The managed SOC team raises incidents for us to review and...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

ClearSkies NG SIEM
No data available
 

Overview

 

Sample Customers

Information Not Available
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about ClearSkies SaaS NG SIEM vs. Splunk Enterprise Security and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.