Try our new research platform with insights from 80,000+ expert users

ClearSkies SaaS NG SIEM vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 13, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ClearSkies SaaS NG SIEM
Ranking in Security Information and Event Management (SIEM)
50th
Average Rating
7.6
Reviews Sentiment
7.3
Number of Reviews
2
Ranking in other categories
No ranking in other categories
Splunk Enterprise Security
Ranking in Security Information and Event Management (SIEM)
1st
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
327
Ranking in other categories
Log Management (2nd), IT Operations Analytics (1st)
 

Mindshare comparison

As of August 2025, in the Security Information and Event Management (SIEM) category, the mindshare of ClearSkies SaaS NG SIEM is 0.2%, up from 0.0% compared to the previous year. The mindshare of Splunk Enterprise Security is 9.4%, down from 11.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM)
 

Featured Reviews

ZH
Has good integration capability and provides information and events but improvement is needed in information retrieval speed
The best features are the comprehensive event collection and analysis. Once set up properly, we receive all events and information. The team analyzes our data and presents incidents to us. We can communicate with their team to escalate and resolve incidents. It has a feature we use to search for information about our environment and past incidents. This is very valuable. The integration capability is very good - the ClearSkies SaaS NG SIEM team is collaborative. We've integrated most of our systems, including EDR and NDR. They have agents to collect events from servers and assets.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The integration capability is very good - the ClearSkies SaaS NG SIEM team is collaborative. We've integrated most of our systems, including EDR and NDR. They have agents to collect events from servers and assets."
"The correlation rules and the user platform are most valuable."
"It has reduced the time to resolution, time to investigate, and time to troubleshoot for debugging issues."
"Splunk gives my clients the ability to bring multiple, disparate types of data together, then correlate and report on them."
"You can integrate Splunk with third-party security automation solutions and set rules for automatic response."
"UBA, User Behavior Analytics, is a key feature."
"The breadth of the data sources that Splunk can ingest data from is broad and deep and it does an exemplary job at handling structured data."
"The search lookups are useful."
"The reporting aspect is good and it does what I need it to do."
"It helps us uncover bottlenecks in the network."
 

Cons

"The main issue for improvement is the platform's slowness in presenting information. Retrieving information can take a little time when clicking on something."
"They can add behavior analytics and AI or machine learning technology. They also improve their correlation engine. In addition to collecting logs from devices, they can collect the traffic and then correlate these logs and the traffic information."
"The pricing of Splunk Enterprise Security is not very affordable, and I have seen many companies planning to leave because of cost concerns."
"They can improve their support teams. They can also improve their capability of ingesting data from different IoT sources."
"Splunk Enterprise Security can be improved mainly from the user interface regarding the visualizations."
"Splunk is such a large product. Allowing it to be more easily used by people who have not had a lot of training on it would be an improvement."
"One issue is that we are getting a lot of false positives. We are trying to reduce them by customizing the default rules, changing thresholds, and using white-listing and black-listing. It's getting better and better as a result. But they need to build components that would reduce the false positives."
"While there aren't any major areas where the solution has to be improved, there are certain integrations that are still not available. I would specifically like to see legacy applications integrated."
"Splunk could be improved by reducing the cost. The cost is one of the biggest challenges for us in keeping to our production requirements."
"Being able to have a one-stop shop where you have the alert, but then you can generate the case right there from Splunk Enterprise Security instead of having to pivot to another tool such as Mission Control. You do not have to keep bouncing between them, so if you could do it all in one place, that would be great. The new release is supposed to start getting in that direction."
 

Pricing and Cost Advice

"They have changed the pricing policy. Its price is competitive. Its price is less than half of the price of QRadar, LogRhythm, and Splunk."
"Regarding pricing, I'd say it's in the middle range. Pricing is very good compared to others."
"It is expensive, but it is a good tool. It is worth the cost."
"Splunk's cost is very high. They need to review the pricing. They have to go back and totally readdress the market."
"Splunk is priced higher than other solutions."
"Further reductions would be fantastic, and I believe that more and more people would flock to it."
"The license for Splunk Enterprise Security is expensive."
"It's definitely worth it."
"Most people share the same thought that the ingestion rates can get pretty pricey. There is a lot of work we do to curate the data that we send to Splunk so that it is not too noisy or too expensive."
"The pricing is based on the volume of data fed into it, which can lead to substantial costs. This pricing model is complex and unpredictable, making cost management difficult."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
865,164 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for ClearSkies SaaS NG SIEM?
Regarding pricing, I'd say it's in the middle range. Pricing is very good compared to others.
What needs improvement with ClearSkies SaaS NG SIEM?
The main issue for improvement is the platform's slowness in presenting information. Retrieving information can take a little time when clicking on something.
What is your primary use case for ClearSkies SaaS NG SIEM?
I use the solution as a SIEM and managed SOC. It collects events and incidents from all our systems like, EDR, NDR, servers, and switches. The managed SOC team raises incidents for us to review and...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

ClearSkies NG SIEM
No data available
 

Overview

 

Sample Customers

Information Not Available
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about ClearSkies SaaS NG SIEM vs. Splunk Enterprise Security and other solutions. Updated: July 2025.
865,164 professionals have used our research since 2012.