Splunk User Behavior Analytics and CyberArk Identity compete in the domain of data analytics and identity management, respectively. Splunk has the upper hand with its extensive data integration and search capabilities, which support rapid decision-making and enhance security operations.
Features: Splunk User Behavior Analytics provides powerful search capabilities, customizable features, and machine learning for anomaly detection and behavior analysis. It offers extensive flexibility and supports rapid decision-making, making it a robust platform for threat detection and response. CyberArk Identity excels in strong password rotation, administrative access control, and seamless UiPath Orchestrator integration. It features multi-factor authentication and adaptive interfaces, focusing on securing privileged accounts.
Room for Improvement: Splunk could enhance its product with more integration options and flexible configurations, better pricing, and additional features like network behavior analytics. CyberArk Identity can improve its ease of use, expand federation capabilities, enhance third-party integration, and offer advanced OpenID features. Keeping some on-premises options would also help align with global security trends.
Ease of Deployment and Customer Service: Splunk enables deployments across on-premises and public cloud environments, with generally favorable customer service, although some users criticize its pricing and project setup support. CyberArk Identity provides broader deployment options, including hybrid cloud arrangements, with satisfactory technical support, though user experience could improve with broader integration and enhanced federation.
Pricing and ROI: Splunk faces challenges with high and unpredictable pricing affecting budgeting, but offers ROI through productivity gains. Other tools may be used to manage costs. CyberArk Identity has a higher price than many competitors, justifying its cost with strong service and a satisfactory ROI, particularly for larger enterprises. For smaller businesses, the cost might be challenging.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
We've seen a return on investment of more than 100% over the past two to three years.
The solution can save costs by improving incident resolution times and reducing security incident costs.
They resolved the problem immediately after I reported it, on the same day, within one hour.
They respond immediately when requests are raised, and they are always available for priority one tickets.
I would rate technical support for CyberArk Identity a nine out of ten because they are professional, knowledgeable, and resolve queries efficiently when needed.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate the support at eight, meaning there's some room for improvement.
We can use it on different phones and computers, demonstrating its scalability.
CyberArk Identity is scalable as needed, but increasing resources affects overall costs.
CyberArk Identity is definitely a scalable solution; it all depends on the money that you have, as with anything else.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
When you have it in the cloud, you have CyberArk every time you need it.
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
Integration or deployment is extremely difficult for CyberArk Identity.
There's a need to enhance network performance.
For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Comparing with the competitors, it's a bit expensive.
The pricing is based on the amount of data processed, and it is considered a high-level investment for enterprises.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
CyberArk Identity is a great solution for overall security posture and privileged identity controls because it has a strong base in securing privileged access and managing identities within our environment.
It is the most powerful access management system.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
Features like alerts and auto report generation are valuable.
Splunk User Behavior Analytics offers several beneficial features, such as Insider Threat Detection, account compromise detection, risk scoring, threat detection, and machine anomaly detection.
Product | Market Share (%) |
---|---|
Splunk User Behavior Analytics | 8.0% |
CyberArk Identity | 0.8% |
Other | 91.2% |
Company Size | Count |
---|---|
Small Business | 19 |
Midsize Enterprise | 4 |
Large Enterprise | 9 |
Company Size | Count |
---|---|
Small Business | 7 |
Midsize Enterprise | 5 |
Large Enterprise | 12 |
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
We monitor all User Entity Behavior Analytics (UEBA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.