Splunk User Behavior Analytics and CyberArk Identity compete in the domain of data analytics and identity management, respectively. Splunk has the upper hand with its extensive data integration and search capabilities, which support rapid decision-making and enhance security operations.
Features: Splunk User Behavior Analytics provides powerful search capabilities, customizable features, and machine learning for anomaly detection and behavior analysis. It offers extensive flexibility and supports rapid decision-making, making it a robust platform for threat detection and response. CyberArk Identity excels in strong password rotation, administrative access control, and seamless UiPath Orchestrator integration. It features multi-factor authentication and adaptive interfaces, focusing on securing privileged accounts.
Room for Improvement: Splunk could enhance its product with more integration options and flexible configurations, better pricing, and additional features like network behavior analytics. CyberArk Identity can improve its ease of use, expand federation capabilities, enhance third-party integration, and offer advanced OpenID features. Keeping some on-premises options would also help align with global security trends.
Ease of Deployment and Customer Service: Splunk enables deployments across on-premises and public cloud environments, with generally favorable customer service, although some users criticize its pricing and project setup support. CyberArk Identity provides broader deployment options, including hybrid cloud arrangements, with satisfactory technical support, though user experience could improve with broader integration and enhanced federation.
Pricing and ROI: Splunk faces challenges with high and unpredictable pricing affecting budgeting, but offers ROI through productivity gains. Other tools may be used to manage costs. CyberArk Identity has a higher price than many competitors, justifying its cost with strong service and a satisfactory ROI, particularly for larger enterprises. For smaller businesses, the cost might be challenging.
By the second month, we started seeing the benefits and achieved a return on investment.
The solution can save costs by improving incident resolution times and reducing security incident costs.
They resolved the problem immediately after I reported it, on the same day, within one hour.
I have had conversations with them twice, and their technical support team was not that good.
There are times when there is a delay in handling my inquiries via email.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
I would rate the support at eight, meaning there's some room for improvement.
Splunk's technical support is amazing.
We can use it on different phones and computers, demonstrating its scalability.
By addressing the issues I have highlighted, such as stability and making it bug and lag-free, along with improving customer support, they can enhance its scalability.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
When you have it in the cloud, you have CyberArk every time you need it.
There is a timeout period that I do not like, requiring repeated verification.
With respect to stability, I find that stability is very good.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
Sometimes issues occur when handling long-term data.
Integration or deployment is extremely difficult for CyberArk Identity.
Something they could improve is the management of multifactor authentication.
To enhance the product, they can consider improving the user interface of the software.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
Advanced reporting could see enhancements as there are some issues with latency.
I compared it with other products, and it does not require a heavy investment.
Regarding pricing, it can be quite a lot for small companies.
The pricing is acceptable.
Comparing with the competitors, it's a bit expensive.
The pricing is based on the amount of data processed, and it is considered a high-level investment for enterprises.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
It protects our platform, application, network, and infrastructure resources on any device.
It is the most powerful access management system.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
Features like alerts and auto report generation are valuable.
Splunk User Behavior Analytics offers several beneficial features, such as Insider Threat Detection, account compromise detection, risk scoring, threat detection, and machine anomaly detection.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. It is designed to enhance enterprise security and improve user experience. Its focus on security, compliance, and operational efficiency, combined with positive user feedback, makes it a strong contender in the identity management space.
CyberArk Identity offers a robust suite of features to manage user identities and access privileges. It focuses on securing access to resources across various environments, including cloud and on-premises applications. Its capabilities include single sign-on (SSO), multi-factor authentication (MFA), lifecycle management, and privileged access management. These features are engineered to streamline access control, enhance security, and ensure compliance with regulatory standards.
According to our user interviews, CyberArk Identity is praised for its reliability and user-friendly interface. IT professionals highlight the ease of integration with existing systems, while business executives appreciate the visibility it provides into access and identity management across the organization. Users also commend the responsive customer support, which is crucial for enterprise-level solutions.
IT Professionals found that CyberArk Identity's focus on multi-layered security significantly reduced the risk of data breaches and unauthorized access. With a centralized dashboard and automation features, you can streamline identity and access management tasks, saving time and reducing complexity. Finally, it helps meet various compliance requirements.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
We monitor all User Entity Behavior Analytics (UEBA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.