Find out in this report how the two Log Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
Splunk Cloud Platform has impacted operational costs; it's a bit expensive, but it provides value for money.
Most of the time when my team encounters issues, they receive responses within 24 hours.
Support is prompt and helpful.
Premium support is costly and may not always provide a satisfactory experience.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
In terms of stability, I would rate Elastic a solid eight out of ten.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
Elastic Security consumes a lot of resources, requiring a substantial deployment setup.
Integration is a bit difficult due to the coding required for the integrations.
Splunk Cloud Platform needs improvement in its security offerings, specifically in cybersecurity.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
Splunk Cloud is considered too expensive, with its two product offerings both being costly.
If I were to rate the price for the product from 1 to 10, I would rate it nine.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
Elastic Security is as flexible and configurable as Microsoft Sentinel.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
The most valuable feature of Splunk Cloud Platform is its robustness and ability to ingest logs.
The real-time search capability of this product enhances operational decision-making.
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
Splunk Cloud Platform is widely used for log management, security monitoring, application performance monitoring, troubleshooting, data aggregation, and IT operations. It centralizes logs from numerous sources, enabling detailed analysis, incident detection, and effective dashboard creation.
Companies across various industries leverage Splunk Cloud Platform for cybersecurity, compliance, user activity monitoring, and alerts. It helps in managing cloud environments, optimizing data storage costs, and enhancing customer insights with effective data visualization. The platform's robust capabilities include customizable reporting, flexible log sending, powerful search features, and seamless integration with other systems. Users monitor multiple environments and platforms effortlessly with the cloud infrastructure maintained by Splunk. Despite its advantages, users find the pricing steep, support ineffective, and encounter performance issues with large data volumes. Integration challenges, limited training resources, and insufficient documentation also pose concerns.
What are the most important features of Splunk Cloud Platform?Splunk Cloud Platform is implemented across industries including finance, healthcare, retail, and technology. Organizations use it to enhance cybersecurity measures, meet compliance requirements, monitor user activities, and issue automated alerts. In finance, it assists in fraud detection and compliance. In healthcare, it ensures data security and regulatory adherence. Retailers use it for customer behavior analysis and performance monitoring, while technology companies benefit from its troubleshooting and log management capabilities. Despite its powerful features, companies face challenges with pricing, support, and integration that require consideration during implementation.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.