Try our new research platform with insights from 80,000+ expert users

Everbridge IT Alerting vs Splunk Enterprise Security vs Splunk On-Call comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

IT Alerting and Incident Management
Security Information and Event Management (SIEM)
IT Alerting and Incident Management
 

Featured Reviews

it_user741570 - PeerSpot reviewer
Gets the right parties to the table at the right time - our mean time to restore has diminished, saving us money
In recent weeks we've been talking to Everbridge about leveraging some new functionality that they're demploying right now around orchestration. Imagine a full, closed-loop event remediation: auto-remediation. A server throws an alert. We catch it in our monitoring tool. We page or SMS text, using Everbridge IT Alerting. A group member receives that text and responds to the text with "Option One." Option one can say, "I want to go ahead and execute an orchestration that will automatically stop and restart the services on that box or even reboot the box." That would, again, further reduce service restoration time, and significantly reducing the manual engagement of logging a ticket, logging onto the box, restarting the box or the servers or services manually. All of that can be done through automation. We're not there yet, but that's what we're talking about right now, as a part of our next wave of moving along the crawl, walk, run journey. In terms of what could be improved, almost always, there is something that could be improved. I've been in this industry long enough to know that there is no perfect system. All the good ones still offer opportunities for getting better. I think if you were to look from their point of view, they would also see themselves in a crawl, walk, run journey. They may be further along in their walk, but they're probably not in the "Olympic sprint" or "Olympic marathon" stage yet. They've got lots of potential, room for feature enhancements, improvements. A couple of key ones might include - and I think they are working towards these things - analytics. If I want to do sophisticated reporting and analysis of the data that's being captured in IT Alerting, at the moment, the reporting interface is immature. They're very helpful. They get it. They're listening to us, but it's weak. It's growing. It's getting better. Reporting and analytics would be one space. Their integration capabilities are still progressing, but not quite where we'd like to see them yet. They're moving there with that orchestration capability where they're seeing the potential of an API-first mentality. So instead of trying to build custom connections into everything, you open up APIs to allow other systems to talk to IT Alerting and allow IT Alerting to talk to other systems. There is room for improvement, but they get it. They're listening in that space, too. Sure, there are things they can be doing better, but in partnership with them, us among other customers, I think we've got their ear, and they're being very proactive about listening.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.
Wojtek Witowski - PeerSpot reviewer
Allows us to create flexible schedules for on-call rotations
For alerts, we could choose to get a text message, app notification, or a phone call. The phone calls were very unusable, because it just read a bunch of numbers, like an ID of the alert. If there was a way to customize the phone call message, that would be great. Later, we would try to read the message, but it wasn't great at reading that. They had some sort of internal chat functionality where if we got an alert, we could write to somebody else and ask them for help, but that was super cumbersome. There could be improvements with communicating an incident or alert. Imagine you call the help desk and you say that your computer is broken and then they say, "Actually, the internet is broken, so let us forward your alerts to the network people." And the network people say, "Actually, the electricity is the problem, so let us forward it to the electricity people." Basically, you could send the alert between the support teams inside the company.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's very customizable. For instance, if you're going on vacation this week, you go to your calendar and say, "I'm off this week, make the secondary the primary." And that's done on-the-fly. It's very responsive. It's very user-friendly."
"The most important feature, from our perspective, is the integration with our ticketing system. That eliminates wasted motion and time in drafting and sending and finding the right distribution list."
"The most important features are the scheduling capability and the integration with ServiceNow."
"It's mainly for mass notification and pooling of contacts. Pooling of customers is valuable."
"The rules option has been helpful, as we can adjust the conditions in the template."
"The response time is real-time alerting. It is very helpful, because it makes things a lot easier. All we have to do is put a circle around a geo-fence and shoot off a message."
"It just runs. I do not think we have had a single outage; nothing. There has not been a single issue with it in the time that we have had it running. It just works."
"The most valuable feature is automated escalation, as it eliminates a manual process which is prone to errors."
"Its alerting is most valuable. We have alerts set up in our environment for certain attacks, such as an SQL injection attempt. We have a front-facing server for the website. It is out there, and anybody can access it. When those SQL injection attempts come in, we are able to detect that with the alert."
"The scalability is good."
"We can easily configure things as required in relation to our use cases."
"Its usability is the best part. It is easy for our developers to use if they want to search their logs, etc."
"The solution's most valuable feature is risk-based alerting, focusing on building out user risks for individuals throughout the enterprise."
"It scales better in the cloud than on-premise."
"We are using Microsoft 365 and we're using the Exchange Mail Service. It's good for monitoring that in particular."
"It's very flexible. If you look from the cloud implementation it is there. Reports are made quickly. Unlike other tools, it caters to all kinds of technical information on the front very easily. There's no need to put in any technical information. You can pull on the reports very easily, take action, and notify stakeholders."
"VictorOps has been good enough for us and it's effective for our needs in case of an on-call escalation process."
"The alert calling feature is the best because notifications are delivered via phone messages."
"The most valuable feature of the solution is helpdesk escalation."
"The flexible schedule is the most valuable feature. It was very easy to set out a rotation."
"Transmogrifier and automatic solution report gives me a report with the solution and the way to solve issues when an error occurred."
 

Cons

"I've worked closely with Everbridge teams in my previous positions too, and the one thing I would like to see is the distance. You have to measure it, and it's not really accurate. If we could have a general distance within the alert itself to tell us where the closest asset is, it would be useful. That's one thing I'd like to see."
"Explanations are limited to 500 characters in description fields."
"The solution's non-targeted communication with external parties could be enhanced."
"A key area for improvement - and I think they are working towards these things - is analytics. If I want to do sophisticated reporting and analysis of the data that's being captured in IT Alerting, at the moment, the reporting interface is immature."
"The feature that xMatters has that Everbridge doesn't have, or has in a limited way, is a method of funneling some alerts, as an FYI, to other stakeholders who are not necessarily prime actors in an incident."
"There is some room to improve the initial-rollout functions which are a little bit painful."
"I know that we get frustrated at the capacity of SMS messages. It's not very long, and if you want to send a long message, they end up sending you a link to the rest of the message."
"They still have a limitation due to their partner, I believe it's Twilio, where, if you're on an incident call, there is a four-hour time limit. We often have calls that go over four hours in length so people have to drop and rejoin to reset their four-hour timer. It's a minor inconvenience, but it's not ideal."
"It needs more thoroughly tested releases. Every new big version (6, 7, etc.) has had so many bugs that it makes me wary of customers upgrading right away."
"I would like to see ability to master management. In terms of clustering, how it manages clustering needs improvement."
"Splunk's reporting functionality would benefit from enhanced customization capabilities, allowing users to tailor reports to their specific needs for better data visualization and analysis."
"The only thing which can be improved is that they are too subjective on whom their Splunk4Good initiative can be applied. They market it as you only need to be a nonprofit, but there is more to it."
"The product could be cheaper."
"I'd like to see more integration with more antivirus systems."
"We'd like Splunk to reduce false positives."
"If you monitor too much, you can lose performance on your systems."
"There could be improvements with communicating an incident or alert."
"At that stage, all our needs are fulfilled, but at the beginning, we had some feature requests and they were deployed during their roadmap."
"The third-party configuration tool could be easier to use."
"Should have more YouTube webinars."
"The solution can be improved by including a wider list of permissions."
 

Pricing and Cost Advice

"The annual cost is $125,000 USD. That is for everything. It includes the 11,000 mass notifications. Technically, we have 500 licenses for IT Alerting."
"This product has helped us save $200,000 from being able to get rid of vendors and consolidate functionalities to doing incident reporting."
"Pricing is reasonable."
"Their call structure is based on how many people are IT alert people and who is on the calendar, and the cost will be driven by those numbers versus if you are using it for the non-IT alert. As you look at the competition and other vendors, make sure you truly understand your cost structure with them."
"As far as I'm aware, there are no costs beyond the standard licensing fees."
"I do not know about the licensing costs, but I know they're in groups, and there are permission caps. For example, you can have five admin accounts, and anyone can receive a notification. There's a mobile component too, which I find particularly useful, but it has to be a part of the contract."
"The end result is that we have driven down our MTTR by an average of about 45 minutes across all major outages. That is very substantial considering the cost of every minute of outage can be thousands of dollars lost."
"It saves us a lot of time."
"It is quite expensive."
"From what I have seen so far, Splunk has multiple cost models. The one that we are using is pretty good when it comes to ingesting data into the environment. It has worked out pretty well."
"The solution is costly."
"It is expensive. I work for multiple clients. I am working for more than five clients, but most of the clients are switching from Splunk to Sentinel because of the cost. Even though Sentinel is very limited, clients are moving to Sentinel."
"It is pretty straightforward and based on the sizing. If I compare it with other competitors, it makes sense."
"Splunk ES is quite expensive compared to some products on the market."
"I've heard Splunk is often preferred over other options, but the cost can be prohibitive for smaller organizations."
"Most people share the same thought that the ingestion rates can get pretty pricey. There is a lot of work we do to curate the data that we send to Splunk so that it is not too noisy or too expensive."
"The price of the solution could be less expensive."
report
Use our free recommendation engine to learn which IT Alerting and Incident Management solutions are best for your needs.
849,963 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
12%
Healthcare Company
9%
Manufacturing Company
8%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
8%
Government
8%
Computer Software Company
33%
Financial Services Firm
11%
Manufacturing Company
11%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with Everbridge IT Alerting?
The solution's non-targeted communication with external parties could be enhanced.
What advice do you have for others considering Everbridge IT Alerting?
We are using Everbridge IT Alerting for incident and crisis modules. The tool is powerful in itself, but as with any ...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is a...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingest...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitor...
Ask a question
Earn 20 points
 

Also Known As

No data available
No data available
VictorOps
 

Overview

 

Sample Customers

Choice Hotels, Alexion, Navy Federal Credit Union, EastWest Bank, IBM, Core Logic, Paypal, Charter Communications, Lowes, Express Scripts, Finastra, Worldpay
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
NVIDIA, Cisco, NBC, Rackspace, Intuit, DirectTV, NASCAR, Arrow Electronics, Alliance Health, NetApp, Edmunds, New York Times, Return Path, Sony Playstation, CA Technologies, Sphero, Symantic, HBO, Weatherford, Blackboard, Epic Games
Find out what your peers are saying about PagerDuty, Atlassian, Splunk and others in IT Alerting and Incident Management. Updated: April 2025.
849,963 professionals have used our research since 2012.