Try our new research platform with insights from 80,000+ expert users

Honeycomb Enterprise vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Honeycomb Enterprise
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
2
Ranking in other categories
Application Performance Monitoring (APM) and Observability (26th), AI Code Assistants (11th)
Splunk Enterprise Security
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
349
Ranking in other categories
Log Management (2nd), Security Information and Event Management (SIEM) (1st), IT Operations Analytics (1st)
 

Mindshare comparison

While both are Application Lifecycle Management solutions, they serve different purposes. Honeycomb Enterprise is designed for Application Performance Monitoring (APM) and Observability and holds a mindshare of 1.5%, up 1.4% compared to last year.
Splunk Enterprise Security, on the other hand, focuses on Security Information and Event Management (SIEM), holds 9.3% mindshare, down 11.6% since last year.
Application Performance Monitoring (APM) and Observability Market Share Distribution
ProductMarket Share (%)
Honeycomb Enterprise1.5%
Dynatrace8.8%
Datadog7.2%
Other82.5%
Application Performance Monitoring (APM) and Observability
Security Information and Event Management (SIEM) Market Share Distribution
ProductMarket Share (%)
Splunk Enterprise Security9.3%
Wazuh10.9%
IBM Security QRadar7.2%
Other72.6%
Security Information and Event Management (SIEM)
 

Featured Reviews

Diego Gomes De Lima - PeerSpot reviewer
Easy to use and the dashboard is very intuitive
We faced some OpenTelemetry metrics lost between the communication from the service and the Honeycomb.io. I can't say if this is a Honeycomb.io issue or if there are some limitations in OpenTelemetry. Alerts are very helpful in Honeycomb.io, but we don't usually merge because we can compare queries with queries for making alerts. We can make alerts based on static numbers, which may block us from building alerts that could be generic enough or could be serviced.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's most valuable features are the queries for the OpenTelemetry events and all the tracing."
"The solution's initial setup process was straightforward since we were getting enough support from Honeycomb.io's team."
"Splunk Enterprise Security's risk-based alerting has been a game-changer for us, adding intelligence to alerts by considering behavioral or internal asset-based criteria, effectively helping us prioritize alerts and filtering out noise that can be ignored."
"To get visibility from your network devices, servers, and security devices is a great feature."
"I have not seen any outages in the product in the past two years that it has been running in our company, so I think it is good when it comes to the stability part."
"Splunk has significantly helped with aggregation and correlation of critical logs. Not having to grep on each individual server has made everyone more efficient."
"The features of Splunk Enterprise Security that I prefer most are the correlation engine and the common information model, basically the aggregation of data."
"The tool drastically reduces SOC overhead. Its integration with our tool suite is great and helps us correlate events. The solution is also a lot faster than our standalone instances."
"We have a one stop dashboard for health of some of our services where you can click in and it takes you to other dashboards that have custom near real-time metrics that show the application's health."
"We primarily use it to correlate logs throughout the enterprise for both searching and use in investigations."
 

Cons

"The process of log scraping gets delayed on Honeycomb.io. At times, it gives false alerts to the application team."
"We can make alerts based on static numbers, which may block us from building alerts that could be generic enough or could be serviced."
"Better directions on search head clusters."
"The solution could improve by increasing the performance. We have run into problems when large amounts of data are processed."
"One main change I would suggest is related to the incident board: when an incident is resolved, it should not appear on the incident board. It's just a rare occurrence that we open up the incident."
"Splunk could have more built-in use case presets that customers can build on and customize."
"The documentation and training resources available for knowledge and training can be expanded. We need to learn more about Splunk Enterprise Security and new security attacks."
"Regarding customer service and technical support, their support is the worst I have ever run into in any industry."
"The product could be cheaper."
"Previously, they developed custom connectors or add-ons for a lot of applications. But that number can be upgraded still. There are a lot of applications in the world that are not supported."
 

Pricing and Cost Advice

Information not available
"Licensing is a yearly, one-time cost."
"Splunk Enterprise Security is expensive."
"Splunk is not free."
"Splunk Enterprise Security's pricing is based on data volume, which generally suits large enterprises."
"I think that most of the log analytics solutions are expensive and I'm not sure if it's worth it."
"The pricing can be better. We are already considering Elastic because Splunk is too expensive. You have to pay based on per-day ingestion. There should be a more flexible model for the use cases where one day you have a huge amount, and on other days, it is quite less."
"The price can always be lower, but it is fair at the moment. The cost efficiencies depend on the licensing and how much data we are bringing in. We have a fairly large footprint, so it is cost-effective."
"Splunk Enterprise Security is expensive but the solution is equipped with a lot of features."
report
Use our free recommendation engine to learn which Application Performance Monitoring (APM) and Observability solutions are best for your needs.
867,021 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
13%
Manufacturing Company
9%
Comms Service Provider
8%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business110
Midsize Enterprise48
Large Enterprise255
 

Questions from the Community

What needs improvement with Honeycomb.io?
We faced some OpenTelemetry metrics lost between the communication from the service and the Honeycomb.io. I can't say if this is a Honeycomb.io issue or if there are some limitations in OpenTelemet...
What is your primary use case for Honeycomb.io?
The solution is mainly used for stack observability. It observes service behavior or any kind of failure that may be happening. The tool is also related to research. My company is working more on t...
What advice do you have for others considering Honeycomb.io?
We set up Honeycomb.io on all the services so that we can have all the set traces of the communication between all the services inside the company. This helps us understand where it could be failin...
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

Grit
No data available
 

Overview

 

Sample Customers

Clover Health, Eaze, Intercom, Fender
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Datadog, Dynatrace, Splunk and others in Application Performance Monitoring (APM) and Observability. Updated: August 2025.
867,021 professionals have used our research since 2012.