Try our new research platform with insights from 80,000+ expert users

Huntress Managed SIEM vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Huntress Managed SIEM
Ranking in Security Information and Event Management (SIEM)
42nd
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Splunk Enterprise Security
Ranking in Security Information and Event Management (SIEM)
1st
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
327
Ranking in other categories
Log Management (2nd), IT Operations Analytics (1st)
 

Featured Reviews

Nick Fletcher - PeerSpot reviewer
Centralized management streamlines log collection while providing valuable resources
We use it for log collection on customers that have compliance requirements The single pane of glass management with the other security products we use from Huntress is incredibly valuable. It allows us to manage multiple Huntress products in a central place, and we don't have ten different…
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The single pane of glass management with the other security products we use from Huntress is incredibly valuable."
"Huntress is a great company and incredibly helpful with deployment."
"Splunk allows us to customize processing and dashboards, which helps us take care of our customers' needs."
"We can ingest and correlate data from virtually any type of system."
"From the class that I took this week, being able to create notable events from whatever you find in the data set is pretty useful."
"The solution has made us more secure."
"My favorite example of improving of organization is saving a $60k/mo in payroll fraud and $10k/mo in wasted API credits by using simple searches and clear reports."
"The ability to quickly search logs, performance data, and other inputs has helped tremendously with troubleshooting."
"The best features I've experienced over the past six years with Splunk Enterprise Security are the ability to create use cases and the flexibility to customize searches and use cases based on our specific requirements."
"The alerts are very effective."
 

Cons

"There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data."
"There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data."
"Better directions on search head clusters."
"The UI can be difficult to understand for non-technical people."
"It's difficult to set up initially, and their billing model is also a bit complicated."
"The solution's automation could be improved."
"It would be great if I could have a certain dialogue box in Splunk that uses innovative AI tools like ChatGPT, which are available now in the tech department."
"It would be good if the solution had some kind of copilot to automate or help write correlation searches."
"Its deployment is difficult. I remember when I first started learning, I faced several challenges, especially when deploying VMware in a virtual environment."
"Given the ever-increasing number of threats, I would like Splunk to update its threat signatures more frequently."
 

Pricing and Cost Advice

Information not available
"Although Splunk is an expensive product, it is designed to be utilized across your organization in order to maximize your ROI and lower your TCO."
"It is expensive. I used to buy it early on, but then they combined it into a higher-up organization. They buy it for multiple systems now. Last time, I paid around 60K for it. There is just the licensing fee. That's all."
"I think the price could be improved."
"I've heard Splunk is often preferred over other options, but the cost can be prohibitive for smaller organizations."
"I believe that Splunk Enterprise Security is worth the price, but it is expensive."
"Pricing and licensing is quite expensive. But for the value the product provides, it seems at par in the market."
"ROI is estimated at saving my team roughly 10 to 12 man hours per week in troubleshooting for our company as well as what our profits had been from our services of installing, configuring, and supporting other clients with the product."
"Most people share the same thought that the ingestion rates can get pretty pricey. There is a lot of work we do to curate the data that we send to Splunk so that it is not too noisy or too expensive."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Insurance Company
27%
Computer Software Company
11%
Educational Organization
9%
Manufacturing Company
6%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Huntress Managed SIEM?
There should be better exclusions of log types and the ability to exclude specific types of logs that might be using a lot of data.
What is your primary use case for Huntress Managed SIEM?
We use it for log collection on customers that have compliance requirements.
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Overview

 

Sample Customers

Information Not Available
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about Splunk, Wazuh, Microsoft and others in Security Information and Event Management (SIEM). Updated: August 2025.
865,384 professionals have used our research since 2012.