KerioControl vs Splunk User Behavior Analytics comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between KerioControl and Splunk User Behavior Analytics based on real PeerSpot user reviews.

Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed KerioControl vs. Splunk User Behavior Analytics Report (Updated: March 2024).
763,955 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"When one of the employees of my customers is using the VPN Client, I have created for them that they will always get a message. When the VPN Client connects to Kerio Control from the outside, they will get an email so they know when they are connected and when they are disconnected what is happening to their network.""It has helped our organization with testing.""I am impressed with the tool's firewall filtering capacity.""The product is affordable.""The flexibility of the system, the capacity to provide the right level of security, and the ability to be integrated into different kinds of infrastructures are the most valuable features.""The product is easy to use.""The installation is straightforward.""It is very comprehensive and simple. It has all the active protections. It's updated. We love that you can set how often it is updated so you can work what is right for you. A large company with a lot of bandwidth can update the virus definitions and security definitions hourly, if they want. A smaller site that's remote, where maybe updating the definitions will eat into the bandwidth, we can schedule those more to go later at night. It's very flexible and works for us in all types of situations. This is great because then we don't have to learn seven different products to be able to work with seven different scenarios."

More KerioControl Pros →

"Splunk is more user-friendly than some competing solutions we tried.""We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential.""The solution appears to be stable, although we haven't used it heavily.""This is a good security product.""The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk.""It's easily scalable.""The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus.""The most valuable feature is the ability to search through a large amount of data."

More Splunk User Behavior Analytics Pros →

Cons
"If you have to dive deeper into the firewall or any other features, then you really have to read up a bit about how to set it up properly. Some of my colleagues, in the beginning, jumped in and made a bunch of rules but then it got really messy. If Kerio had a template or guidelines for best practices, at the beginning, that would really help. With Kerio Control it's basically 'find out for yourself.'""I can no longer renew my subscription directly with GFI but we have to go through third-party resellers like CDW. The first time I did it with CDW. I went to CDW and it was almost like they didn't even know anything. They didn't know what package I was supposed to get. Then after I got it, it took almost five days to get everything working.""I would like for them to add more security features.""The solution should offer more dashboards.""The upgrades make the network slower.""The improvement that we are looking for is for when decide to move some part of our application to the cloud.""We'd like to have more integrations Kerio Operator.""After the takeover by GFI, one of the things that Kerio built was MyKerio environment. This has not been very reliable because I get many messages that MyKerio is not functioning. For some reason, there are things that they changed and it is not very reliable at this moment, instead I have to connect to the firewall to see what is happening."

More KerioControl Cons →

"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes.""I would like improved downward integration with other tools such as McAfee and other GCP solutions.""The price of Splunk UBA is too high.""There are occasional bugs.""We'd like the ability to do custom searches.""The initial setup was complex because some of the configurations that we required needed customization.""The correlation engine should have persistent and definable rules.""We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."

More Splunk User Behavior Analytics Cons →

Pricing and Cost Advice
  • "Search and compare."
  • "Pricing is good, but the licensing took a lot of time."
  • "The price is inexpensive."
  • "It's very affordable."
  • "The pricing is in-line with our expectations in terms of the quality that we get for it."
  • "There is a yearly upkeep fee."
  • "My advice is to use your own hardware, and do not use theirs."
  • "It is a good fit for SMBs because of its maintainability. When you want to keep your costs low, then Kerio Control is a very good solution. It's not an expensive product that is well integrated. It has a complete set of features within it that make it a very strong product."
  • More KerioControl Pricing and Cost Advice →

  • "I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
  • "My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
  • "There are additional costs associated with the integrator."
  • "The licensing costs is around 10,000 dollars."
  • "Pricing varies based on the packages you choose and the volume of your usage."
  • "I am not aware of the price, but it is expensive."
  • More Splunk User Behavior Analytics Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    763,955 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The solution provides feasibility regarding cyber privacy.
    Top Answer:The pricing is reasonable. We have to pay approximately EUR 175 for the product.
    Top Answer:The pricing of the product can be improved. The trial duration of the product should also be extended.
    Top Answer:We are really pleased with Splunk and its features. It would be practically impossible to function without it To provide a general overview of the system, it's important to note that the standard… more »
    Top Answer:I am not aware of the price, but it is expensive. A rough estimate would be around 150 gigabytes, given the huge amount of data. At the moment there are no additional costs for maintenance.
    Top Answer:Currently, we do not have any specific improvement projects in progress. However, we have partnered with some companies that are constantly working on improving the system. Therefore, I believe it's… more »
    Ranking
    Views
    922
    Comparisons
    624
    Reviews
    7
    Average Words per Review
    276
    Rating
    7.7
    Views
    2,029
    Comparisons
    1,307
    Reviews
    5
    Average Words per Review
    374
    Rating
    8.6
    Comparisons
    Also Known As
    Caspida, Splunk UBA
    Learn More
    Splunk
    Video Not Available
    Overview

    Kerio Control is a popular security product for small and medium-sized businesses. It is a next-generation firewall that provides unified threat management without complexity. Kerio Control provides advanced anti-virus protection and industry-leading web and content application filtering, and has a secure VPN.

    With Kerio Control you can:

    • Preserve the integrity of your network.
    • Manage bandwidth to streamline traffic flows.
    • Improve productivity with filtering capabilities.

    Kerio Control Features

    Some of Kerio Control’s most valuable features include:

    High availability, deployment flexibility, deep packet inspection, advanced routing, usage reporting, quick administering, intrusion detection and prevention (IPS), gateway anti-virus, VPN, web and content application filtering, and centralized administration with MyKerio.

    Kerio Control Benefits

    • Eliminate downtime risks: Because Kerio Control offers high availability and failover protection, you can eliminate the risk and cost of connectivity or threat protection downtime.

    • Detailed reports: Kerio Control makes it easy to view individual users’ internet activity through detailed reports.

    • Traffic monitoring: Traffic monitoring allows you to manage bandwidth and makes it possible for you to control access to streaming video and peer-to-peer networks.

    • Server protection: Using Kerio Control’s advanced networking routing and deep packet inspection, you can protect servers.

    • Easily create policies: With Kerio Control, you can create both inbound and outbound traffic policies, and can also restrict communication by specific URLs, applications, traffic type, content category, or even time of day.

    • Snort-based analysis: Kerio Control gives you the ability to add a transparent layer of intrusion prevention with snort-based analysis along with a database of rule and blacklisted IP addresses that is regularly refreshed.

    • Optionally integrated anti-virus: WIth this feature, you can prevent viruses, Trojans, or spyware from entering your networks.

    Reviews from Real Users

    Here is some feedback from some of our users who are currently using the solution:

    PeerSpot user Brian C., Senior Technology Specialist, VP at Unified Technology Solutions, writes "It is very comprehensive and simple. It has all the active protections. It's updated. We love that you can set how often it is updated so you can work on what is right for you. A large company with a lot of bandwidth can update the virus definitions and security definitions hourly, if they want. A smaller site that's remote, where maybe updating the definitions will eat into the bandwidth, we can schedule those more to go later at night. It's very flexible and works for us in all types of situations. This is great because then we don't have to learn seven different products to be able to work with seven different scenarios."

    Andy D., IT Manager at Flare Technologies, praises how easy it is to use and says, "One thing we use quite a lot, as well, is the DHCP Server, because we do a lot of work where all our devices need to have static IP addresses. Rather than going around and configuring every box, we do it all through DHCP reservations. It's easier. We've got a record of it. We can manipulate it if we need to change something or change some hardware. It's all easy. Even guys who are not used to using it can pick it up quite quickly."



    Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics – for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
    Sample Customers
    Triton Technical, McDonald's
    8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
    Top Industries
    REVIEWERS
    Computer Software Company15%
    Financial Services Firm12%
    Manufacturing Company12%
    Comms Service Provider12%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Comms Service Provider13%
    Media Company7%
    Financial Services Firm7%
    REVIEWERS
    Financial Services Firm44%
    Insurance Company11%
    Government11%
    Security Firm11%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company14%
    Government10%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business79%
    Midsize Enterprise17%
    Large Enterprise4%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise16%
    Large Enterprise46%
    REVIEWERS
    Small Business31%
    Midsize Enterprise31%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise11%
    Large Enterprise69%
    Buyer's Guide
    KerioControl vs. Splunk User Behavior Analytics
    March 2024
    Find out what your peers are saying about KerioControl vs. Splunk User Behavior Analytics and other solutions. Updated: March 2024.
    763,955 professionals have used our research since 2012.

    KerioControl is ranked 16th in Intrusion Detection and Prevention Software (IDPS) with 9 reviews while Splunk User Behavior Analytics is ranked 11th in Intrusion Detection and Prevention Software (IDPS) with 5 reviews. KerioControl is rated 8.0, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of KerioControl writes "Has good accounting and live monitoring features". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Quick response time and can store an enormous amount of data". KerioControl is most compared with Netgate pfSense, Fortinet FortiGate, OPNsense, Sophos XG and Check Point NGFW, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Palo Alto Networks Advanced Threat Prevention. See our KerioControl vs. Splunk User Behavior Analytics report.

    See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

    We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.