We performed a comparison between Loom Systems and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in IT Infrastructure Monitoring."You can develop your own apps within Loom, and they can be configured very simply."
"What I like best about Loom Systems is that you can use it for infrastructure monitoring. I also like that it's a flexible solution."
"The RFS portion of the solution is the product's most valuable feature."
"The solution is absolutely scalable. If an organization needs to expand it out they definitely can."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"It's easily scalable."
"The most valuable features are the indexing and powerful search features."
"The solution appears to be stable, although we haven't used it heavily."
"This is a good security product."
"The product is at the forefront of auto-remediation networking. It's great."
"The solution is definitely scalable."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"What's lacking in Loom Systems is the level of priority for each incident. For example, after implementation and there was a huge impact on the client, and the client comes back to you and says that there's an incident, that there needs to be an immediate resolution for it, you'll see severity one, severity two, etc., in Loom Systems, rather than priority levels. It would be better if the incidents can be defined as low priority, medium priority, or high priority."
"The discovery and mapping still takes a lot of human intervention, it's quite resource heavy,"
"The reporting is a bit weak. They should work to improve this aspect of the product."
"The change management within the solution needs to be improved. There needs to be more process automation."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"There are occasional bugs."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"The price of Splunk UBA is too high."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"The initial setup was complex because some of the configurations that we required needed customization."
More Splunk User Behavior Analytics Pricing and Cost Advice →
Loom Systems is ranked 56th in IT Infrastructure Monitoring with 4 reviews while Splunk User Behavior Analytics is ranked 2nd in User Entity Behavior Analytics (UEBA) with 17 reviews. Loom Systems is rated 8.0, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of Loom Systems writes "Simple and very effective for developing and configuring apps with great integration capabilities". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Loom Systems is most compared with Elastic Search and Splunk Infrastructure Monitoring, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Cynet.
We monitor all IT Infrastructure Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.