Try our new research platform with insights from 80,000+ expert users

OpenText Real User Monitoring vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

OpenText Real User Monitoring
Average Rating
6.6
Reviews Sentiment
6.4
Number of Reviews
11
Ranking in other categories
Application Performance Monitoring (APM) and Observability (44th)
Splunk Enterprise Security
Average Rating
8.4
Reviews Sentiment
7.6
Number of Reviews
315
Ranking in other categories
Log Management (2nd), Security Information and Event Management (SIEM) (1st), IT Operations Analytics (1st)
 

Mindshare comparison

While both are Application Lifecycle Management solutions, they serve different purposes. OpenText Real User Monitoring is designed for Application Performance Monitoring (APM) and Observability and holds a mindshare of 0.2%, down 0.2% compared to last year.
Splunk Enterprise Security, on the other hand, focuses on Security Information and Event Management (SIEM), holds 9.4% mindshare, down 12.1% since last year.
Application Performance Monitoring (APM) and Observability
Security Information and Event Management (SIEM)
 

Featured Reviews

Aphiwat Leetavorn. - PeerSpot reviewer
Offers back-end monitoring, so it can analyze user experience but when customers change the software or version, this tool is quite sensitive
Real User Monitoring tools help proactively identify problems before they become critical by monitoring thresholds. There is a threshold and an SOA threshold. For example, it starts to go yellow, and if it becomes red, the system will crash. When it starts to become yellow (Threshold Approaching), we have to resolve it. This is the same case where we'll know what happened before it's too late. So we can make an early decision to prevent it, maybe by kicking some users off the system before it crashes.
ROBERT-CHRISTIAN - PeerSpot reviewer
Has many predefined correlation rules and is brilliant for investigation and log analysis
It is very complicated to write your own correlation rules without the help of Splunk support. What Splunk could do better is to create an API to the standard SIEM tools, such as Microsoft Sentinel. The idea would be to make it less painful. In ELK Stack, Kibana is the query language with which you can search log files. I believe Splunk has also a query language in which they search their log files, but once you have identified the log file that you want to use for further security correlation, you want to very quickly transport that into your SIEM tool, such as Microsoft Sentinel. That is something that Splunk could make a little bit less painful because it is a lot of effort to find that log file and forward it. An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most useful feature of this solution is tracking. When the application's traffic has been monitored it is taken from that particular application and analyzed. It is then given a live session of that particular user. For example, if you are using your bank application to do some kind of transaction, everything that you do can be tracked by that application."
"It offers near-real-time analytics, which is helpful."
"The most valuable feature is application performance monitoring."
"With the solution, you can easily access any issues in your infrastructure."
"The reporting feature is good for us."
"It is a good product."
"The Real User Monitor, with its transaction and synthetic transaction monitoring, is the typical classic in APM cases when the customer would like to do transaction monitoring. Micro Focus scores better where the underlying infrastructure management is also covered by Micro Focus tools."
"Real User Monitoring tools help proactively identify problems before they become critical by monitoring thresholds. There is a threshold and an SOA threshold."
"I have also been able to take advantage of some of the more complex statistical capabilities when analyzing logs."
"The most useful feature for me is the ability to create different kinds of alerts and set a different kind of denominator that will capture the real event. That is helpful for a power user like me."
"It is easy to use in any environment."
"We are much faster finding and addressing issues with Splunk."
"The most valuable aspect of the solution is the dashboard. It's very intuitive."
"Its alerting is most valuable. We have alerts set up in our environment for certain attacks, such as an SQL injection attempt. We have a front-facing server for the website. It is out there, and anybody can access it. When those SQL injection attempts come in, we are able to detect that with the alert."
"It's extremely scalable. It's a very robust solution and certainly has the capability of handling far bigger data requirements than a lot of the other tools. Generally what ends up happening with me is that my clients tend, for the most part, to be mid-tier organizations where the cost of that solutions would be accompanying requirements for people just becomes way too prohibitive. Especially considering the model that they use for costing, which is based on the volume of data. Of course, they're going to put everything including the Coke machine as the ability to collect data off of it, because of course the more they can put through the tool the more money they make."
"The feature that we use the most is the correlation search engine within ES."
 

Cons

"Some issues with login errors."
"One area to improve is the user interface, of course. The second one is their R&D has virtually stopped building a product roadmap."
"When we want to monitor our encrypted traffic, this product doesn't work because our cipher is not supported."
"Customer support needs to improve by bringing in more people who are knowledgeable about the tool, as there are very few left."
"The solution's technical support presents a lot of issues with too many delays."
"The product needs more R&D to make it easier and more compatible with other software."
"The diagnostics perspective, particularly in terms of the root cause analysis of failures, should be improved."
"We would like to see support for non-Windows environments."
"The GUI could be improved to include some of the capabilities that other BI solutions have. The layout is a little restrictive where you can’t resize all the panels to exactly how you would like them without tweaking some XML code."
"We'd like to see a more seamless cloud-based integration."
"The prices are complicated as we operate in a small third-world country."
"It currently has limited default rules and customizations. If they can concentrate more on the compliance part and the security information part, it would be helpful. The platform part is good, but it requires many features from the security aspect."
"In terms of the interface, it could include some improvements for the look and feel."
"Being a SIEM solution with a centralized dashboard, we would like to have more options to customize it."
"Over time I will have more requirements and I can foresee the solution could improve the search algorithm to run and output the data faster."
"The training was mostly sales-focused, like how to monitor your sales. It was hard to then come back from doing the training and try to switch it to a cybersecurity focus because all the training we did was sales oriented. The basic training didn't really touch on any kind of cybersecurity use cases or anything like that. That would have been great to see in the training."
 

Pricing and Cost Advice

"The price is approximately €30,000 ($35,500 USD) for the enterprise edition."
"Compared to other tools, OpenText Real User Monitoring is an expensive solution."
"Not expensive."
"If I compare with other vendors, other vendors are more expensive"
"From what I have seen so far, Splunk has multiple cost models. The one that we are using is pretty good when it comes to ingesting data into the environment. It has worked out pretty well."
"Splunk's cost is very high. They need to review the pricing. They have to go back and totally readdress the market."
"The solution is costly."
"Pricing is pretty fair."
"The pricing model is based on the number of gigabytes that you ingest into the Splunk system. So it can be an expensive solution."
"We have had a reduction in the time it takes to resolve issues and correlate what has failed."
"You will eat up whatever you purchase quickly. The level of insights that Splunk empowers is addictive."
"The pricing is very complicated, and it is very pricey. You do require a lot of different licenses in order to get a comprehensive solution that is not just the SIEM solution."
report
Use our free recommendation engine to learn which Application Performance Monitoring (APM) and Observability solutions are best for your needs.
860,711 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Financial Services Firm
26%
Manufacturing Company
9%
Government
8%
Energy/Utilities Company
7%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with Micro Focus Real User Monitor?
The diagnostics perspective, particularly in terms of the root cause analysis of failures, should be improved. There needs to be more development in this area, as the support and the number of peop...
What is your primary use case for Micro Focus Real User Monitor?
The use case is about user-level monitoring and the availability of a service for a user. It's about whether the service is available, its performance, and the type of errors a user is receiving, f...
What advice do you have for others considering Micro Focus Real User Monitor?
I rate the solution as nine. It is a good product. Everyone should have it as it is essential today, but choose the vendor accordingly. I'd rate the solution nine out of ten.
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Also Known As

Micro Focus Real User Monitor, Micro Focus RUM, HPE RUM
No data available
 

Overview

 

Sample Customers

Avea, Maccabi Healthcare Services, TEB
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about OpenText Real User Monitoring vs. Splunk Enterprise Security and other solutions. Updated: May 2023.
860,711 professionals have used our research since 2012.