We changed our name from IT Central Station: Here's why

Palo Alto Networks Threat Prevention vs Splunk User Behavior Analytics comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Palo Alto Networks Threat Prevention vs. Splunk User Behavior Analytics and other solutions. Updated: January 2022.
563,148 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Everything has been okay with the solution. We are using all of the features.""For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto.""I like the solution's interface.""Edge protection is a valuable feature.""The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention."

More Palo Alto Networks Threat Prevention Pros →

"The product is at the forefront of auto-remediation networking. It's great.""This is a good security product.""The solution appears to be stable, although we haven't used it heavily."

More Splunk User Behavior Analytics Pros →

Cons
"The technology firewall anomaly network could stand improvement.""Palo Alto's maintenance needs to be improved.""The pricing has improved with the newer generation of their Firewalls, but the price could always be lower. In comparison with other solutions, I believe they're quite competitive.""In terms of what needs improvement, the only thing I don't like is the support.""The documentation needs to be improved. I need better information about how to configure it and what the best practices are."

More Palo Alto Networks Threat Prevention Cons →

"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes.""I'm not aware of any lacking features.""The price of Splunk UBA is too high."

More Splunk User Behavior Analytics Cons →

Pricing and Cost Advice
  • "The pricing has improved with the newer generation of their Firewalls, but the price could always be lower."
  • "The pricing could be lower."
  • More Palo Alto Networks Threat Prevention Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    563,148 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    The resource consumption should be addressed. The technology firewall anomaly network could stand improvement. The pricing could be better.
    Top Answer: 
    The solution appears to be stable, although we haven't used it heavily.
    Top Answer: 
    We simply use the free demo version of the product. We do not pay any licensing fees at this time.
    Ranking
    Views
    5,932
    Comparisons
    5,106
    Reviews
    4
    Average Words per Review
    269
    Rating
    8.8
    Views
    7,974
    Comparisons
    5,634
    Reviews
    3
    Average Words per Review
    389
    Rating
    8.7
    Comparisons
    Also Known As
    Caspida, Splunk UBA
    Learn More
    Overview

    Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

    Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics – for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
    Offer
    Learn more about Palo Alto Networks Threat Prevention
    Learn more about Splunk User Behavior Analytics
    Sample Customers
    University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
    8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
    Top Industries
    REVIEWERS
    Financial Services Firm33%
    Comms Service Provider33%
    Aerospace/Defense Firm11%
    Healthcare Company11%
    VISITORS READING REVIEWS
    Computer Software Company24%
    Comms Service Provider22%
    Government6%
    Financial Services Firm6%
    REVIEWERS
    Financial Services Firm50%
    Insurance Company13%
    Government13%
    Security Firm13%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider21%
    Government8%
    Financial Services Firm7%
    Company Size
    REVIEWERS
    Small Business29%
    Midsize Enterprise29%
    Large Enterprise43%
    REVIEWERS
    Small Business25%
    Midsize Enterprise33%
    Large Enterprise42%
    Find out what your peers are saying about Palo Alto Networks Threat Prevention vs. Splunk User Behavior Analytics and other solutions. Updated: January 2022.
    563,148 professionals have used our research since 2012.

    Palo Alto Networks Threat Prevention is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 5 reviews while Splunk User Behavior Analytics is ranked 11th in Intrusion Detection and Prevention Software (IDPS) with 3 reviews. Palo Alto Networks Threat Prevention is rated 8.8, while Splunk User Behavior Analytics is rated 8.6. The top reviewer of Palo Alto Networks Threat Prevention writes "Easy to configure and easy to operate with great stability". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Stable, with good automation capabilities, however, we want to be able to automate even more". Palo Alto Networks Threat Prevention is most compared with Darktrace, Cisco Stealthwatch, Forcepoint Next Generation Firewall, Check Point IPS and Cisco NGIPS, whereas Splunk User Behavior Analytics is most compared with Darktrace, Cisco Stealthwatch, ELK Elasticsearch, Exabeam Fusion SIEM and Securonix Security Analytics. See our Palo Alto Networks Threat Prevention vs. Splunk User Behavior Analytics report.

    See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

    We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.