

Splunk User Behavior Analytics and Palo Alto Networks Advanced Threat Prevention are key players in the cybersecurity landscape. Splunk, with its user-focused insight generation capabilities, seems preferable in environments where understanding user behavior is crucial. However, Palo Alto Networks, with its broad security features, is favored for comprehensive threat prevention.
Features: Splunk specializes in advanced anomaly detection, providing efficient user-based threat identification. It offers powerful indexing and search functionalities and allows extensive customization. Palo Alto Networks features robust network security, including threat intelligence and proactive prevention, enhanced malware protection, and integrated advanced URL filtering for thorough security management.
Room for Improvement: Splunk could enhance its network security features, expand its threat intelligence database, and offer more integrations with other security tools. Palo Alto Networks could simplify its user interface, reduce setup complexity, and improve pricing transparency to increase its accessibility.
Ease of Deployment and Customer Service: Splunk provides a flexible deployment model that seamlessly integrates with existing infrastructures, accompanied by prompt customer support. Palo Alto Networks, despite a complex setup process, benefits from reliable support, ensuring its systems perform effectively for complex threat management.
Pricing and ROI: Splunk offers competitive pricing and promising ROI, appealing to cost-conscious organizations seeking focused analytics. Although Palo Alto Networks entails a higher initial investment, its extensive security capabilities justify the cost, offering long-term value with comprehensive threat protection.
It offers insights into security threats, despite the inability to quantify its impact in numbers.
The solution can save costs by improving incident resolution times and reducing security incident costs.
I rate technical support from Palo Alto as eight out of ten.
I have proof of this rating - when I escalate a case, I receive a reply from TAC support after two days.
Overall, I find the technical support from Palo Alto Networks quite good, although getting a hold of the TAC can be challenging and sometimes requires long phone calls.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
Palo Alto Networks Advanced Threat Prevention is scalable and works well wherever enforcement points exist.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
Proper sizing of the firewall models ensures that the system does not experience crippling performance issues.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
Palo Alto needs to focus on how to bring that technology to end users and how easy it is to use, especially in a hybrid environment where users work from various locations.
The behavioral detection capabilities could be expanded to address all threats at the perimeter, reducing the reliance on endpoint detection and response systems.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate firewalls.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
As traditional signature-based mechanisms become less effective due to the evolving nature of attacks, this solution's focus on behavioral analysis is crucial.
We are satisfied with the analytic capabilities of Palo Alto Networks Advanced Threat Prevention, especially the reporting features available in the Palo Alto portal in terms of their application visibility interface, which is very good for us to get visibility on all critical applications and the associated users, as well as the risks associated with every category of traffic.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
| Product | Mindshare (%) |
|---|---|
| Palo Alto Networks Advanced Threat Prevention | 4.8% |
| Splunk User Behavior Analytics | 2.9% |
| Other | 92.3% |

| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
Palo Alto Networks Advanced Threat Prevention provides comprehensive security with application control, real-time threat detection, and seamless integration with cloud services. Known for its high performance and ease of use, it addresses diverse security challenges for modern organizations.
Palo Alto Networks Advanced Threat Prevention integrates machine learning, behavioral analysis, anti-malware protection, and WildFire sandboxing to deliver proactive defense against threats. Its features include advanced firewall capabilities, comprehensive bandwidth management, and robust reporting. Integration with cloud-based URL filtering enhances organizational security efforts. While the tool offers significant protection, areas like pricing, ease of use, false positive management, and documentation clarity require improvement. Expanding AI capabilities and optimizing support will enhance threat prevention and user experience.
What are the most important features?Palo Alto Networks Advanced Threat Prevention is implemented across industries for server protection and LAN/WAN traffic security, providing solutions for network testing and application control. Organizations benefit from features like GlobalProtect VPN, anti-spyware, and vulnerability protections, ensuring security through efficient deployment both on-premises and in the cloud.
Splunk User Behavior Analytics focuses on data aggregation and threat detection with automation, deepening insights into user behavior. It offers usability, stability, and strong integration capabilities, making it a preferred choice for organizations needing comprehensive security management.
This platform enhances security management through customizable dashboards and real-time updates. Advanced analytics for anomaly detection and behavioral profiling, coupled with powerful indexing and search capabilities, enable thorough user behavior analysis. Users experience streamlined integration with Active Directory and other monitoring tools. However, improvements are needed in dashboard customization, customer support, and analytics tools to boost user experience. Organizations use Splunk User Behavior Analytics primarily for monitoring and analyzing user behavior, integrating various data sources for effective threat detection while maintaining governance.
What are the key features of Splunk User Behavior Analytics?Splunk User Behavior Analytics is widely implemented across industries for threat detection and insider threat identification. By integrating with tools like Active Directory for monitoring and anomaly detection, organizations benefit from robust security management and effective log analysis. It underpins efforts in security, data indexing, and combining data for comprehensive threat prevention.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.