Try our new research platform with insights from 80,000+ expert users

Splunk User Behavior Analytics vs Trellix Intrusion Prevention System comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Splunk User Behavior Analytics
Ranking in Intrusion Detection and Prevention Software (IDPS)
11th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
23
Ranking in other categories
User Entity Behavior Analytics (UEBA) (4th)
Trellix Intrusion Preventio...
Ranking in Intrusion Detection and Prevention Software (IDPS)
13th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Splunk User Behavior Analytics is 2.0%, down from 2.8% compared to the previous year. The mindshare of Trellix Intrusion Prevention System is 3.5%, up from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Subhayu Chakraborty - PeerSpot reviewer
Automatic reports streamline tasks and offers easy report gathering
The dashboard part could be improved. While using it, I noticed two options: Classic, which is adequate yet only in black and white, and another one that is more advanced or smart, though I forgot the exact term. I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
Juan Muriel - PeerSpot reviewer
Protects from attacks in real-time and provides accurate threat intelligence updates
I rate the ease of setup a seven or eight out of ten. The platform functions very well. We need technical support to make improvements to the platform. The deployment takes eight months. We need two or three system engineers and one electronic engineer specialized in Trellix platforms to deploy the tool. We need only one system engineer to maintain the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"The most effective one is the integration with other vendors."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"This is a good security product."
"Splunk User Behavior Analytics is a one hundred percent stable solution."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"It's easily scalable."
"It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware."
"The ability to centrally manage all the IPS sensors, track the different security events generated by it, and customize the different policies, depending on their location."
"The most valuable features of the solution stem from the fact that it is a good product for dealing with DDoS attacks and for the inspection of network traffic."
"The solution can scale."
"The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS."
"There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks."
"The product is worth the investment."
"The threat intelligence updates are very accurate."
 

Cons

"In the future I would like to see simplified statistics and analytical threats."
"I'm not aware of any lacking features."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"It would be good if the solution had an analytics tool that allowed us to analyze the data without writing specific queries."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"The correlation engine should have persistent and definable rules."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"The platform’s GUI could be the latest."
"The technical support has room for improvement."
"The area of concern where the tool needs improvement is how the product prompts users at a network level that helps prevent any wireless network attacks through alerts and notifications."
"The management component could be simplified."
"The technical support must be improved."
"The Network Security Managers could be more stable, agile, and work faster. When it comes to instability, there is room for improvement."
"The management console needs to be less complex and easier to navigate."
"The pricing could be improved."
 

Pricing and Cost Advice

"Pricing varies based on the packages you choose and the volume of your usage."
"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"I am not aware of the price, but it is expensive."
"There are additional costs associated with the integrator."
"The licensing costs is around 10,000 dollars."
"I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
"I rate the product’s pricing an eight out of ten."
"The tool is competitively priced."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
13%
Government
9%
Manufacturing Company
8%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Splunk User Behavior Analytics?
The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors.
What is your experience regarding pricing and costs for Splunk User Behavior Analytics?
The pricing is based on the amount of data processed, and it is considered a high-level investment for enterprises. Costs can be cut through efficient use and implementation.
What needs improvement with Splunk User Behavior Analytics?
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed. Complex dashboards may require additional scripting. Some integ...
What do you like most about McAfee Network Security Platform?
The threat intelligence updates are very accurate.
What is your experience regarding pricing and costs for McAfee Network Security Platform?
The tool is competitively priced. I rate the pricing a six out of ten.
What needs improvement with McAfee Network Security Platform?
Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must provide better help with configurations of devices and enabling NTBA.
 

Also Known As

Caspida, Splunk UBA
McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
 

Overview

 

Sample Customers

8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Find out what your peers are saying about Splunk User Behavior Analytics vs. Trellix Intrusion Prevention System and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.