2019-03-11T07:21:00Z

What is your primary use case for Splunk User Behavior Analytics?

Miriam Tover - PeerSpot reviewer
  • 0
  • 29
PeerSpot user
15

15 Answers

BD
Consultant
Top 20
2023-05-05T14:10:47Z
May 5, 2023

We introduced this solution to our customers and requested some dashboards, analytics, statistics, and information to be available through Splunk. However, I'm not proficient in the details and queries. We work at the airport and operate at various levels of management to ensure the quality of products and applications. We monitor the transportation of suitcases, the number of errors in applications, the number of incorrect log-ins, the number of users, and other statistics. System management, includes monitoring system behavior, memory size, memory usage, schedules, and analyzing what happened. It also involves network monitoring for messages that impact systems and specific applications, including downtime and performance issues. The level of involvement and responsibility varies based on an individual's role within the company.

Search for a product comparison
Sharath Chander - PeerSpot reviewer
Real User
Top 10Leaderboard
2023-03-10T17:20:25Z
Mar 10, 2023

We have an application running for our e-commerce site, and we use Splunk primarily to detect anomalous behavior like false orders and other bot-related threats. Splunk helps us analyze and eliminate threats using machine learning.

CO
MSP
Top 20
2022-08-09T17:22:00Z
Aug 9, 2022

Four technicians in our company work within the active directory to look for compartmental behaviors associated with users and conduct analytics like clustering, grouping, and searching.

GH
Real User
2021-10-28T15:52:59Z
Oct 28, 2021

We do technical training and so we do training on the platform. We deploy it on our lab machines for students.

WL
Real User
2020-11-04T15:46:15Z
Nov 4, 2020

We are a cybersecurity vendor and Splunk is the main product that we work with. We are predominantly a Splunk shop. We sell security solutions, so our primary use case for Splunk UBA is security.

CC
Real User
2020-09-21T06:33:00Z
Sep 21, 2020

We use the solution to feed telemetry data from the network into the collective for display-only. We haven't yet come to a point where we have decided on the process of the status for subsequent operational automation.

Learn what your peers think about Splunk User Behavior Analytics. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
MH
Real User
2019-08-19T05:47:00Z
Aug 19, 2019

Splunk has features that no other solutions have. We work in organizations that have a big volume of data. Our primary use case of this solution is for indexing. The best solution that we found that could fit our needs was Splunk.

AT
Real User
2019-08-19T05:47:00Z
Aug 19, 2019

We primarily use this solution for security.

AK
Real User
2019-08-18T07:52:00Z
Aug 18, 2019

Our main use of this solution is threat intelligence and we are very satisfied with it, as it is exactly what we need in our situation.

NS
Real User
2019-08-18T07:52:00Z
Aug 18, 2019

Our primary use is intrusion detection and analysis. It is a great product because it is intelligent and does everything for us.

AE
Real User
2019-08-13T10:41:00Z
Aug 13, 2019

The solution has two main uses. The primary use is for log management and storage. The secondary use is related to solution log coordination and selection.

MA
Real User
2019-05-09T00:25:00Z
May 9, 2019

The primary use case for this solution is to collect data from multiple different sources to be able to use it to proactively prevent damages.

FH
Real User
2019-03-11T07:21:00Z
Mar 11, 2019

Threat hunting is our primary use case.

MF
Consultant
2019-03-11T07:21:00Z
Mar 11, 2019

We are performing a couple of integrations with other products. We are using the latest version that is available.

KR
Real User
2019-03-11T07:21:00Z
Mar 11, 2019

We use this product to support our operations.

Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics – for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms,...
Download Splunk User Behavior Analytics ReportRead more