We performed a comparison between Darktrace and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is a very simple product to use."
"We liked their approach to identifying intrusions or network anomalies using AI."
"I particularly like Antigena and the analytics around the real-time monitoring of our network. I also like its reporting because it has got a seven-day reporting period within the system. Every time you run the reports, it gives you the data about the previous seven days. I like that because it is in real-time. I enjoy reading those reports and getting a very clear and decisive idea of what's happening on my network on a real-time basis. I like the actual real-time monitoring of spoofing and things like that. I also like the user monitoring as well as the network logging capabilities."
"The AI-based pattern is the most valuable feature."
"The most valuable feature is the alerts. The alerts are meaningful. The event rolls up into meaningful and actionable alerts rather than just being noise."
"The most valuable feature is that it works autonomously."
"The most valuable feature is that it gives us visibility of rogue traffic that is on the network."
"The most valuable feature of this solution is that it does not require human intervention to eliminate a threat."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The solution is fast, flexible, and easy to use."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The product is at the forefront of auto-remediation networking. It's great."
"The most valuable features are the indexing and powerful search features."
"The most valuable feature is the ability to search through a large amount of data."
"I would like for the product to work on the endpoints as well. I would like to see enhanced visibility into the endpoints and network but this solution only sits on the network itself."
"I'd love them to see maybe covering the cloud a bit more."
"I would like to see a feature where the tool ingests information from an anti-malware product that is present at the endpoint."
"A reporting portal could be a great addition to help customize reports."
"The solution would benefit from automation. Currently, you have to know what you are searching for."
"The pricing model is a little too high and could be more flexible."
"There aren't so many third-party vendor platforms natively integrated with the platform."
"I did not use the AI features because they should make it more user-friendly which would be a benefit. Additionally, the solution could integrate with more SIEM or SOAR tools."
"The price of Splunk UBA is too high."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
"The correlation engine should have persistent and definable rules."
"I'm not aware of any lacking features."
"We'd like the ability to do custom searches."
More Splunk User Behavior Analytics Pricing and Cost Advice →
Darktrace is ranked 1st in Intrusion Detection and Prevention Software (IDPS) with 66 reviews while Splunk User Behavior Analytics is ranked 13th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. Darktrace is rated 8.2, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of Darktrace writes "Great autonomous support, offers an easy setup, and has responsive support". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Darktrace is most compared with CrowdStrike Falcon, Vectra AI, SentinelOne Singularity Complete, Cortex XDR by Palo Alto Networks and Claroty Platform, whereas Splunk User Behavior Analytics is most compared with Microsoft Defender for Identity, IBM Security QRadar, Cynet, Exabeam Fusion SIEM and Varonis Datalert. See our Darktrace vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.