We performed a comparison between KerioControl and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The firewall appliance itself is the most valuable feature."
"Setup is simple. The Kerio interface is very intuitive."
"The stability of Kerio Control is good."
"It has helped our organization with testing."
"The most valuable features of Kerio Control are the IPS and traffic rules. The traffic rules are very user-friendly and the IPS is working well. Additionally, the anti-virus is effective with quick options, such as filtering."
"The routing of the multiple internet physical routers I have is the most valuable feature of this solution. Instead of me physically unplugging a cable from one router to the server, if one connection goes down, it automatically switches for me. So I can have all three of them plugged in. If one goes down, it just picks up the other one automatically. There's no physical cable swapping."
"The most valuable features of KerioControl are ease of configuration, user-friendliness, and comfortable to use. It is an all-in-one solution, it comes with many features, such as a firewall, antivirus software, and network protection."
"Kerio has improved my organization's security."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"This is a good security product."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The most valuable feature is the ability to search through a large amount of data."
"The solution is fast, flexible, and easy to use."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"I would like it if the interface section had multiple failovers. Although I do have three connections, just in case our physical cables get disconnected, I can only set up one failover as a backup. So, if for some reason our fiber and our AFM went down together, I would have to have it search for our 4G modem. I'd love to have extra backups running."
"The improvement that we are looking for is for when decide to move some part of our application to the cloud."
"I have had a few issues with HTTPS decryption. The solution also does not show the actual user's Internet usage."
"We'd like to have more integrations Kerio Operator."
"My experience with the solutions technical support is fine but they could be faster in responding."
"There were certain things I didn't know about it, but I've always been able to just contact our IT company. They've been able to walk me through certain things. It was quite a monumental task to set up a public site. Support really had to help me with setting up the VLANs and walk me through it. It was not possible for me to figure that out on my own, but that's what they're here for. That could have been a little bit easier laid out."
"The denial of service could also be improved. There recently was a big issue with denial of service attacks and it was a bit laborious."
"There's also room for improvement in the Traffic Rules. We define networks to use a specific outgoing interface, say VSAT, shore, or marine WiFi, which is okay. But then all we have is a checkbox that says "Use other internet interfaces if this one is unavailable." What we would prefer would be to have a priority list. So if VSAT is unavailable, try to use 4G, etc. We haven't really found a reliable way of doing that in the current release."
"It would be good if the solution had an analytics tool that allowed us to analyze the data without writing specific queries."
"I'm not aware of any lacking features."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The correlation engine should have persistent and definable rules."
"In the future I would like to see simplified statistics and analytical threats."
"We'd like the ability to do custom searches."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
More Splunk User Behavior Analytics Pricing and Cost Advice →
KerioControl is ranked 18th in Intrusion Detection and Prevention Software (IDPS) with 54 reviews while Splunk User Behavior Analytics is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews. KerioControl is rated 8.0, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of KerioControl writes "With VPN, any of our guys can log in to the system and effectively be on board; helps with our customers all over the world". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". KerioControl is most compared with Netgate pfSense, Fortinet FortiGate, OPNsense, Sophos UTM and Palo Alto Networks VM-Series, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Cynet and Palo Alto Networks Advanced Threat Prevention. See our KerioControl vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.