We performed a comparison between Splunk User Behavior Analytics and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's easily scalable."
"The most valuable feature is the ability to search through a large amount of data."
"The most valuable features are the indexing and powerful search features."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The solution is fast, flexible, and easy to use."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"The most valuable features are the protection and that it is fast."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"The product is very easy to install."
"The tool's stability and performance are good."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"The product's initial setup phase was not difficult."
"It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
"The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"I'm not aware of any lacking features."
"We'd like the ability to do custom searches."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"In the future I would like to see simplified statistics and analytical threats."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"This solution could be improved with faster technical support and cheaper licensing prices."
"The solution should support multiple platforms in Windows, Linux, and Mac. Customers can have different software types. The virtual environment should be able to install and analyze them. The tool also gives only a minimum level of extension support. It may not be able to extract files and give details about them. I would also like to see third-party product integration in the tool. The solution's current integration is only with Trend Micro products only."
"The solution needs improvement in terms of pricing."
"The product's security features need enhancement."
"The product's scalability feature needs to be improved, as it is an area in the product with certain shortcomings."
"Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
"The solution could be more secure."
"The solution could be more stable and offer more security."
More Splunk User Behavior Analytics Pricing and Cost Advice →
Splunk User Behavior Analytics is ranked 13th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews while Trend Micro Deep Discovery is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews. Splunk User Behavior Analytics is rated 8.2, while Trend Micro Deep Discovery is rated 8.2. The top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Cynet and Exabeam Fusion SIEM, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention. See our Splunk User Behavior Analytics vs. Trend Micro Deep Discovery report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.