We performed a comparison between ExtraHop Reveal(x) 360 and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is scalable."
"It stands out for its intuitive and efficient user interface, robust detection capabilities with minimal false positives, and the ability to handle encrypted traffic, making it a valuable asset for network security and management."
"It is very easy to collect and handle data in ExtraHop Reveal(X) Cloud. Integration with Big Data is also easy. Many of our customers integrate it with Big Data platforms like Splunk or Elastic. It is also easy to handle and easy to understand."
"This is a good security product."
"The solution is definitely scalable."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The product is at the forefront of auto-remediation networking. It's great."
"It is a solution that helps test and measure customer satisfaction."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"They can include integration with SAP. Currently, no vendor provides network performance monitoring in the SAP market. It is a very big market. We have around 400 customers for SAP in Korea. In the USA, there are more than 10,000 customers."
"There needs to be more support."
"A drawback includes bucket storage limitations for payload data, necessitating timely extraction for thorough investigations."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
"We'd like the ability to do custom searches."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"I'm not aware of any lacking features."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"The correlation engine should have persistent and definable rules."
More Splunk User Behavior Analytics Pricing and Cost Advice →
ExtraHop Reveal(x) 360 is ranked 22nd in Intrusion Detection and Prevention Software (IDPS) with 3 reviews while Splunk User Behavior Analytics is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 17 reviews. ExtraHop Reveal(x) 360 is rated 8.6, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of ExtraHop Reveal(x) 360 writes "A competitive choice for network detection and response with exceptional user interface, ease of implementation and minimal false positives". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". ExtraHop Reveal(x) 360 is most compared with ExtraHop Reveal(x), Corelight, Forescout Platform and Fortinet FortiGate IPS, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Cynet. See our ExtraHop Reveal(x) 360 vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.