We performed a comparison between IBM Security Network IPS and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is its simplicity."
"The initial setup is simple."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
"The most valuable features are the indexing and powerful search features."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"The solution is definitely scalable."
"This is a good security product."
"In the future, I would like to see a hybrid option so that we can work both on-premises and in the cloud."
"I'd like to see more integration with other tools and technologies."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"The correlation engine should have persistent and definable rules."
"In the future I would like to see simplified statistics and analytical threats."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"We'd like the ability to do custom searches."
"The initial setup was complex because some of the configurations that we required needed customization."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
More Splunk User Behavior Analytics Pricing and Cost Advice →
IBM Security Network IPS is ranked 24th in Intrusion Detection and Prevention Software (IDPS) with 4 reviews while Splunk User Behavior Analytics is ranked 13th in Intrusion Detection and Prevention Software (IDPS) with 17 reviews. IBM Security Network IPS is rated 7.2, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of IBM Security Network IPS writes "User-friendly and has a good blocking feature but is quite expensive". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". IBM Security Network IPS is most compared with Darktrace, Palo Alto Networks Advanced Threat Prevention and Cisco Secure Network Analytics, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Cynet and Varonis Datalert. See our IBM Security Network IPS vs. Splunk User Behavior Analytics report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.