We performed a comparison between IBM Tivoli Composite Application Manager and Splunk Enterprise Security based on real PeerSpot user reviews.
Find out what your peers are saying about Datadog, Dynatrace, New Relic and others in Application Performance Monitoring (APM) and Observability."IBM's main value lies in its integration with its own technologies, which can be seen as a benefit in environments where IBM products are extensively used."
"The solution is very stable. We never had any issues with stability."
"The most valuable features of Splunk Enterprise Security are its high-performance data collection, flexible query language, and its versatility across the organization."
"The flexibility of the search capability is most valuable. You can use it for more than just a basic log aggregator. It is powerful in that regard."
"The ability to ingest different log types from many different products in our environment is most valuable."
"The most valuable features are how stable and easy to use Splunk is."
"It gives us the liberty to do more in terms of use cases."
"I like Splunk's data aggregation and search capabilities."
"There are lots of free learning materials on their website."
"The solution has made us more secure."
"The user interface was not good."
"The installation process is difficult, requiring continuous support and specialist expertise due to our limited knowledge of managing it effectively."
"I'd say I am happy with the technical support, not elated. They provide great support, but sometimes they don't have the answers that I need."
"It will be helpful for customers if they can create some real-world cases, and we can find a case study to align with. I know that Splunk has tremendous potential. We only include a tiny piece of it. There is a lot of stuff that we need to learn. If Splunk can provide more real-time examples, that will be helpful for customers."
"Splunk is query-based, which is not the case with most cybersecurity tools. It is based on search queries and can be difficult to use. It would be good if they can make it easier to understand how to create search queries. They can improve the knowledge base for better understanding. To create your dashboard, you need to have a search query. We have multiple firewalls in our company, and we need a dashboard for them. It would be helpful if a default firewall dashboard is included in Splunk to make monitoring easier. If a dashboard is available for a security device, the operation part will be more efficient. We won't have to follow a manual process for this."
"The CIM model is the method Splunk uses to normalize data and categorize its important parts, but it is quite complex."
"If you monitor too much, you can lose performance on your systems."
"It needs integration with a configuration management solution."
"The difficult part is related to integration with sources of data that are used to create the logs as this depends on the infrastructure of the client."
"A lot of people are averse to using new tools so if they make it even more user-friendly than it already is, I think that could go a long way."
More IBM Tivoli Composite Application Manager Pricing and Cost Advice →
IBM Tivoli Composite Application Manager is ranked 53rd in Application Performance Monitoring (APM) and Observability with 2 reviews while Splunk Enterprise Security is ranked 2nd in Security Information and Event Management (SIEM) with 228 reviews. IBM Tivoli Composite Application Manager is rated 6.6, while Splunk Enterprise Security is rated 8.4. The top reviewer of IBM Tivoli Composite Application Manager writes "Integrates well with IBM technologies, but it's outdated and lacks essential features". On the other hand, the top reviewer of Splunk Enterprise Security writes "It has a drag-and-drop interface, so you don't need to know SQL or Java to construct a query ". IBM Tivoli Composite Application Manager is most compared with Dynatrace, IBM Application Performance Management and Azure Monitor, whereas Splunk Enterprise Security is most compared with Wazuh, Dynatrace, IBM Security QRadar, Microsoft Sentinel and Elastic Security.
We monitor all Application Performance Monitoring (APM) and Observability reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.