Kerio Control vs. Splunk User Behavior Analytics

As of June 2019, Kerio Control is ranked 2nd in Intrusion Detection and Prevention Software with 11 reviews vs Splunk User Behavior Analytics which is ranked 4th in Intrusion Detection and Prevention Software with 5 reviews. The top reviewer of Kerio Control writes "Provides users with the ability to log in to the portal page, keep track of their data usage and perform bandwidth management". The top reviewer of Splunk User Behavior Analytics writes "Enables searching through a lot of data, but pricing is problematic - you can't budget for it". Kerio Control is most compared with pfSense, Fortinet FortiGate and Sophos UTM. Splunk User Behavior Analytics is most compared with Darktrace, Cisco Stealthwatch and Microsoft ATA. See our Kerio Control vs. Splunk User Behavior Analytics report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Kerio Control vs. Splunk User Behavior Analytics and other solutions. Updated: May 2019.
348,558 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
It prevents people from visiting undesirable sites and ensures that they use the internet for their designated jobs.What I like the most about Kerio is that I can use the software appliance as a solution, so if the hardware fails for any reason then I can quickly replace it with hardware that I have in stock.All of the features of Kerio Control are equally good. Most valuable to us are the firewall rules, the intrusion detection system, and IP address features.The most valuable feature is to provide users with the ability to log in to the portal page, keep track of their data usage and perform bandwidth management.The flexibility of the system, the capacity to provide the right level of security, and the ability to be integrated into different kinds of infrastructures are the most valuable features.The statistic feature enables us to better use bandwidth management. We monitored the use by mobile, type of application, department, and by users. The bandwidth was solid. Our internet speed is optimized for our research.Kerio has improved my organization's security.Technical support is good. They respond right away.

Read more »

The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus.Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks.The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them.The most valuable feature is the ability to search through a large amount of data.It is a solution that helps test and measure customer satisfaction.

Read more »

Cons
Improvements are needed to the Next Generation Firewall Protection, specifically with user-level protection.Their support is getting better but still needs improvement.Kerio Control has just improved on their biggest problem, which was to introduce better support for high-availability requirements in production.I would like to be able to inspect https packets for the purpose of virus scanning.The improvement that we are looking for is for when decide to move some part of our application to the cloud.I would like for them to add more security features.They should add wireless features.I would like to see them develop a bit more flexibility creating VLANs.

Read more »

The initial setup was complex because some of the configurations that we required needed customization.It could be easier to scale the solution if you are using it on-premise, not in the cloud.There are occasional bugs.

Read more »

Pricing and Cost Advice
My advice is to use your own hardware, and do not use theirs.There is a yearly upkeep fee.The pricing is in-line with our expectations in terms of the quality that we get for it.It's very affordable.The price is inexpensive.Pricing is good, but the licensing took a lot of time.Search and compare.

Read more »

There are additional costs associated with the integrator.My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly.I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
348,558 professionals have used our research since 2012.
Ranking
Views
16,253
Comparisons
8,784
Reviews
11
Average Words per Review
384
Avg. Rating
8.3
Views
7,219
Comparisons
4,482
Reviews
5
Average Words per Review
426
Avg. Rating
8.0
Top Comparisons
Compared 40% of the time.
Compared 14% of the time.
Compared 12% of the time.
Also Known As
Caspida, Splunk UBA
Learn
GFI
Splunk
Overview

Kerio Control brings together next-generation firewall capabilities -- including a network firewall and router, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filtering. These comprehensive capabilities and unmatched deployment flexibility make Kerio Control the ideal choice for small and mid-sized businesses.

Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics – for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
Offer
Learn more about Kerio Control
Learn more about Splunk User Behavior Analytics
Sample Customers
Triton Technical, McDonald's8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
Find out what your peers are saying about Kerio Control vs. Splunk User Behavior Analytics and other solutions. Updated: May 2019.
348,558 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email