We performed a comparison between LogRhythm NetworkXDR [EOL] and Splunk User Behavior Analytics based on real PeerSpot user reviews.
Find out what your peers are saying about Darktrace, Vectra AI, Cisco and others in Network Detection and Response (NDR)."What we like most in LogRhythm NetworkXDR is its GUI. The GUI is the best when compared to competitors. For example, there is another SIEM in QRadar and Splunk, and for open source SIEM there is Wazuh and there are other SIEM solutions, but LogRhythm NetworkXDR is more reliable and easier to access. It's easy to use and its display is easy to understand. Learning LogRhythm NetworkXDR is smooth sailing compared to other SIEM solutions."
"The solution is fast, flexible, and easy to use."
"The most valuable features are the indexing and powerful search features."
"This is a good security product."
"The product is at the forefront of auto-remediation networking. It's great."
"Splunk is more user-friendly than some competing solutions we tried."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"The most valuable feature is the ability to search through a large amount of data."
"It's easily scalable."
"What would make LogRhythm NetworkXDR better is if they could run it open source, similar to what is being done in Wazuh, and Wazuh is also a good tool to compare against. More integration could also make LogRhythm NetworkXDR better."
"There are occasional bugs."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"The correlation engine should have persistent and definable rules."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"The price of Splunk UBA is too high."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"In the future I would like to see simplified statistics and analytical threats."
More Splunk User Behavior Analytics Pricing and Cost Advice →
LogRhythm NetworkXDR [EOL] doesn't meet the minimum requirements to be ranked in Network Detection and Response (NDR) with 1 review while Splunk User Behavior Analytics is ranked 2nd in User Entity Behavior Analytics (UEBA) with 17 reviews. LogRhythm NetworkXDR [EOL] is rated 10.0, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of LogRhythm NetworkXDR [EOL] writes "Easier to learn, access, and use, and comes with an easy to understand GUI". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". LogRhythm NetworkXDR [EOL] is most compared with , whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Cynet.
We monitor all Network Detection and Response (NDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.