Want to see who topped the 2019 Best Software Awards?

Splunk Enterprise Security

3.9
(53 reviews)

Splunk Enterprise Security (ES) is a SIEM software that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information to enables security teams to quickly detect and respond to internal and external attacks to simplify threat management while minimizing risk and safeguarding business

Work for Splunk Enterprise Security?

Learning about Splunk?

We can help you find the solution that fits you best.

Splunk Enterprise Security Features

Network Management

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

86%
(Based on 40 reviews)

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

77%
(Based on 31 reviews)

Log Management

Provides security information and stores the data in a secure repository for reference.

n/a

Incident Management

Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

86%
(Based on 38 reviews)

Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

80%
(Based on 33 reviews)

Incident Reporting

Documents cases of abnormal activity and compromised systems.

86%
(Based on 34 reviews)

Security Intelligence

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

80%
(Based on 31 reviews)

Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

78%
(Based on 30 reviews)

Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

84%
(Based on 35 reviews)

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

83%
(Based on 35 reviews)