We just raised a $30M Series A: Read our story

Compare Microsoft Sentinel vs. Splunk

Cancel
You must select at least 2 products to compare!
Devo Logo
Read 11 Devo reviews.
11,163 views|4,399 comparisons
Microsoft Sentinel Logo
6,730 views|5,291 comparisons
Splunk Logo
93,502 views|78,363 comparisons
Comparison Summary
Question: What is a better choice, Splunk or Azure Sentinel?
Answer: It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log volume increases. Splunk is good for operations style use cases (NOC), but requires ESS and isn't as easy to use or get data out of for SOC style use cases. Sentinel is good for endpoint Windows Defender Advanced Edition (extra cost, not the free version), analysis and malware findings, and when the data sources are all Windows events (O365/OneDrive/Email/ADFS), but costs go up substantially if the log sources aren't Microsoft events, and support for non-MSFT log sources is limited. Neither offers real UEBA capabilities IMO. Splunk has the add-on (entirely different architecture and systems), for the Caspida UEBA. MSFT will tout UEBA on Sentinel, but it's endpoint related (not network) and I've yet to see use cases on non-MSFT application data events.
Featured Review
Find out what your peers are saying about Microsoft Sentinel vs. Splunk and other solutions. Updated: November 2021.
552,136 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The ability to have high performance, high-speed search capability is incredibly important for us. When it comes to doing security analysis, you don't want to be doing is sitting around waiting to get data back while an attacker is sitting on a network, actively attacking it. You need to be able to answer questions quickly. If I see an indicator of attack, I need to be able to rapidly pivot and find data, then analyze it and find more data to answer more questions. You need to be able to do that quickly. If I'm sitting around just waiting to get my first response, then it ends up moving too slow to keep up with the attacker. Devo's speed and performance allows us to query in real-time and keep up with what is actually happening on the network, then respond effectively to events.""Even if it's a relatively technical tool or platform, it's very intuitive and graphical. It's very appealing in terms of the user interface. The UI has a graphically interface with the raw data in a table. The table can be as big as you want it, depending on your use case. You can easily get a report combining your data, along with calculations and graphical dashboards. You don't need a lot of training, because the UI is relatively very intuitive.""It's very, very versatile.""Being able to build and modify dashboards on the fly with Activeboards streamlines my analyst time because my analysts aren't doing it across spreadsheets or five different tools to try to build a timeline out themselves. They can just ingest it all, build a timeline out across all the logging, and all the different information sources in one dashboard. So, it's a huge time saver. It also has the accuracy of being able to look at all those data sources in one view. The log analysis, which would take 40 hours, we can probably get through it in about five to eight hours using Devo.""In traditional BI solutions, you need to wait a lot of time to have the ability to create visualizations with the data and to do searches. With this kind of platform, you have that information in real-time.""The thing that Devo does better than other solutions is to give me the ability to write queries that look at multiple data sources and run fast. Most SIEMs don't do that. And I can do that by creating entity-based queries. Let's say I have a table which has Okta, a table which has G Suite, a table which has endpoint telemetry, and I have a table which has DNS telemetry. I can write a query that says, 'Join all these things together on IP, and where the IP matches in all these tables, return to me that subset of data, within these time windows.' I can break it down that way.""Those 400 days of hot data mean that people can look for trends and at what happened in the past. And they can not only do so from a security point of view, but even for operational use cases. In the past, our operational norm was to keep live data for only 30 days. Our users were constantly asking us for at least 90 days, and we really couldn't even do that. That's one reason that having 400 days of live data is pretty huge. As our users start to use it and adopt this system, we expect people to be able to do those long-term analytics.""One of the biggest features of the UI is that you see the actual code of what you're doing in the graphical user interface, in a little window on the side. Whatever you're doing, you see the code, what's happening. And you can really quickly switch between using the GUI and using the code. That's really useful."

More Devo Pros »

"It has basic out-of-the-box integrations with multiple log sources.""It is always correlating to IOCs for normal attacks, using Azure-related resources. For example, if any illegitimate IP starts unusual activity on our Azure firewall, then it automatically generates an alarm for us.""The UI-based analytics are excellent.""Having your logs put all in one place with machine learning working on those logs is a good feature. I don't need to start thinking, "Where are my logs?" My logs are in a centralized repository, like Log Analytics, which is why you can't use Sentinel without Log Analytics. Having all those logs in one place is an advantage.""One of the most valuable features is that it creates a kind of a single pane of glass for organizations that already use Microsoft software. So, when they have things like Microsoft 365, it is very easy for them to kind of plug in or enroll those endpoints into the Azure Sentinel service.""The machine learning and artificial intelligence on offer are great.""If you know how to do KQL (kusto query language) queries, which are how you query the log data inside Sentinel, the information is pretty rich. You can get down to a good level of detail regarding event information or notifications.""The most valuable feature is the performance because unlike legacy SIEMs that were on-premises, it does not require as much maintenance."

More Microsoft Sentinel Pros »

"The most valuable feature is the log aggregation, being able to scan through all of the logs.""It provides a lot of analytics with the underlying AI engine, and it is a lot easier than other solutions. There are some products that do automated AI-based detection and drawing up charts, but for network monitoring and all of the monitoring aspects, it is quite a nice tool. It is very convenient for business users because they get more or less a lot of data readily available. If you're familiar with the Splunk query language, you can pretty much do whatever you want.""The correlation capabilities are the first value that our clients say they like with Splunk.""We have found all the features useful. However, the dashboarding and logging have been very helpful. Additionally, the log analysis does a great job.""The most valuable aspect of the solution is the dashboard. It's very intuitive.""The solution has plenty of features that are good.""The completeness of the solution is what we like the most.""It has quite extensive support in terms of integration. If you want to do anything, there are tools for that."

More Splunk Pros »

Cons
"Some third-parties don't have specific API connectors built, so we had to work with Devo to get the logs and parse the data using custom parsers, rather than an out-of-the-box solution.""There is room for improvement in the ability to parse different log types. I would go as far as to say the product is deficient in its ability to parse multiple, different log types, including logs from major vendors that are supported by competitors. Additionally, the time that it takes to turn around a supported parser for customers and common log source types, which are generally accepted standards in the industry, is not acceptable. This has impacted customer onboarding and customer relationships for us on multiple fronts.""There's room for improvement within the GUI. There is also some room for improvement within the native parsers they support. But I can say that about pretty much any solution in this space.""There's always room to reduce the learning curve over how to deal with events and machine data. They could make the machine data simpler.""Technical support could be better.""I would like to have the ability to create more complex dashboards.""Devo has a lot of cloud connectors, but they need to do a little bit of work there. They've got good integrations with the public cloud, but there are a lot of cloud SaaS systems that they still need to work with on integrations, such as Salesforce and other SaaS providers where we need to get access logs.""From our experience, the Devo agent needs some work. They built it on top of OS Query's open-source framework. It seems like it wasn't tuned properly to handle a large volume of Windows event logs. In our experience, there would definitely be some room for improvement. A lot of SIEMs on the market have their own agent infrastructure. I think Devo's working towards that, but I think that it needs some improvement as far as keeping up with high-volume environments."

More Devo Cons »

"If Azure Sentinel had the ability to ingest Azure services from different tenants into another tenant that was hosting Azure Sentinel, and not lose any metadata, that would be a huge benefit to a lot of companies.""The on-prem log sources still require a lot of development.""The only thing is sometimes you can have a false positive.""They need to work with other security vendors. For example, we replaced our email gateway with Symantec, but we couldn't collect these logs with Azure Sentinel. Instead of collecting these logs with Azure Sentinel, we are collecting them on Qradar. We couldn't do it with Sentinel, which is a problem for us.""Add more out-of-the-box connectors with other SaaS platforms/applications.""They should integrate it with many other software-as-a-service providers and make connectors available so that you don't have to do any sort of log normalization.""There is some relatively advanced knowledge that you have to have to properly leverage Sentinel's full capabilities. I'm thinking about things like the creation of workbooks, how you do threat-hunting, and the kinds of notifications you're getting... It takes time for people to ramp up on that and develop a familiarity or expertise with it.""I would like to be able to monitor applications outside of the Azure Cloud."

More Microsoft Sentinel Cons »

"Its setup is a little bit complex for a distributed environment. Their support can also be better. If we miss the response for more than a week, they usually close the case. Sometimes, it can take us more than a week to reply.""Splunk needs to be able to hold more days of data. At the moment it only holds three months of data.""There is improvement needed when importing from some types of data sources.""The price of the solution could be cheaper.""Deployment is not difficult but the lock sources and configurations can take time.""The implementation and the scanning of the logs can be difficult.""This is a costly solution.""We find that the maintenance process could be a lot better."

More Splunk Cons »

Pricing and Cost Advice
"Devo is definitely cheaper than Splunk. There's no doubt about that. The value from Devo is good. It's definitely more valuable to me than QRadar or LogRhythm or any of the old, traditional SIEMs.""[Devo was] in the ballpark with at least a couple of the other front-runners that we were looking at. Devo is a good value and, given the quality of the product, I would expect to pay more.""Be cautious of metadata inclusion for log types in pricing, as there are some "gotchas" with that.""Devo was very cost-competitive... Devo did come with that 400 days of hot data, and that was not the case with other products.""We have an OEM agreement with Devo. It is very similar to the standard licensing agreement because we are charged in the same way as any other customer, e.g., we use the backroom.""I'm not involved in the financial aspect, but I think the licensing costs are similar to other solutions. If all the solutions have a similar cost, Devo provides more for the money.""Our licensing fees are billed annually and per terabyte.""It's a per gigabyte cost for ingestion of data. For every gigabyte that you ingest, it's whatever you negotiated your price for. Compared to other contracts that we've had for cloud providers, it's significantly less."

More Devo Pricing and Cost Advice »

"It is a consumption-based license model. bands at 100, 200, 400 GB per day etc. Azure Sentinel Pricing | Microsoft Azure""Azure Sentinel is very costly, or at least it appears to be very costly. The costs vary based on your ingestion and your retention charges.""Sentinel is a bit expensive. If you can figure a way of configuring it to meet your needs, then you can find a way around the cost.""I have had mixed feedback. At one point, I heard a client say that it sometimes seems more expensive. Most of the clients are on Office 365 or M365, and they are forced to take Azure SIEM because of the integration.""Sentinel can be expensive. When you ingest data from sources that are outside of the cloud, you're paying a fair amount for that data ingestion. When you're ingesting data sources from within the cloud, depending on what your retention periods are, it's not that expensive.""I am just paying for the log space with Azure Sentinel. It costs us about $2,000 a month. Most of the logs are free. We are only paying money for Azure Firewall logs because email logs or Azure AD logs are free to use for us.""It is kind of like a sliding scale. There are different tiers of pricing that go from $100 per day up to $3,500 per day. So, it just kind of depends on how much data is being stored. There can be additional costs to the standard license other than the additional data. It just kind of depends on what other services you're spinning up in Azure, or if you're using something like Azure log analytics.""Good monthly operational cost model for the detection and response outcomes delivered, M365 logs don't count toward the limits which is a good benefit."

More Microsoft Sentinel Pricing and Cost Advice »

"The price is comparable.""The pricing model is based on the number of gigabytes that you ingest into the Splunk system. So it can be an expensive solution.""It can be cost-prohibitive when you start to scale and have terabytes of data. Its cost model is based on how much data it processes a day. If they're able to create scaled-down niche or custom package offerings, it may help with the cost. Instead of the full-blown features, if they can narrow the scope where it can only be used for a specific purpose, it would kind of create that market for the product, and it may help with the costing. When you start using it as a central aggregator and you're pumping tons of logs at it, pretty soon, you'll start hitting your cap on what it can process a day. Once you've got that, you're kind of defeating the purpose because you're going to have to scale back.""The subscription is monthly.""I think that most of the monitoring solutions are expensive.""It's a yearly subscription.""I think that most of the log analytics solutions are expensive and I'm not sure if it's worth it.""The price of Splunk is reasonable."

More Splunk Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
552,136 professionals have used our research since 2012.
Questions from the Community
Top Answer: It's very, very versatile.
Top Answer: Devo, like other vendors, doesn't charge extra for playbooks and automation. That way, you are only paying for the side… more »
Top Answer: I need more empowerment in reporting. For example, when I'm using Qlik or Power BI in terms of reporting for the… more »
Top Answer: Yes, Azure Sentinel is a SIEM on the Cloud. Multiple data sources can be uploaded and analyzed with Azure Sentinel and… more »
Top Answer: It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for… more »
Top Answer: We like that Azure Sentinel does not require as much maintenance as legacy SIEMs that are on-premises. Azure Sentinel is… more »
Top Answer: Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring… more »
Top Answer: The reporting aspect is good and it does what I need it to do.
Top Answer: Everything we do is either yearly or multi-year. I don't know if there is any additional cost to standard license fees.
Comparisons
Also Known As
Azure Sentinel
Splunk Enterprise Security
Learn More
Overview

Devo is the only cloud-native logging and security analytics platform that releases the full potential of all your data to empower bold, confident action when it matters most. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.

Microsoft Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. With Azure Sentinel, you can:

- Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds

- Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft

- Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft

- Respond to incidents rapidly with built-in orchestration and automation of common tasks

To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

Splunk software has been around since 2006 and the company has since grown to become an industry leader. Splunk's vision is to make machine data accessible, usable and valuable to everybody. The company offers a wide range of products to turn machine data into valuable information by monitoring and analyzing all activities. This is known as Operational Intelligence and is the unique value proposition of Splunk.

Splunk is well-known for its Log Management capabilities and also for its Security Information and Event Management (SIEM) solutions.

Offer
See Devo in Action

See how Devo allows you to free yourself from data management, and make machine data and insights accessible.

Learn more about Microsoft Sentinel
Learn more about Splunk
Sample Customers
United States Air Force, Rubrik, SentinelOne, Critical Start, NHL, Panda Security, Telefonica, CaixaBank, OpenText, IGT, OneMain Financial, SurveyMonkey, FanDuel, H&R Block, Ulta Beauty, Manulife, Moneylion, Chime Bank, Magna International, American Express Global Business Travel
Microsoft Sentinel is trusted by companies of all sizes including ABM, ASOS, Uniper, First West Credit Union, Avanade, and more.
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Top Industries
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider20%
Government8%
Financial Services Firm7%
REVIEWERS
Financial Services Firm27%
Computer Software Company18%
Wholesaler/Distributor9%
Government9%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider22%
Government6%
Financial Services Firm6%
REVIEWERS
Financial Services Firm19%
Energy/Utilities Company12%
Computer Software Company11%
Retailer7%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider18%
Financial Services Firm10%
Government7%
Company Size
REVIEWERS
Small Business17%
Midsize Enterprise17%
Large Enterprise67%
VISITORS READING REVIEWS
Small Business48%
Midsize Enterprise15%
Large Enterprise36%
REVIEWERS
Small Business33%
Midsize Enterprise22%
Large Enterprise44%
VISITORS READING REVIEWS
Small Business22%
Midsize Enterprise21%
Large Enterprise57%
REVIEWERS
Small Business30%
Midsize Enterprise15%
Large Enterprise55%
VISITORS READING REVIEWS
Small Business25%
Midsize Enterprise18%
Large Enterprise57%
Find out what your peers are saying about Microsoft Sentinel vs. Splunk and other solutions. Updated: November 2021.
552,136 professionals have used our research since 2012.

Microsoft Sentinel is ranked 9th in Security Information and Event Management (SIEM) with 14 reviews while Splunk is ranked 1st in Security Information and Event Management (SIEM) with 45 reviews. Microsoft Sentinel is rated 8.2, while Splunk is rated 8.0. The top reviewer of Microsoft Sentinel writes "Easy to manage with good automation and machine learning capabilities ". On the other hand, the top reviewer of Splunk writes "Good support with an intuitive dashboard but the cost is too high". Microsoft Sentinel is most compared with AWS Security Hub, IBM QRadar, Elastic SIEM and Rapid7 InsightIDR, whereas Splunk is most compared with Dynatrace, Datadog, IBM QRadar, ELK Logstash and Fortinet FortiAnalyzer. See our Microsoft Sentinel vs. Splunk report.

See our list of best Security Information and Event Management (SIEM) vendors.

We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.