App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

Splunk Enterprise vs Jamf Protect Comparison

Add to Compare

Compare similar apps

Norton AntiVirus logo

Norton AntiVirus

4.4

Intercept X Endpoint logo

Intercept X Endpoint

4.5

Elastic Stack logo

Elastic Stack

4.6

Falcon logo

Falcon

4.7

IBM Security QRadar logo

IBM Security QRadar

4.5

Sumo Logic logo

Sumo Logic

4.6

Good recommendations?

Overview

Category Leaders

Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine...

Category Leaders

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect,...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

No videos yet

Pricing

Starting from

1800

Per year

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

Starting from

5

Per month

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

User reviews

4.6

223

5

4

3

2

1

146

70

7

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

4.5

35

5

4

3

2

1

21

11

2

0

1

  • Value for money
  • Ease of use
  • Features
  • Customer support
97%
would recommend this app

Pros

A very effective log analyzer and the part I love most is the infrastructure monitoring. A proactive monitor and alert generator for our Critical Production Environment.
Splunk provides a very flexible solution for helping you gather huge amount of data and then setting up alerts and configuring reports which helps you in converting data into an actionable insight.
Data retrieval and visualisation is nice and easy if you know the right querying process. Machine Learning supports enhances performance for the cloud, especially.

Pros

With that said, the integration is amazing. I love the ease of deployment.
I like the direct integration with JAMF pro. The system is very great to allow me insight in to the individual users.
Jamf Protect is great for both home and business and it becomes even better when you use Jamf Protect to set up a virtual private network (VPN).

Cons

I feel debugging is difficult. Drop down or drag and drop functions should be made available because it's difficult to keep track and remember syntax of functions and it's usage.
We use spluk for datamining, particularly bad password attempts.
Splunk is widely used for manipulation of data and we encounter the use of this tool almostl twice a week.

Cons

Often times they will update the threats themselves.
There have been a few features that have been missing for a long time. For example, renaming a device using user info during deployment.
Problems navigating some menus. Sometimes it seems to be problematic.
  • Vendor responds to reviews
  • Last review16 days ago
  • Vendor responds to reviews
  • Last review9 days ago

Key features

  • Total features141
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad hoc Analysis
  • Ad hoc Reporting
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Management
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Baseline Manager
  • Behavioral Analytics
  • CPU Monitoring
  • Capacity Analytics
  • Capacity Management
  • Change Management
  • Charting
  • Cloud Application Security
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Connectivity Management
  • Continuous Deployment
  • Continuous Integration
  • Corrective and Preventive Actions (CAPA)
  • Cost Management
  • Credential Management
  • Customizable Dashboard
  • Customizable Reports
  • Dashboard
  • Dashboard Creation
  • Data Aggregation
  • Data Analysis Tools
  • Data Discovery
  • Data Management
  • Data Mining
  • Data Security
  • Data Visualization
  • Deep Learning
  • Demand Monitoring
  • Device Management
  • Diagnostic Tools
  • Disaster Recovery
  • Email Alerts
  • Email Monitoring
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Event Triggered Actions
  • File Integrity Monitoring
  • Firewalls
  • For Healthcare
  • IP Address Monitoring
  • IT Asset Management
  • IT Incident Management
  • IT Monitoring
  • Incident Management
  • Incident Reporting
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • Investigation Management
  • Issue Auditing
  • KPI Monitoring
  • Knowledge Management
  • License Management
  • Log Analysis
  • Log Collection
  • Log Management
  • ML Algorithm Library
  • Machine Learning
  • Maintenance Scheduling
  • Mobile Network Troubleshooting
  • Model Training
  • Modeling & Simulation
  • Monitoring
  • Multi-Cloud Management
  • Multiple Data Sources
  • Natural Language Processing
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • OLAP
  • OSHA Compliance
  • Patch Management
  • Performance Analysis
  • Performance Metrics
  • Performance Monitoring
  • Policy Management
  • Predictive Analytics
  • Predictive Modeling
  • Real Time Data
  • Real Time Reporting
  • Real-Time Analytics
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Updates
  • Relational Display
  • Remediation Management
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Root Cause Analysis
  • Safety Incident Management
  • Scheduling
  • Search/Filter
  • Self Service Data Preparation
  • Self Service Portal
  • Server Logs
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Simple Network Management Protocol (SNMP)
  • Task Management
  • Templates
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN
  • Virtual Machine Monitoring
  • Visual Analytics
  • Visual Discovery
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Total features23
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad hoc Analysis
  • Ad hoc Reporting
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Management
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Baseline Manager
  • Behavioral Analytics
  • CPU Monitoring
  • Capacity Analytics
  • Capacity Management
  • Change Management
  • Charting
  • Cloud Application Security
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Connectivity Management
  • Continuous Deployment
  • Continuous Integration
  • Corrective and Preventive Actions (CAPA)
  • Cost Management
  • Credential Management
  • Customizable Dashboard
  • Customizable Reports
  • Dashboard
  • Dashboard Creation
  • Data Aggregation
  • Data Analysis Tools
  • Data Discovery
  • Data Management
  • Data Mining
  • Data Security
  • Data Visualization
  • Deep Learning
  • Demand Monitoring
  • Device Management
  • Diagnostic Tools
  • Disaster Recovery
  • Email Alerts
  • Email Monitoring
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Event Triggered Actions
  • File Integrity Monitoring
  • Firewalls
  • For Healthcare
  • IP Address Monitoring
  • IT Asset Management
  • IT Incident Management
  • IT Monitoring
  • Incident Management
  • Incident Reporting
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • Investigation Management
  • Issue Auditing
  • KPI Monitoring
  • Knowledge Management
  • License Management
  • Log Analysis
  • Log Collection
  • Log Management
  • ML Algorithm Library
  • Machine Learning
  • Maintenance Scheduling
  • Mobile Network Troubleshooting
  • Model Training
  • Modeling & Simulation
  • Monitoring
  • Multi-Cloud Management
  • Multiple Data Sources
  • Natural Language Processing
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • OLAP
  • OSHA Compliance
  • Patch Management
  • Performance Analysis
  • Performance Metrics
  • Performance Monitoring
  • Policy Management
  • Predictive Analytics
  • Predictive Modeling
  • Real Time Data
  • Real Time Reporting
  • Real-Time Analytics
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Updates
  • Relational Display
  • Remediation Management
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Root Cause Analysis
  • Safety Incident Management
  • Scheduling
  • Search/Filter
  • Self Service Data Preparation
  • Self Service Portal
  • Server Logs
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Simple Network Management Protocol (SNMP)
  • Task Management
  • Templates
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN
  • Virtual Machine Monitoring
  • Visual Analytics
  • Visual Discovery
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

Integrations

  • Total integrations73
  • Bitbucket
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Drive
  • HubSpot CRM
  • Jenkins
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Teams
  • NetSuite
  • PagerDuty
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Zapier
  • Zendesk Suite
  • Total integrations5
  • Bitbucket
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Drive
  • HubSpot CRM
  • Jenkins
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Teams
  • NetSuite
  • PagerDuty
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Zapier
  • Zendesk Suite

User reviews that mention these apps

AB
AvatarImg

Adam B.

Food Production, 10,001+ employees

Used daily for 6-12 months

Review source

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend10/10

Share this review:

Jamf Protect logo

Jamf Protect

Jamf Protect, why would you not?

Reviewed 3 years ago
Pros

For a long time macOS security operations at an enterprise level was unheard of when it came to user friendly GUI and accurate reporting. Jamf Protect now makes this easy. We're now able to get a full spectrum of compliances on our macOS devices in one console, giving us the ability to be proactive in remediation when it comes to threat protection. We're given real-time alerts and insights that we were usually left in the dark with in the past.

Cons

I honestly don't think there are any cons to this product. It does exactly what we want it to do and even rivals our current Threat Protection solution for Windows. The other products could definitely take some queues from Jamf Protect.