SlideShare a Scribd company logo
1 of 131
Download to read offline
1
ElasticON Security
Braden Preston
Director of Product, Elastic Endpoint Security
Get Full Visibility
Blind spots are everywhere
Every person and every asset is
a target
5 1B 5
Data Domains
Practitioners analyze
endpoint, cloud,
network, application,
user, and more!
Events Per Day
Most organizations
average 1 billion
events per day
SOC Analysts
Security Operation
Centers vary in size,
but most have less
than 5 analysts
THE DATA DILEMMA
Solve the dilemma by answering 4 key questions
What data do I need to collect?1
Now that I have it, how do I manage the data?3
How do I make it actionable?4
How do I get that data?2
What data do I need
to collect?
• MITRE ATT&CK™ provides the
data sources required to detect
250 adversary techniques
• There are 50 unique data
sources
• Examples include, “Process
Monitoring”, “DNS Records”,
“Authentication Logs”, and more!
What data do I need
to collect?
• MITRE ATT&CK™ provides the
data sources required to detect
250 adversary techniques
• Examples include, “Process
Monitoring”, “DNS Records”,
“Authentication Logs”, and more!
• There are 50 unique data
sources
Solve the dilemma by answering 4 key questions
What data do I need to collect?1
Now that I have it, how do I manage the data?3
How do I make it actionable?4
How do I get that data?2
Elastic Agent
• Centrally manage all data
collection and endpoint
protection
• Single click integration of data
sources
• Customizable configurations
for complete control and
configurability.
Solve the dilemma by answering 4 key questions
What data do I need to collect?1
Now that I have it, how do I manage the data?3
How do I make it actionable?4
How do I get that data?2
Elastic Security
• A single application for data
analysis across all data domains
and sources
• Configurable data lifecycle
management
• Elastic Common Schema
• No penalties for adding data
sources, endpoints or ingesting
data
• Flexible Storage Tiers
Elastic Common Schema (ECS)
How data is normalized inside Elastic
Defines a common set of fields and
objects to ingest data into
Elasticsearch
Enables cross-source analysis of
diverse data
Designed to be extensible
ECS is adopted throughout the
Elastic Stack
Contributions & feedback welcome
at https://github.com/elastic/ecs
Searching without ECS
src:10.42.42.42
OR client_ip:10.42.42.42
OR apache2.access.remote_ip:
10.42.42.42
OR context.user.ip:10.42.42.42
OR src_ip:10.42.42.42
Searching with ECS
source.ip:10.42.42.42
Solve the dilemma by answering 4 key questions
What data do I need to collect?1
Now that I have it, how do I manage the data?3
How do I make it actionable?4
How do I get that data?2
Threat Hunting
• Proactively Search for
embedded attacks
• Save Analysis in integrated case
management
• Customizable timeline
templates to empower even the
most junior analysts.
Automated
Detection
• Speed and scale of
Elasticsearch to detect known
and unknown threats
• Easily automate threat
detection using queries
KQL/DSL, machine learning,
thresholds, and more!
• 200 free protections;
built in the open
Threat Prevention
• Kernel Level data collection
enables deep visibility
• Protect your Windows, macOS,
and Linux hosts.
• Prevent malware
Demo
Data Dilemma Solved by Elastic Security
Common framework for data collection1
Configurable data management with an open standard for
analysis
3
Actionable Data - Threat Hunting, Automated Detection, Threat
Prevention
4
Single agent for data collection and endpoint protection2
19
Closing slide
This presentation includes forward-looking
statements that are subject to risks and
uncertainties. Actual results may differ materially
as a result of various risk factors included in the
reports on the Forms 10-K, 10-Q, and 8-K, and in
other filings we make with the SEC from time to
time. Elastic undertakes no obligation to update
any of these forward-looking statements.
Try free on Cloud:
ela.st/security-trial
Take a quick spin:
demo.elastic.co
Connect on Slack:
ela.st/slack
Join the Elastic Security community
Thank You
Search. Observe. Protect.
STOP HERE
23
Closing slide
This presentation includes forward-looking
statements that are subject to risks and
uncertainties. Actual results may differ materially
as a result of various risk factors included in the
reports on the Forms 10-K, 10-Q, and 8-K, and in
other filings we make with the SEC from time to
time. Elastic undertakes no obligation to update
any of these forward-looking statements.
Bullet title (Inter 24 pt)
• Try to keep your use of bullet slides to a minimum
• Be creative and think visually
• If you need to source something copy and paste the text box at the
bottom left onto your page
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
– Second-line bullets are Inter 14pt
• Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Bullet title (Inter 24 pt)
• Try to keep your use of bullet slides to a minimum
• Be creative and think visually
• If you need to source something copy and paste the text box at the
bottom left onto your page
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
‒ Second-line bullets are Inter 14pt
‒ Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Subtitle sentence case (Inter 18pt)
Place a quote from someone
really, really important and it will
shrink to fit this space…
Author Name Here
Author Name Here
Place a quote from someone
really, really important and it will
shrink to fit this space…
Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Pie Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
62%
Supporting text
goes here under
the number
62%
Supporting text
goes here under
the number
Pie Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title
Short and Sweet
1M 1M 1M
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
Big Number Treatment
1M 1M 1M
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
Big Number Treatment (Dark Mode)
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 1
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 2
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 3
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 4
Please use this area
for content, screen
shot, or quote; the
next few slide show
examples
Please use this area
for content, screen
shot, or quote; the
next few slide show
examples
We mine and analyze
4 billion events every
day to detect security
hacks and threats.
We mine and analyze
4 billion events every
day to detect security
hacks and threats.
Searching for
Rides
51
With organic logging growing 50%
year over year, and monitoring
infrastructure spend at nearly 10%,
one rogue log can ruin the platform.
The checks and balances necessary
to make sure we don’t hit that
roadblock are built with the Elastic
Stack and Beats.
TEXT GOES HERE IN ALL CAPS
Additional text goes here to support the content and can
be a couple lines in length and sits bottom left aligned
52
With organic logging growing 50%
year over year, and monitoring
infrastructure spend at nearly 10%,
one rogue log can ruin the
platform. The checks and balances
necessary to make sure we don’t
hit that roadblock are built with the
Elastic Stack and Beats.
TEXT GOES HERE IN ALL CAPS
Additional text goes here to support the content and can
be a couple lines in length and sits bottom left aligned
”
The Elastic Stack is critical to us. Every day
millions of users and customers worldwide
trust Box to execute mission-critical
business functions.
“
Some text can go here
Some text can go here
You can use
this area for a
text treatment
that supports
your chosen
imagery
You can use
this area for a
text treatment
that supports
your chosen
imagery
Slide Title Here With
a Few Bullets
Subtitle goes here
• Bullet one goes here in
sentence case and no period
• Bullets should be kept short
and sweet; stay focused
• Use bullets to help break up
content that you need to
have on the screen
Slide Title Here With
a Few Bullets
Subtitle goes here
● Bullet one goes here in
sentence case and no
period
● Bullets should be kept short
and sweet; stay focused
● Use bullets to help break up
content that you need to
have on the screen
Slide Title Here
With Key Points
Subtitle goes here
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
LOGGING METRICS APM
ADVANCED
SEARCH
SECURITY
ANALYTICS
DATA
SCIENCE
FOUNDATIONSPECIALIZATIONS
Slide Title Here
With Key Points
Subtitle goes here
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Image Treatment With Caption Layout
How to add your own photos and crop properly…
Your image will populate the
container but you will likely need
to adjust the crop. Double click
on the image to adjust. Use the
blue dots to adjust the size.
Click on the grayed out portion
of the image and drag to the
left or right until you are happy
with the crop.
1 2 3Right click on the image and go
to replace image. Select a new
image from your machine.
You can use
this area for a
text treatment
that supports
your chosen
imagery
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case1
Enter title for section three here and use sentence case3
Enter title for section four here and use sentence case4
Enter title for section five here and use sentence case5
Enter title for section two here and use sentence case2
Option 1ANOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
○ Second-line bullets are Inter 14pt
■ Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Subtitle sentence case (Inter 18pt)
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case1
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
Enter title for section two here and use sentence case2
Option 1BNOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
3
4
5
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 2NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 3NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 4NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Process Diagram Treatment, 5 Ideas
See style page for more color options
1 2 3 4 5
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas + Highlight
See style page for more color options
1 2 3 4 5
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 4 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 4 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas
See style page for more color options
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
5
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas + Highlight
See style page for more color options
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
1 2 3 4 5
Process Diagram Treatment, 4 Ideas
See style page for more color options
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Title Here Title Here Title Here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Box With Bullet Treatment
Title Here Title Here Title Here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Box With Bullet Treatment with Color Choice
• One bullet here
• Two bullet here
• Three bullet here
Title Here
• One bullet here
• Two bullet here
• Three bullet here
Title Here
• One bullet here
• Two bullet here
• Three bullet here
Title Here
Box Bullet Treatment
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Title Here Title Here Title Here
Box Bullet Treatment with Color Scheme
Thank You
Search. Observe. Protect.
Screenshot Treatment With Browser Window
How to drop in your screen shot…
The browser window is like a
frame so anything you drop
behind it will show through.
Drop in your screen shot, go
to the format menu and crop
it to show only what you
want.
2
Last, be sure to right click on
your screen shot, go to order
and send to back.
3
1
Screenshot Treatment With Title and Browser Window
NOTE USE THIS LAYOUT
FOR PLACING ONE FULL
BLEED SCREENSHOT
Use This Slide for Code, Light Version
Use template colors to highlight
curl –XPUT localhost:9200/_template/twitter –d ‘
{
“template” : “twitter_*”,
“setting” : {
“number_of_shards” : 4,
“number_of_replicas” : 1
}
}’
Use This Slide for Code, Dark Version
Use template colors to highlight
curl –XPUT localhost:9200/_template/twitter –d ‘
{
“template” : “twitter_*”,
“setting” : {
“number_of_shards” : 4,
“number_of_replicas” : 1
}
}’
Color Palette
254
197
20
47
67
145
250
115
79
240
78
152
151
156
171
67
71
83
0
119
204
0
191
179
PRIMARY
Styles and Treatments
SHAPES
LOGOS
Please use logos according
to brand guidelines. These
logos can be sized up and
down without losing quality.
Please press shift before
sizing to keep proper
proportions.
Various template colors can
be used for shapes. Shapes
should have a 3pt line stroke.
Video or Large Image Treatment
Sub header goes here
Search. Observe. Protect.
3 solutions
Elastic Enterprise Search Elastic SecurityElastic Observability
Elastic Enterprise Search
Workplace Search App Search Site Search
Elastic Observability
Logs Metrics APM Uptime
Endpoint SIEM
Elastic Security
3 solutions powered by 1 stack
Kibana
Elasticsearch
Beats Logstash
Elastic Stack
Elastic Enterprise Search Elastic SecurityElastic Observability
The Elastic Stack
Reliably and securely take data from
any source, in any format, then search,
analyze, and visualize it in real time.
Deploy anywhere.
SaaS Orchestration
Elastic Cloud
on Kubernetes
Elastic Cloud Elastic Cloud
Enterprise
Elastic Enterprise Search Elastic SecurityElastic Observability
Kibana
Elasticsearch
Beats Logstash
Powered by
the stack
3 solutions
Deployed
anywhere
Deploy anywhere.
SaaS Orchestration
Elastic Cloud
on Kubernetes
Elastic Cloud Elastic Cloud
Enterprise
Elastic Enterprise Search Elastic SecurityElastic Observability
Kibana
Elasticsearch
Beats Logstash
Powered by
the stack
3 solutions
Deployed
anywhere
Deploy anywhere.
SaaS Orchestration
Elastic Cloud Elastic Cloud on
Kubernetes
Elastic Cloud
Enterprise
Subscription Options
ELASTIC CLOUD
FREE PAID
Open Source
Features
Free Proprietary
Features
Paid Proprietary Features
+
Elastic Support
PAID
OPEN SOURCE BASIC GOLD PLATINUM ENTERPRISE
SELFMANAGEDSaaS
Resource-based Pricing
Endpoint Security
No endpoint-based pricing
SIEM
No seat/ingest-based pricing
APM
No agent-based pricing
Metrics
No host-based pricing
Logs
No ingest-based pricing
App Search
No docs-based pricing
Site Search
No query-based pricing
Workplace Search
No user-based pricing
Elastic Enterprise Search Elastic SecurityElastic Observability
31 Solution Logos
ENTERPRISE
SEARCH
OBSERVABILITY SECURITY
Elastic Logo + Tagline
FULL COLOR
REVERSE
Solution Logo Lockups
Solution Logo Lockups
Product Logos
ELASTIC CLOUD
ON KUBERNETES
ECK
KIBANA LOGSTASHELASTICSEARCHBEATS ELASTIC CLOUD
ELASTIC
CLOUD
ENTERPRISE
Product Logos
APMAPP SEARCH
WORKPLACE
SEARCH
METRICS SIEMLOGSSITE SEARCH ENDPOINT
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Iconography Usage
Product Feature Icons
Do not use these icons for
anything other than what
they are created for.
Product Feature Icons are created
to correlate with a specific feature
within the product and are not
flexible in use. Please see labels as
a guide.
Generic Icons
These icons are made to fit across
multiple concepts within reason.
See labels as a general guide.
Please use discretion.
Training Icons
Do not use these icons for
anything other than what
they are created for.
Training Icons are created to
correlate with a specific feature
within the training relm and are not
flexible in use. Please see labels as
a guide.
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specializationEngineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea chart
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specializationEngineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea chart
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specializationEngineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea chart
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specializationEngineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea Light bulb
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection

More Related Content

What's hot

Reinventing enterprise defense with the Elastic Stack
Reinventing enterprise defense with the Elastic StackReinventing enterprise defense with the Elastic Stack
Reinventing enterprise defense with the Elastic StackElasticsearch
 
Search for all with Elastic Enterprise Search
Search for all with Elastic Enterprise Search Search for all with Elastic Enterprise Search
Search for all with Elastic Enterprise Search Elasticsearch
 
Industrial production process visualization with the Elastic Stack in real-ti...
Industrial production process visualization with the Elastic Stack in real-ti...Industrial production process visualization with the Elastic Stack in real-ti...
Industrial production process visualization with the Elastic Stack in real-ti...Elasticsearch
 
Empower your security practitioners with the Elastic Stack
Empower your security practitioners with the Elastic StackEmpower your security practitioners with the Elastic Stack
Empower your security practitioners with the Elastic StackElasticsearch
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLElasticsearch
 
Log Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNLLog Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNLElasticsearch
 
O monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insightO monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insightElasticsearch
 
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFBMonitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFBElasticsearch
 
Centralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLACentralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLAElasticsearch
 
Automatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivosAutomatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivosElasticsearch
 
How eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
How eStruxture Data Centers is Using ECE to Rapidly Scale Their BusinessHow eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
How eStruxture Data Centers is Using ECE to Rapidly Scale Their BusinessElasticsearch
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackElasticsearch
 
Achieving cyber mission assurance with near real-time impact
Achieving cyber mission assurance with near real-time impactAchieving cyber mission assurance with near real-time impact
Achieving cyber mission assurance with near real-time impactElasticsearch
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionElasticsearch
 
Machine Learning for Anomaly Detection, Time Series Modeling, and More
Machine Learning for Anomaly Detection, Time Series Modeling, and MoreMachine Learning for Anomaly Detection, Time Series Modeling, and More
Machine Learning for Anomaly Detection, Time Series Modeling, and MoreElasticsearch
 
Security Events Logging at Bell with the Elastic Stack
Security Events Logging at Bell with the Elastic StackSecurity Events Logging at Bell with the Elastic Stack
Security Events Logging at Bell with the Elastic StackElasticsearch
 
Elastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElasticsearch
 
Infrastructure monitoring made easy, from ingest to insight
 Infrastructure monitoring made easy, from ingest to insight Infrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insightElasticsearch
 
How KeyBank Used Elastic to Build an Enterprise Monitoring Solution
How KeyBank Used Elastic to Build an Enterprise Monitoring SolutionHow KeyBank Used Elastic to Build an Enterprise Monitoring Solution
How KeyBank Used Elastic to Build an Enterprise Monitoring SolutionElasticsearch
 

What's hot (20)

Reinventing enterprise defense with the Elastic Stack
Reinventing enterprise defense with the Elastic StackReinventing enterprise defense with the Elastic Stack
Reinventing enterprise defense with the Elastic Stack
 
Search for all with Elastic Enterprise Search
Search for all with Elastic Enterprise Search Search for all with Elastic Enterprise Search
Search for all with Elastic Enterprise Search
 
Industrial production process visualization with the Elastic Stack in real-ti...
Industrial production process visualization with the Elastic Stack in real-ti...Industrial production process visualization with the Elastic Stack in real-ti...
Industrial production process visualization with the Elastic Stack in real-ti...
 
Empower your security practitioners with the Elastic Stack
Empower your security practitioners with the Elastic StackEmpower your security practitioners with the Elastic Stack
Empower your security practitioners with the Elastic Stack
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
Log Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNLLog Monitoring and Anomaly Detection at Scale at ORNL
Log Monitoring and Anomaly Detection at Scale at ORNL
 
O monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insightO monitoramento da infraestrutura facilitado, da ingestão ao insight
O monitoramento da infraestrutura facilitado, da ingestão ao insight
 
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFBMonitoring and Securing a Geo-Dispersed Data Center at Hill AFB
Monitoring and Securing a Geo-Dispersed Data Center at Hill AFB
 
Centralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLACentralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLA
 
Automatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivosAutomatize a detecção de ameaças e evite falsos positivos
Automatize a detecção de ameaças e evite falsos positivos
 
How eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
How eStruxture Data Centers is Using ECE to Rapidly Scale Their BusinessHow eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
How eStruxture Data Centers is Using ECE to Rapidly Scale Their Business
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
 
Achieving cyber mission assurance with near real-time impact
Achieving cyber mission assurance with near real-time impactAchieving cyber mission assurance with near real-time impact
Achieving cyber mission assurance with near real-time impact
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
 
Machine Learning for Anomaly Detection, Time Series Modeling, and More
Machine Learning for Anomaly Detection, Time Series Modeling, and MoreMachine Learning for Anomaly Detection, Time Series Modeling, and More
Machine Learning for Anomaly Detection, Time Series Modeling, and More
 
Security Events Logging at Bell with the Elastic Stack
Security Events Logging at Bell with the Elastic StackSecurity Events Logging at Bell with the Elastic Stack
Security Events Logging at Bell with the Elastic Stack
 
Elastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environments
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 
Infrastructure monitoring made easy, from ingest to insight
 Infrastructure monitoring made easy, from ingest to insight Infrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insight
 
How KeyBank Used Elastic to Build an Enterprise Monitoring Solution
How KeyBank Used Elastic to Build an Enterprise Monitoring SolutionHow KeyBank Used Elastic to Build an Enterprise Monitoring Solution
How KeyBank Used Elastic to Build an Enterprise Monitoring Solution
 

Similar to Get full visibility and find hidden security issues

CJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment InstructionCJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment InstructionVinaOconner450
 
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosElasticsearch
 
MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...
MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...
MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...MongoDB
 
TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)Mike Felch
 
Precision Content™ Tools, Techniques, and Technology
Precision Content™ Tools, Techniques, and TechnologyPrecision Content™ Tools, Techniques, and Technology
Precision Content™ Tools, Techniques, and Technologydclsocialmedia
 
NLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobil
NLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobilNLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobil
NLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobilDatabricks
 
Declarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemTDeclarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemTLaura Chiticariu
 
Karen Lopez 10 Physical Data Modeling Blunders
Karen Lopez 10 Physical Data Modeling BlundersKaren Lopez 10 Physical Data Modeling Blunders
Karen Lopez 10 Physical Data Modeling BlundersKaren Lopez
 
Performance By Design
Performance By DesignPerformance By Design
Performance By DesignGuy Harrison
 
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive QueryInteractive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive QueryAshish Thapliyal
 
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive QueryInteractive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive QueryMicrosoft Tech Community
 
Provenance in Production-Grade Machine Learning
Provenance in Production-Grade Machine LearningProvenance in Production-Grade Machine Learning
Provenance in Production-Grade Machine LearningAnand Sampat
 
Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"Discover Pinterest
 
Optimizing Application Architecture (.NET/Java topics)
Optimizing Application Architecture (.NET/Java topics)Optimizing Application Architecture (.NET/Java topics)
Optimizing Application Architecture (.NET/Java topics)Ravi Okade
 
Initiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AIInitiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AIAmazon Web Services
 
Webinar: Scaling MongoDB
Webinar: Scaling MongoDBWebinar: Scaling MongoDB
Webinar: Scaling MongoDBMongoDB
 
Ten things to consider for interactive analytics on write once workloads
Ten things to consider for interactive analytics on write once workloadsTen things to consider for interactive analytics on write once workloads
Ten things to consider for interactive analytics on write once workloadsAbinasha Karana
 
(Big) Data (Science) Skills
(Big) Data (Science) Skills(Big) Data (Science) Skills
(Big) Data (Science) SkillsOscar Corcho
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 

Similar to Get full visibility and find hidden security issues (20)

CJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment InstructionCJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment Instruction
 
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
 
MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...
MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...
MongoDB World 2019: Finding the Right MongoDB Atlas Cluster Size: Does This I...
 
TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)
 
Precision Content™ Tools, Techniques, and Technology
Precision Content™ Tools, Techniques, and TechnologyPrecision Content™ Tools, Techniques, and Technology
Precision Content™ Tools, Techniques, and Technology
 
NLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobil
NLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobilNLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobil
NLP-Focused Applied ML at Scale for Global Fleet Analytics at ExxonMobil
 
Declarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemTDeclarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemT
 
Karen Lopez 10 Physical Data Modeling Blunders
Karen Lopez 10 Physical Data Modeling BlundersKaren Lopez 10 Physical Data Modeling Blunders
Karen Lopez 10 Physical Data Modeling Blunders
 
Performance By Design
Performance By DesignPerformance By Design
Performance By Design
 
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive QueryInteractive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
 
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive QueryInteractive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
Interactive ad-hoc analysis at petabyte scale with HDInsight Interactive Query
 
Tldr
TldrTldr
Tldr
 
Provenance in Production-Grade Machine Learning
Provenance in Production-Grade Machine LearningProvenance in Production-Grade Machine Learning
Provenance in Production-Grade Machine Learning
 
Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"Five Ways To Do Data Analytics "The Wrong Way"
Five Ways To Do Data Analytics "The Wrong Way"
 
Optimizing Application Architecture (.NET/Java topics)
Optimizing Application Architecture (.NET/Java topics)Optimizing Application Architecture (.NET/Java topics)
Optimizing Application Architecture (.NET/Java topics)
 
Initiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AIInitiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AI
 
Webinar: Scaling MongoDB
Webinar: Scaling MongoDBWebinar: Scaling MongoDB
Webinar: Scaling MongoDB
 
Ten things to consider for interactive analytics on write once workloads
Ten things to consider for interactive analytics on write once workloadsTen things to consider for interactive analytics on write once workloads
Ten things to consider for interactive analytics on write once workloads
 
(Big) Data (Science) Skills
(Big) Data (Science) Skills(Big) Data (Science) Skills
(Big) Data (Science) Skills
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 

More from Elasticsearch

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxElasticsearch
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using ElasticElasticsearch
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webElasticsearch
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Elasticsearch
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudElasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesElasticsearch
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Elasticsearch
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Elasticsearch
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxElasticsearch
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of findElasticsearch
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiencesElasticsearch
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchElasticsearch
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesElasticsearch
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Elasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesElasticsearch
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insightsElasticsearch
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Elasticsearch
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentElasticsearch
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public goodElasticsearch
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticElasticsearch
 

More from Elasticsearch (20)

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios web
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of find
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiences
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified search
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisiones
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insights
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public good
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and Elastic
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Get full visibility and find hidden security issues

  • 1. 1 ElasticON Security Braden Preston Director of Product, Elastic Endpoint Security Get Full Visibility
  • 2. Blind spots are everywhere
  • 3. Every person and every asset is a target
  • 4. 5 1B 5 Data Domains Practitioners analyze endpoint, cloud, network, application, user, and more! Events Per Day Most organizations average 1 billion events per day SOC Analysts Security Operation Centers vary in size, but most have less than 5 analysts THE DATA DILEMMA
  • 5. Solve the dilemma by answering 4 key questions What data do I need to collect?1 Now that I have it, how do I manage the data?3 How do I make it actionable?4 How do I get that data?2
  • 6. What data do I need to collect? • MITRE ATT&CK™ provides the data sources required to detect 250 adversary techniques • There are 50 unique data sources • Examples include, “Process Monitoring”, “DNS Records”, “Authentication Logs”, and more!
  • 7. What data do I need to collect? • MITRE ATT&CK™ provides the data sources required to detect 250 adversary techniques • Examples include, “Process Monitoring”, “DNS Records”, “Authentication Logs”, and more! • There are 50 unique data sources
  • 8. Solve the dilemma by answering 4 key questions What data do I need to collect?1 Now that I have it, how do I manage the data?3 How do I make it actionable?4 How do I get that data?2
  • 9. Elastic Agent • Centrally manage all data collection and endpoint protection • Single click integration of data sources • Customizable configurations for complete control and configurability.
  • 10. Solve the dilemma by answering 4 key questions What data do I need to collect?1 Now that I have it, how do I manage the data?3 How do I make it actionable?4 How do I get that data?2
  • 11. Elastic Security • A single application for data analysis across all data domains and sources • Configurable data lifecycle management • Elastic Common Schema • No penalties for adding data sources, endpoints or ingesting data • Flexible Storage Tiers
  • 12. Elastic Common Schema (ECS) How data is normalized inside Elastic Defines a common set of fields and objects to ingest data into Elasticsearch Enables cross-source analysis of diverse data Designed to be extensible ECS is adopted throughout the Elastic Stack Contributions & feedback welcome at https://github.com/elastic/ecs Searching without ECS src:10.42.42.42 OR client_ip:10.42.42.42 OR apache2.access.remote_ip: 10.42.42.42 OR context.user.ip:10.42.42.42 OR src_ip:10.42.42.42 Searching with ECS source.ip:10.42.42.42
  • 13. Solve the dilemma by answering 4 key questions What data do I need to collect?1 Now that I have it, how do I manage the data?3 How do I make it actionable?4 How do I get that data?2
  • 14. Threat Hunting • Proactively Search for embedded attacks • Save Analysis in integrated case management • Customizable timeline templates to empower even the most junior analysts.
  • 15. Automated Detection • Speed and scale of Elasticsearch to detect known and unknown threats • Easily automate threat detection using queries KQL/DSL, machine learning, thresholds, and more! • 200 free protections; built in the open
  • 16. Threat Prevention • Kernel Level data collection enables deep visibility • Protect your Windows, macOS, and Linux hosts. • Prevent malware
  • 17. Demo
  • 18. Data Dilemma Solved by Elastic Security Common framework for data collection1 Configurable data management with an open standard for analysis 3 Actionable Data - Threat Hunting, Automated Detection, Threat Prevention 4 Single agent for data collection and endpoint protection2
  • 19. 19 Closing slide This presentation includes forward-looking statements that are subject to risks and uncertainties. Actual results may differ materially as a result of various risk factors included in the reports on the Forms 10-K, 10-Q, and 8-K, and in other filings we make with the SEC from time to time. Elastic undertakes no obligation to update any of these forward-looking statements.
  • 20. Try free on Cloud: ela.st/security-trial Take a quick spin: demo.elastic.co Connect on Slack: ela.st/slack Join the Elastic Security community
  • 23. 23 Closing slide This presentation includes forward-looking statements that are subject to risks and uncertainties. Actual results may differ materially as a result of various risk factors included in the reports on the Forms 10-K, 10-Q, and 8-K, and in other filings we make with the SEC from time to time. Elastic undertakes no obligation to update any of these forward-looking statements.
  • 24. Bullet title (Inter 24 pt) • Try to keep your use of bullet slides to a minimum • Be creative and think visually • If you need to source something copy and paste the text box at the bottom left onto your page Subtitle sentence case (Inter 18pt)
  • 25. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) Subtitle sentence case (Inter 18pt) Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) – Second-line bullets are Inter 14pt • Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes
  • 26. Bullet title (Inter 24 pt) • Try to keep your use of bullet slides to a minimum • Be creative and think visually • If you need to source something copy and paste the text box at the bottom left onto your page Subtitle sentence case (Inter 18pt)
  • 27. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) ‒ Second-line bullets are Inter 14pt ‒ Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes Subtitle sentence case (Inter 18pt)
  • 28. Place a quote from someone really, really important and it will shrink to fit this space… Author Name Here
  • 29. Author Name Here Place a quote from someone really, really important and it will shrink to fit this space…
  • 30. Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 31. Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 32. Pie Chart Slide With Multiple Colors Sub-title or chart title here in sentence case 62% Supporting text goes here under the number 62% Supporting text goes here under the number
  • 33. Pie Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 34. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 35. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 36. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 38. 1M 1M 1M HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number Big Number Treatment
  • 39. 1M 1M 1M HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number Big Number Treatment (Dark Mode)
  • 40. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 1
  • 41. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 2
  • 42. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 3
  • 43. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 4
  • 44.
  • 45. Please use this area for content, screen shot, or quote; the next few slide show examples
  • 46. Please use this area for content, screen shot, or quote; the next few slide show examples
  • 47. We mine and analyze 4 billion events every day to detect security hacks and threats.
  • 48. We mine and analyze 4 billion events every day to detect security hacks and threats.
  • 49.
  • 51. 51 With organic logging growing 50% year over year, and monitoring infrastructure spend at nearly 10%, one rogue log can ruin the platform. The checks and balances necessary to make sure we don’t hit that roadblock are built with the Elastic Stack and Beats. TEXT GOES HERE IN ALL CAPS Additional text goes here to support the content and can be a couple lines in length and sits bottom left aligned
  • 52. 52 With organic logging growing 50% year over year, and monitoring infrastructure spend at nearly 10%, one rogue log can ruin the platform. The checks and balances necessary to make sure we don’t hit that roadblock are built with the Elastic Stack and Beats. TEXT GOES HERE IN ALL CAPS Additional text goes here to support the content and can be a couple lines in length and sits bottom left aligned
  • 53. ” The Elastic Stack is critical to us. Every day millions of users and customers worldwide trust Box to execute mission-critical business functions. “
  • 54. Some text can go here Some text can go here
  • 55. You can use this area for a text treatment that supports your chosen imagery
  • 56. You can use this area for a text treatment that supports your chosen imagery
  • 57. Slide Title Here With a Few Bullets Subtitle goes here • Bullet one goes here in sentence case and no period • Bullets should be kept short and sweet; stay focused • Use bullets to help break up content that you need to have on the screen
  • 58. Slide Title Here With a Few Bullets Subtitle goes here ● Bullet one goes here in sentence case and no period ● Bullets should be kept short and sweet; stay focused ● Use bullets to help break up content that you need to have on the screen
  • 59. Slide Title Here With Key Points Subtitle goes here Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting LOGGING METRICS APM ADVANCED SEARCH SECURITY ANALYTICS DATA SCIENCE FOUNDATIONSPECIALIZATIONS
  • 60. Slide Title Here With Key Points Subtitle goes here Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting
  • 61. Image Treatment With Caption Layout How to add your own photos and crop properly… Your image will populate the container but you will likely need to adjust the crop. Double click on the image to adjust. Use the blue dots to adjust the size. Click on the grayed out portion of the image and drag to the left or right until you are happy with the crop. 1 2 3Right click on the image and go to replace image. Select a new image from your machine.
  • 62. You can use this area for a text treatment that supports your chosen imagery
  • 63. Agenda Slide Use color to highlight Enter title for section one here and use sentence case1 Enter title for section three here and use sentence case3 Enter title for section four here and use sentence case4 Enter title for section five here and use sentence case5 Enter title for section two here and use sentence case2 Option 1ANOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 64. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) ○ Second-line bullets are Inter 14pt ■ Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes Subtitle sentence case (Inter 18pt) Agenda Slide Use color to highlight Enter title for section one here and use sentence case1 Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case Enter title for section two here and use sentence case2 Option 1BNOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE. 3 4 5
  • 65. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 2NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 66. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 3NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 67. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 4NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 68. Process Diagram Treatment, 5 Ideas See style page for more color options 1 2 3 4 5 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 69. Process Diagram Treatment, 5 Ideas + Highlight See style page for more color options 1 2 3 4 5 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 70. Process Diagram Treatment, 4 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 71. Process Diagram Treatment, 4 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 72. Process Diagram Treatment, 3 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 Supporting text goes here under the number Supporting text goes here under the number
  • 73. Process Diagram Treatment, 3 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 Supporting text goes here under the number Supporting text goes here under the number
  • 74. Process Diagram Treatment, 5 Ideas See style page for more color options 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number 5 Supporting text goes here under the number
  • 75. Process Diagram Treatment, 5 Ideas + Highlight See style page for more color options Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number 1 2 3 4 5
  • 76. Process Diagram Treatment, 4 Ideas See style page for more color options 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 77. Process Diagram Treatment, 3 Ideas See style page for more color options 1 2 3 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 78. Title Here Title Here Title Here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Box With Bullet Treatment
  • 79. Title Here Title Here Title Here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Box With Bullet Treatment with Color Choice
  • 80. • One bullet here • Two bullet here • Three bullet here Title Here • One bullet here • Two bullet here • Three bullet here Title Here • One bullet here • Two bullet here • Three bullet here Title Here Box Bullet Treatment
  • 81. • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Title Here Title Here Title Here Box Bullet Treatment with Color Scheme
  • 83. Screenshot Treatment With Browser Window How to drop in your screen shot… The browser window is like a frame so anything you drop behind it will show through. Drop in your screen shot, go to the format menu and crop it to show only what you want. 2 Last, be sure to right click on your screen shot, go to order and send to back. 3 1
  • 84. Screenshot Treatment With Title and Browser Window
  • 85.
  • 86. NOTE USE THIS LAYOUT FOR PLACING ONE FULL BLEED SCREENSHOT
  • 87. Use This Slide for Code, Light Version Use template colors to highlight curl –XPUT localhost:9200/_template/twitter –d ‘ { “template” : “twitter_*”, “setting” : { “number_of_shards” : 4, “number_of_replicas” : 1 } }’
  • 88. Use This Slide for Code, Dark Version Use template colors to highlight curl –XPUT localhost:9200/_template/twitter –d ‘ { “template” : “twitter_*”, “setting” : { “number_of_shards” : 4, “number_of_replicas” : 1 } }’
  • 90. Styles and Treatments SHAPES LOGOS Please use logos according to brand guidelines. These logos can be sized up and down without losing quality. Please press shift before sizing to keep proper proportions. Various template colors can be used for shapes. Shapes should have a 3pt line stroke.
  • 91. Video or Large Image Treatment Sub header goes here
  • 93. 3 solutions Elastic Enterprise Search Elastic SecurityElastic Observability
  • 94. Elastic Enterprise Search Workplace Search App Search Site Search
  • 97. 3 solutions powered by 1 stack Kibana Elasticsearch Beats Logstash Elastic Stack Elastic Enterprise Search Elastic SecurityElastic Observability
  • 98. The Elastic Stack Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
  • 99. Deploy anywhere. SaaS Orchestration Elastic Cloud on Kubernetes Elastic Cloud Elastic Cloud Enterprise Elastic Enterprise Search Elastic SecurityElastic Observability Kibana Elasticsearch Beats Logstash Powered by the stack 3 solutions Deployed anywhere
  • 100. Deploy anywhere. SaaS Orchestration Elastic Cloud on Kubernetes Elastic Cloud Elastic Cloud Enterprise Elastic Enterprise Search Elastic SecurityElastic Observability Kibana Elasticsearch Beats Logstash Powered by the stack 3 solutions Deployed anywhere
  • 101. Deploy anywhere. SaaS Orchestration Elastic Cloud Elastic Cloud on Kubernetes Elastic Cloud Enterprise
  • 102. Subscription Options ELASTIC CLOUD FREE PAID Open Source Features Free Proprietary Features Paid Proprietary Features + Elastic Support PAID OPEN SOURCE BASIC GOLD PLATINUM ENTERPRISE SELFMANAGEDSaaS
  • 103. Resource-based Pricing Endpoint Security No endpoint-based pricing SIEM No seat/ingest-based pricing APM No agent-based pricing Metrics No host-based pricing Logs No ingest-based pricing App Search No docs-based pricing Site Search No query-based pricing Workplace Search No user-based pricing Elastic Enterprise Search Elastic SecurityElastic Observability
  • 104. 31 Solution Logos ENTERPRISE SEARCH OBSERVABILITY SECURITY Elastic Logo + Tagline FULL COLOR REVERSE
  • 107. Product Logos ELASTIC CLOUD ON KUBERNETES ECK KIBANA LOGSTASHELASTICSEARCHBEATS ELASTIC CLOUD ELASTIC CLOUD ENTERPRISE
  • 115. Iconography Usage Product Feature Icons Do not use these icons for anything other than what they are created for. Product Feature Icons are created to correlate with a specific feature within the product and are not flexible in use. Please see labels as a guide. Generic Icons These icons are made to fit across multiple concepts within reason. See labels as a general guide. Please use discretion. Training Icons Do not use these icons for anything other than what they are created for. Training Icons are created to correlate with a specific feature within the training relm and are not flexible in use. Please see labels as a guide.
  • 116. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 117. Training Icons apm metrics Security analytics logging specializationEngineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 118. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea chart news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 119. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection
  • 120. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 121. Training Icons apm metrics Security analytics logging specializationEngineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 122. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea chart news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 123. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection
  • 124. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 125. Training Icons apm metrics Security analytics logging specializationEngineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 126. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea chart news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 127. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection
  • 128. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 129. Training Icons apm metrics Security analytics logging specializationEngineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 130. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea Light bulb news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 131. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection