SlideShare a Scribd company logo
Elastic: A Search Company
Search. Observe. Protect.
Richard Im
March 2020
Employees in 40+ countries
Public company on NYSE
Elastic is a search company.
Searching for
Rides
Searching for
Restaurants
Searching for
Elastic is a search company.
We focus on value to users by producing fast results
that operate at scale and are relevant. This is our
DNA. We believe search is an experience. It is what
defines us, and makes us unique.
Speed, Scale,
Relevance
Search. Observe. Protect.
3 solutions
Elastic Enterprise Search Elastic SecurityElastic Observability
Elastic Enterprise Search
Workplace Search App Search Site Search
Search everything,
anywhere
Easily implement powerful,
modern search experiences
across your website, app, or
digital workplace. Search it
all, simply.
ELASTIC ENTERPRISE SEARCH
”
Although Elasticsearch started as a search engine, it
has grown into a powerful analytics engine in our
e-commerce context, making product
recommendations and alerting on order thresholds.
“
ELASTIC ENTERPRISE SEARCH
Elastic Observability
Logs Metrics APM Uptime
Unified visibility
across your entire
ecosystem
Bring your logs, metrics, and
traces together into a single stack
so you can monitor, detect, and
react to events with speed.
ELASTIC OBSERVABILITY
”
The Elastic Stack is critical to us. Every day millions of
users and customers worldwide trust Box to execute
mission-critical business functions. Elasticsearch has
enabled the Observability team at Box to work with a
reliable and cost effective logging system.
“
ELASTIC OBSERVABILITY
Endpoint SIEM
Elastic Security
Security how it
should be: open
Elastic Security integrates
endpoint security and SIEM to
give you prevention, collection,
detection, and response
capabilities for unified protection
across your infrastructure.
ELASTIC SECURITY
”
The Elastic Stack made it possible for us to build
Fusion – our centralized cyber security & defense
platform – and protect the bank and our customers
from real-time threats all over the world.
“
ELASTIC SECURITY
”
Elastic Endpoint Security has dramatically dropped our
mean time to remediate from seven days to 30 minutes
over legacy antivirus, and the Elastic Stack has provided
an unparalleled way to store, analyze, and react to data
well beyond any competitor in the market.
“
ELASTIC SECURITY
Elastic Stack for Business Analytics
Kibana
Beats
Logstash
(KPI Processor)
Elasticsearch
(KPI cluster)
Logs
Metrics
Packets
...
Real world architecture
SFDC
Marketo
BI Database
Billing
backend
Core
backend
Dashboards
ML
Exploration
Slack & SFDC
notifications
Answering business questions - Dashboards
Answering business questions - ML & Alerting
● Increased/reduced
capacity
● Regional data
● Proactively identifying
anomalous behaviour
● Capacity forecast
● Alerting & Notification
The need for business analytics
Obvious...But nevertheless
Starting points
● Many product metrics scattered
across multiple data repositories
Missing
● Need to ask “business
questions” from multiple
sources
● Need to track key metrics
overtime
● Need quick access to ad-hoc
queries, beyond pre-canned
dashboards
Analyze
Share
Explore
Be notified
Use cases for Business Analytics
Analyze
Share
Explore
Be notified
Use cases for Business Analytics
Control visualization
Scripted field
Filter ratio
Bucket script
Custom time range Lens
Saved queries
Dashboard sharing
Dashboard export to CSV
Canvas
ML Anomaly detection
ML Analysis
7.x new features
Elastic Enterprise Search Elastic SecurityElastic Observability
Kibana
Elasticsearch
Beats Logstash
3 solutions powered by 1 stack
Elastic Stack
The Elastic Stack
Reliably and securely take data from
any source, in any format, then search,
analyze, and visualize it in real time.
SaaS Orchestration
Elastic Cloud
on Kubernetes
Elastic Cloud Elastic Cloud
Enterprise
Elastic Enterprise Search Elastic SecurityElastic Observability
Kibana
Elasticsearch
Beats Logstash
Deploy anywhere.
Powered by
the stack
3 solutions
Deployed
anywhere
Family of SaaS
Offerings
Deploy, operate, and scale Elastic
products and solutions in the cloud,
on a cloud provider of your choosing.
ELASTIC CLOUD
Centrally manage your
Elastic deployments
Provision, manage, and monitor Elastic
products and solutions, at any scale, on
any infrastructure, while managing
everything from a single console.
ELASTIC CLOUD ENTERPRISE
Official Operator,
and much more
Simplify setup, upgrades, snapshots,
scaling, high availability, security, and
more when running Elastic products
and solutions on Kubernetes.
ELASTIC CLOUD ON KUBERNETES
ELASTIC CLOUD
Subscription Options
FREE PAID
Open Source
Features
Free Proprietary
Features
Paid Proprietary Features
+
Elastic Support
PAID
OPEN SOURCE BASIC GOLD PLATINUM ENTERPRISE
SELF-MANAGEDSaaS
Endpoint Security
No endpoint-based pricing
SIEM
No seat/ingest-based pricing
APM
No agent-based pricing
Metrics
No host-based pricing
Logs
No ingest-based pricing
App Search
No docs-based pricing
Site Search
No query-based pricing
Resource-based Pricing
Workplace Search
No user-based pricing
Elastic Enterprise Search Elastic SecurityElastic Observability
Elastic is a Search Company.
www.elastic.co
Thank You
Safe Harbor
Statement
This presentation includes forward-looking
statements that are subject to risks and
uncertainties. Actual results may differ
materially as a result of various risk factors
included in the reports on the Forms 10-K,
10-Q, and 8-K, and in other filings we make
with the SEC from time to time.Elastic
undertakes no obligation to update any of
these forward-looking statements.

More Related Content

What's hot

Innovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & MicroservicesInnovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & Microservices
Amazon Web Services
 
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Cloudera, Inc.
 
VMware vROps Management Pack for Amazon RDS
VMware vROps Management Pack for Amazon RDSVMware vROps Management Pack for Amazon RDS
VMware vROps Management Pack for Amazon RDS
Blue Medora
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
Elasticsearch
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite ElasticElastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elasticsearch
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
Elasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
Elasticsearch
 
Modern Data Platform Part 1: Data Ingestion
Modern Data Platform Part 1: Data IngestionModern Data Platform Part 1: Data Ingestion
Modern Data Platform Part 1: Data Ingestion
Nilesh Shah
 
Introducing Azure Arc
Introducing Azure ArcIntroducing Azure Arc
Introducing Azure Arc
Mohamed Wali
 
VMware vROps Management Pack for Hadoop
VMware vROps Management Pack for HadoopVMware vROps Management Pack for Hadoop
VMware vROps Management Pack for Hadoop
Blue Medora
 
From secure VPC links to SSO with Elastic Cloud
From secure VPC links to SSO with Elastic CloudFrom secure VPC links to SSO with Elastic Cloud
From secure VPC links to SSO with Elastic Cloud
Elasticsearch
 
How Elastic Security Meets SOC Needs
How Elastic Security Meets SOC NeedsHow Elastic Security Meets SOC Needs
How Elastic Security Meets SOC Needs
Anna Ossowski
 
Fintech Pace Security on AWS: The Customer Perspective
Fintech Pace Security on AWS: The Customer PerspectiveFintech Pace Security on AWS: The Customer Perspective
Fintech Pace Security on AWS: The Customer Perspective
Amazon Web Services
 
Automating security in aws with divvy cloud
Automating security in aws with divvy cloudAutomating security in aws with divvy cloud
Automating security in aws with divvy cloud
John Varghese
 
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Prabal Acharyya
 
Hyperscale Security Data for Continuous Risk Monitoring
Hyperscale Security Data for Continuous Risk MonitoringHyperscale Security Data for Continuous Risk Monitoring
Hyperscale Security Data for Continuous Risk Monitoring
Amazon Web Services
 
Advanced correlations for threat detection and more
Advanced correlations for threat detection and moreAdvanced correlations for threat detection and more
Advanced correlations for threat detection and more
Elasticsearch
 
Cloudera SDX
Cloudera SDXCloudera SDX
Cloudera SDX
Cloudera, Inc.
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera, Inc.
 
Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesAutomate threat detections and avoid false positives
Automate threat detections and avoid false positives
Elasticsearch
 

What's hot (20)

Innovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & MicroservicesInnovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & Microservices
 
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
Comment développer une stratégie Big Data dans le cloud public avec l'offre P...
 
VMware vROps Management Pack for Amazon RDS
VMware vROps Management Pack for Amazon RDSVMware vROps Management Pack for Amazon RDS
VMware vROps Management Pack for Amazon RDS
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite ElasticElastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite Elastic
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Modern Data Platform Part 1: Data Ingestion
Modern Data Platform Part 1: Data IngestionModern Data Platform Part 1: Data Ingestion
Modern Data Platform Part 1: Data Ingestion
 
Introducing Azure Arc
Introducing Azure ArcIntroducing Azure Arc
Introducing Azure Arc
 
VMware vROps Management Pack for Hadoop
VMware vROps Management Pack for HadoopVMware vROps Management Pack for Hadoop
VMware vROps Management Pack for Hadoop
 
From secure VPC links to SSO with Elastic Cloud
From secure VPC links to SSO with Elastic CloudFrom secure VPC links to SSO with Elastic Cloud
From secure VPC links to SSO with Elastic Cloud
 
How Elastic Security Meets SOC Needs
How Elastic Security Meets SOC NeedsHow Elastic Security Meets SOC Needs
How Elastic Security Meets SOC Needs
 
Fintech Pace Security on AWS: The Customer Perspective
Fintech Pace Security on AWS: The Customer PerspectiveFintech Pace Security on AWS: The Customer Perspective
Fintech Pace Security on AWS: The Customer Perspective
 
Automating security in aws with divvy cloud
Automating security in aws with divvy cloudAutomating security in aws with divvy cloud
Automating security in aws with divvy cloud
 
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
 
Hyperscale Security Data for Continuous Risk Monitoring
Hyperscale Security Data for Continuous Risk MonitoringHyperscale Security Data for Continuous Risk Monitoring
Hyperscale Security Data for Continuous Risk Monitoring
 
Advanced correlations for threat detection and more
Advanced correlations for threat detection and moreAdvanced correlations for threat detection and more
Advanced correlations for threat detection and more
 
Cloudera SDX
Cloudera SDXCloudera SDX
Cloudera SDX
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
 
Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesAutomate threat detections and avoid false positives
Automate threat detections and avoid false positives
 

Similar to Examining OpenData with a Search Index using Elasticsearch

Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashKeeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Amazon Web Services
 
Regina Pison - Elastic - OSL19
Regina Pison - Elastic - OSL19Regina Pison - Elastic - OSL19
Regina Pison - Elastic - OSL19
marketingsyone
 
Elastic Security Brochure
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
Joseph DeFever
 
Azure Synapse 101 Webinar Presentation
Azure Synapse 101 Webinar PresentationAzure Synapse 101 Webinar Presentation
Azure Synapse 101 Webinar Presentation
Matthew W. Bowers
 
2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...
2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...
2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...
Ashnikbiz
 
Faire grandir votre idée dans le cloud AWS
Faire grandir votre idée dans le cloud AWSFaire grandir votre idée dans le cloud AWS
Faire grandir votre idée dans le cloud AWS
Amazon Web Services
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D Koutsanastasis
Uni Systems S.M.S.A.
 
5 Years Of Building SaaS On AWS
5 Years Of Building SaaS On AWS5 Years Of Building SaaS On AWS
5 Years Of Building SaaS On AWS
Christian Beedgen
 
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS SummitIntroducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Amazon Web Services
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution Brief
Joseph DeFever
 
Azure Data Explorer deep dive - review 04.2020
Azure Data Explorer deep dive - review 04.2020Azure Data Explorer deep dive - review 04.2020
Azure Data Explorer deep dive - review 04.2020
Riccardo Zamana
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Evident.io
 
Keynote: Looping through data, insight, and action
Keynote: Looping through data, insight, and actionKeynote: Looping through data, insight, and action
Keynote: Looping through data, insight, and action
Elasticsearch
 
Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...
Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...
Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...
Ashnikbiz
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Amazon Web Services
 
Frictionless Application Development: Radically Change How You Secure and Mo...
Frictionless Application Development:  Radically Change How You Secure and Mo...Frictionless Application Development:  Radically Change How You Secure and Mo...
Frictionless Application Development: Radically Change How You Secure and Mo...
DevOps.com
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
Cisco Canada
 
Enterprise search: search at scale
Enterprise search: search at scaleEnterprise search: search at scale
Enterprise search: search at scale
UllyCarolinneSampaio
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
Sparity1
 
How to Build Continuous Ingestion for the Internet of Things
How to Build Continuous Ingestion for the Internet of ThingsHow to Build Continuous Ingestion for the Internet of Things
How to Build Continuous Ingestion for the Internet of Things
Cloudera, Inc.
 

Similar to Examining OpenData with a Search Index using Elasticsearch (20)

Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and LogstashKeeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
Keeping Up with the ELK Stack: Elasticsearch, Kibana, Beats, and Logstash
 
Regina Pison - Elastic - OSL19
Regina Pison - Elastic - OSL19Regina Pison - Elastic - OSL19
Regina Pison - Elastic - OSL19
 
Elastic Security Brochure
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
 
Azure Synapse 101 Webinar Presentation
Azure Synapse 101 Webinar PresentationAzure Synapse 101 Webinar Presentation
Azure Synapse 101 Webinar Presentation
 
2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...
2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...
2. สัมมนาสดทางออนไลน์ : วิธีตรวจสอบการใช้งาน Container, Kubernetes และ OpenSh...
 
Faire grandir votre idée dans le cloud AWS
Faire grandir votre idée dans le cloud AWSFaire grandir votre idée dans le cloud AWS
Faire grandir votre idée dans le cloud AWS
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D Koutsanastasis
 
5 Years Of Building SaaS On AWS
5 Years Of Building SaaS On AWS5 Years Of Building SaaS On AWS
5 Years Of Building SaaS On AWS
 
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS SummitIntroducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
Introducing Open Distro for Elasticsearch - ADB201 - New York AWS Summit
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution Brief
 
Azure Data Explorer deep dive - review 04.2020
Azure Data Explorer deep dive - review 04.2020Azure Data Explorer deep dive - review 04.2020
Azure Data Explorer deep dive - review 04.2020
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Keynote: Looping through data, insight, and action
Keynote: Looping through data, insight, and actionKeynote: Looping through data, insight, and action
Keynote: Looping through data, insight, and action
 
Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...
Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...
Webinar: How to monitor Container, Kubernetes, and OpenShift environment usin...
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Frictionless Application Development: Radically Change How You Secure and Mo...
Frictionless Application Development:  Radically Change How You Secure and Mo...Frictionless Application Development:  Radically Change How You Secure and Mo...
Frictionless Application Development: Radically Change How You Secure and Mo...
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
Enterprise search: search at scale
Enterprise search: search at scaleEnterprise search: search at scale
Enterprise search: search at scale
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
 
How to Build Continuous Ingestion for the Internet of Things
How to Build Continuous Ingestion for the Internet of ThingsHow to Build Continuous Ingestion for the Internet of Things
How to Build Continuous Ingestion for the Internet of Things
 

More from FaithWestdorp

Using Elastiknn for exact and approximate nearest neighbor search
Using Elastiknn for exact and approximate nearest neighbor searchUsing Elastiknn for exact and approximate nearest neighbor search
Using Elastiknn for exact and approximate nearest neighbor search
FaithWestdorp
 
Observability from the Home
Observability from the HomeObservability from the Home
Observability from the Home
FaithWestdorp
 
Elasticsearch Goes to Congress
Elasticsearch Goes to CongressElasticsearch Goes to Congress
Elasticsearch Goes to Congress
FaithWestdorp
 
Eliminate your zombie technology ray myers - 11-5-2020
Eliminate your zombie technology   ray myers - 11-5-2020Eliminate your zombie technology   ray myers - 11-5-2020
Eliminate your zombie technology ray myers - 11-5-2020
FaithWestdorp
 
Mejorando las busquedas en nuestras aplicaciones web con elasticsearch
Mejorando las busquedas en nuestras aplicaciones web con elasticsearchMejorando las busquedas en nuestras aplicaciones web con elasticsearch
Mejorando las busquedas en nuestras aplicaciones web con elasticsearch
FaithWestdorp
 
Evolving with Elastic: GetSet Learning
Evolving with Elastic: GetSet LearningEvolving with Elastic: GetSet Learning
Evolving with Elastic: GetSet Learning
FaithWestdorp
 
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsEmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
FaithWestdorp
 
From the trenches: scaling a large log management deployment
From the trenches: scaling a large log management deploymentFrom the trenches: scaling a large log management deployment
From the trenches: scaling a large log management deployment
FaithWestdorp
 
Logstash and Maxmind: not just for GEOIP anymore
Logstash and Maxmind: not just for GEOIP anymoreLogstash and Maxmind: not just for GEOIP anymore
Logstash and Maxmind: not just for GEOIP anymore
FaithWestdorp
 
Elasticsearch's aggregations & esctl in action or how i built a cli tool...
Elasticsearch's aggregations & esctl in action  or how i built a cli tool...Elasticsearch's aggregations & esctl in action  or how i built a cli tool...
Elasticsearch's aggregations & esctl in action or how i built a cli tool...
FaithWestdorp
 
Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...
 Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex... Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...
Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...
FaithWestdorp
 
Introduction to machine learning using Elastic
Introduction to machine learning using ElasticIntroduction to machine learning using Elastic
Introduction to machine learning using Elastic
FaithWestdorp
 
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...Upgrade your attack model: finding and stopping fileless attacks with MITRE A...
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...
FaithWestdorp
 
Elastic Observability
Elastic Observability Elastic Observability
Elastic Observability
FaithWestdorp
 
Threat hunting with Elastic APM
Threat hunting with Elastic APMThreat hunting with Elastic APM
Threat hunting with Elastic APM
FaithWestdorp
 
Guide to Data Visualization in Kibana
Guide to Data Visualization in KibanaGuide to Data Visualization in Kibana
Guide to Data Visualization in Kibana
FaithWestdorp
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
FaithWestdorp
 
Esctl in action elastic user group presentation aug 25 2020
Esctl in action   elastic user group presentation aug 25 2020Esctl in action   elastic user group presentation aug 25 2020
Esctl in action elastic user group presentation aug 25 2020
FaithWestdorp
 

More from FaithWestdorp (18)

Using Elastiknn for exact and approximate nearest neighbor search
Using Elastiknn for exact and approximate nearest neighbor searchUsing Elastiknn for exact and approximate nearest neighbor search
Using Elastiknn for exact and approximate nearest neighbor search
 
Observability from the Home
Observability from the HomeObservability from the Home
Observability from the Home
 
Elasticsearch Goes to Congress
Elasticsearch Goes to CongressElasticsearch Goes to Congress
Elasticsearch Goes to Congress
 
Eliminate your zombie technology ray myers - 11-5-2020
Eliminate your zombie technology   ray myers - 11-5-2020Eliminate your zombie technology   ray myers - 11-5-2020
Eliminate your zombie technology ray myers - 11-5-2020
 
Mejorando las busquedas en nuestras aplicaciones web con elasticsearch
Mejorando las busquedas en nuestras aplicaciones web con elasticsearchMejorando las busquedas en nuestras aplicaciones web con elasticsearch
Mejorando las busquedas en nuestras aplicaciones web con elasticsearch
 
Evolving with Elastic: GetSet Learning
Evolving with Elastic: GetSet LearningEvolving with Elastic: GetSet Learning
Evolving with Elastic: GetSet Learning
 
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsEmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
 
From the trenches: scaling a large log management deployment
From the trenches: scaling a large log management deploymentFrom the trenches: scaling a large log management deployment
From the trenches: scaling a large log management deployment
 
Logstash and Maxmind: not just for GEOIP anymore
Logstash and Maxmind: not just for GEOIP anymoreLogstash and Maxmind: not just for GEOIP anymore
Logstash and Maxmind: not just for GEOIP anymore
 
Elasticsearch's aggregations & esctl in action or how i built a cli tool...
Elasticsearch's aggregations & esctl in action  or how i built a cli tool...Elasticsearch's aggregations & esctl in action  or how i built a cli tool...
Elasticsearch's aggregations & esctl in action or how i built a cli tool...
 
Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...
 Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex... Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...
Searching for NLP: Using Elasticsearch to Create MVPs of NLP-enabled User Ex...
 
Introduction to machine learning using Elastic
Introduction to machine learning using ElasticIntroduction to machine learning using Elastic
Introduction to machine learning using Elastic
 
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...Upgrade your attack model: finding and stopping fileless attacks with MITRE A...
Upgrade your attack model: finding and stopping fileless attacks with MITRE A...
 
Elastic Observability
Elastic Observability Elastic Observability
Elastic Observability
 
Threat hunting with Elastic APM
Threat hunting with Elastic APMThreat hunting with Elastic APM
Threat hunting with Elastic APM
 
Guide to Data Visualization in Kibana
Guide to Data Visualization in KibanaGuide to Data Visualization in Kibana
Guide to Data Visualization in Kibana
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
Esctl in action elastic user group presentation aug 25 2020
Esctl in action   elastic user group presentation aug 25 2020Esctl in action   elastic user group presentation aug 25 2020
Esctl in action elastic user group presentation aug 25 2020
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Examining OpenData with a Search Index using Elasticsearch

  • 1. Elastic: A Search Company Search. Observe. Protect. Richard Im March 2020
  • 2. Employees in 40+ countries Public company on NYSE
  • 3. Elastic is a search company.
  • 7. Elastic is a search company. We focus on value to users by producing fast results that operate at scale and are relevant. This is our DNA. We believe search is an experience. It is what defines us, and makes us unique. Speed, Scale, Relevance
  • 9. 3 solutions Elastic Enterprise Search Elastic SecurityElastic Observability
  • 10. Elastic Enterprise Search Workplace Search App Search Site Search
  • 11. Search everything, anywhere Easily implement powerful, modern search experiences across your website, app, or digital workplace. Search it all, simply. ELASTIC ENTERPRISE SEARCH
  • 12. ” Although Elasticsearch started as a search engine, it has grown into a powerful analytics engine in our e-commerce context, making product recommendations and alerting on order thresholds. “ ELASTIC ENTERPRISE SEARCH
  • 14. Unified visibility across your entire ecosystem Bring your logs, metrics, and traces together into a single stack so you can monitor, detect, and react to events with speed. ELASTIC OBSERVABILITY
  • 15. ” The Elastic Stack is critical to us. Every day millions of users and customers worldwide trust Box to execute mission-critical business functions. Elasticsearch has enabled the Observability team at Box to work with a reliable and cost effective logging system. “ ELASTIC OBSERVABILITY
  • 17. Security how it should be: open Elastic Security integrates endpoint security and SIEM to give you prevention, collection, detection, and response capabilities for unified protection across your infrastructure. ELASTIC SECURITY
  • 18. ” The Elastic Stack made it possible for us to build Fusion – our centralized cyber security & defense platform – and protect the bank and our customers from real-time threats all over the world. “ ELASTIC SECURITY
  • 19. ” Elastic Endpoint Security has dramatically dropped our mean time to remediate from seven days to 30 minutes over legacy antivirus, and the Elastic Stack has provided an unparalleled way to store, analyze, and react to data well beyond any competitor in the market. “ ELASTIC SECURITY
  • 20. Elastic Stack for Business Analytics
  • 21. Kibana Beats Logstash (KPI Processor) Elasticsearch (KPI cluster) Logs Metrics Packets ... Real world architecture SFDC Marketo BI Database Billing backend Core backend Dashboards ML Exploration Slack & SFDC notifications
  • 23. Answering business questions - ML & Alerting ● Increased/reduced capacity ● Regional data ● Proactively identifying anomalous behaviour ● Capacity forecast ● Alerting & Notification
  • 24. The need for business analytics Obvious...But nevertheless Starting points ● Many product metrics scattered across multiple data repositories Missing ● Need to ask “business questions” from multiple sources ● Need to track key metrics overtime ● Need quick access to ad-hoc queries, beyond pre-canned dashboards
  • 26. Analyze Share Explore Be notified Use cases for Business Analytics Control visualization Scripted field Filter ratio Bucket script Custom time range Lens Saved queries Dashboard sharing Dashboard export to CSV Canvas ML Anomaly detection ML Analysis 7.x new features
  • 27. Elastic Enterprise Search Elastic SecurityElastic Observability Kibana Elasticsearch Beats Logstash 3 solutions powered by 1 stack Elastic Stack
  • 28. The Elastic Stack Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
  • 29. SaaS Orchestration Elastic Cloud on Kubernetes Elastic Cloud Elastic Cloud Enterprise Elastic Enterprise Search Elastic SecurityElastic Observability Kibana Elasticsearch Beats Logstash Deploy anywhere. Powered by the stack 3 solutions Deployed anywhere
  • 30. Family of SaaS Offerings Deploy, operate, and scale Elastic products and solutions in the cloud, on a cloud provider of your choosing. ELASTIC CLOUD
  • 31. Centrally manage your Elastic deployments Provision, manage, and monitor Elastic products and solutions, at any scale, on any infrastructure, while managing everything from a single console. ELASTIC CLOUD ENTERPRISE
  • 32. Official Operator, and much more Simplify setup, upgrades, snapshots, scaling, high availability, security, and more when running Elastic products and solutions on Kubernetes. ELASTIC CLOUD ON KUBERNETES
  • 33. ELASTIC CLOUD Subscription Options FREE PAID Open Source Features Free Proprietary Features Paid Proprietary Features + Elastic Support PAID OPEN SOURCE BASIC GOLD PLATINUM ENTERPRISE SELF-MANAGEDSaaS
  • 34. Endpoint Security No endpoint-based pricing SIEM No seat/ingest-based pricing APM No agent-based pricing Metrics No host-based pricing Logs No ingest-based pricing App Search No docs-based pricing Site Search No query-based pricing Resource-based Pricing Workplace Search No user-based pricing Elastic Enterprise Search Elastic SecurityElastic Observability
  • 35. Elastic is a Search Company. www.elastic.co Thank You
  • 36. Safe Harbor Statement This presentation includes forward-looking statements that are subject to risks and uncertainties. Actual results may differ materially as a result of various risk factors included in the reports on the Forms 10-K, 10-Q, and 8-K, and in other filings we make with the SEC from time to time.Elastic undertakes no obligation to update any of these forward-looking statements.