SlideShare a Scribd company logo
1
ElasticON Security
Thorben Jändling - Senior Solutions Architect (EMEA
in the Global Security Specialists Group at Elastic
Get Full Visibility
2
Thorben Jändling
Senior Solutions Architect
in the
Global Security Specialist Group
@ Elastic.co
Career as a Security Engineer for various national CSIRTs
https://www.linkedin.com/in/thorbenj/
thorbenj@elastic.co
eMail
@thorbenj on elasticstack.slack.com
Blind spots are everywhere
Every person and every asset is
a target
5 1B 5
Data Domains
Practitioners analyze
endpoint, cloud,
network, application,
user, and more!
Events Per Day
Most organizations
average 1 billion
events per day
SOC Analysts
Security Operation
Centers vary in size,
but most have less
than 5 analysts
THE DATA DILEMMA
5 1B 5
Data Domains
Practitioners analyze
endpoint, cloud,
network, application,
user, and more!
Events Per Day
Most organizations
average 1 billion
events per day
SOC Analysts
Security Operation
Centers vary in size,
but most have less
than 5 analysts
THE DATA DILEMMA
5 1B 5
Data Domains
Practitioners analyze
endpoint, cloud,
network, application,
user, and more!
Events Per Day
Most organizations
average 1 billion
events per day
SOC Analysts
Security Operation
Centers vary in size,
but most have less
than 5 analysts
THE DATA DILEMMA
Solve the dilemma by answering 4 key questions
What data do I need to collect?
1
Now that I have it, how do I manage the data?
3
How do I make it actionable?
4
How do I get that data?
2
9
9
Elastic Solutions built on the Elastic Stack
• App Search
• Site Search
• Workplace Search
Enterprise Search
• Logs
• Metrics
• Service Monitoring
• Application Performance
Observability
• SIEM
• Endpoint Security
Security
Elastic Stack
Kibana
Beats Logstash
Elasticsearch
EPP
Development
Team
Ops: Log
Monitoring
Availability
Response Time
Uptime Tool
Ops: Infra
Monitoring
Web Logs
App Logs
Database Logs
Container Logs
Log Tool
Real User Mon.
Txn Perf Mon.
Dist. Tracing
APM Tool
Ops: Service
Monitoring
Container Metrics
Host Metrics
Database Metics
Network Metrics
Storage Metrics
Metrics Tool
Business KPIs
Business Tool
Business
Team
Typical observability stack
Dev, Ops, Sec and Business Teams
Elastic approach to observability
APM Data Uptime Data
Metrics Data
Log Data Business Data
All your operational data in a single powerful datastore — Elasticsearch
Kibana
Elasticsearch
What data do I need
to collect?
• MITRE ATT&CK™ provides the
data sources required to detect
250 adversary techniques
• There are 50 unique data
sources
• Examples include, “Process
Monitoring”, “DNS Records”,
“Authentication Logs”, and more!
What data do I need
to collect?
• MITRE ATT&CK™ provides the
data sources required to detect
250 adversary techniques
• There are 50 unique data
sources
• Examples include, “Process
Monitoring”, “DNS Records”,
“Authentication Logs”, and more!
Solve the dilemma by answering 4 key questions
What data do I need to collect?
1
Now that I have it, how do I manage the data?
3
How do I make it actionable?
4
How do I get that data?
2
Data Source Integrations
Easily normalise and ingest your data
https://www.elastic.co/integrations
Endpoint Security with Elastic Agent
Unified agent for logs, metrics, security and more
BEFORE five+ agents
on every host
Filebeat for logs
Metricbeat for metrics
Winlogbeat for Windows events
plus sysmon
Heartbeat for uptime
APM agent for app traces
NOW one agent
on every host
Elastic Agent for logs, metrics,
and security; including:
Endpoint Security for EPP
and kernel level event collection
(no sysmon needed)
Elastic Agent
• Centrally manage
all data collection
and endpoint
protection
Elastic Agent
• Single click
integration
of data sources
Elastic Agent
• Customizable
configurations
for complete
control and
configurability.
Elastic Agent
• Endpoint Security
to protect your
endpoints and
collect security
events.
Solve the dilemma by answering 4 key questions
What data do I need to collect?
1
Now that I have it, how do I manage the data?
3
How do I make it actionable?
4
How do I get that data?
2
Elastic Security
• A single application
for data analysis
across all data
domains and
sources
Elastic Security
• Flexible storage tiers
Elastic Security
• Configurable data
lifecycle management
Elastic Security
• No penalties
for adding data
sources, endpoints
or ingesting data
Elastic Stack
Elastic Security
• Elastic
Common
Schema
Elastic Common Schema (ECS)
How data is normalized inside Elastic
Defines a common set of fields and
objects to ingest data into
Elasticsearch
Enables cross-source analysis of
diverse data
Designed to be extensible
ECS is adopted throughout the
Elastic Stack
Contributions & feedback welcome
at https://github.com/elastic/ecs
Searching without ECS
src:10.42.42.42
OR client_ip:10.42.42.42
OR apache2.access.remote_ip:
10.42.42.42
OR context.user.ip:10.42.42.42
OR src_ip:10.42.42.42
Searching with ECS
source.ip:10.42.42.42
Solve the dilemma by answering 4 key questions
What data do I need to collect?
1
Now that I have it, how do I manage the data?
3
How do I make it actionable?
4
How do I get that data?
2
Threat Hunting
• Proactively Search
for threats
Threat Hunting
• Customisable
timeline templates
to empower even
the most junior
analysts.
Threat Hunting
• Document your
investigation with
integrated case
management
Automated
Detection
• Speed and scale
of Elasticsearch to
detect known and
unknown threats
Automated
Detection
• Easily automate
threat detection
using
Search Queries,
Machine Learning,
Thresholds,
EQL Correlation and
(threat) Indicator
Matching!
Automated
Detection
• 450 built-in
detections;
built in the open
by our Protections
team together with
our community
Threat Prevention
• Kernel Level data
collection enables
deep visibility
Threat Prevention
• Protect your
Windows, macOS,
and Linux hosts.
Threat Prevention
• Prevent malware
without signatures
using modern ML
technologies &
behaviour analytics
Demo
Data Dilemma Solved by Elastic Security
Common framework for data collection
1
Configurable data management with an open standard for
analysis
3
Actionable Data - Threat Hunting, Automated Detection, Threat
Prevention
4
Single agent for data collection and endpoint protection
2
Try free on Cloud:
ela.st/security-trial
Take a quick spin:
demo.elastic.co
Connect on Slack:
ela.st/slack
Join the Elastic Security community
Thank You
Search. Observe. Protect.
Safe Harbor Statement
This presentation includes forward-looking statements that are subject to
risks and uncertainties. Actual results may differ materially as a result of
various risk factors included in the reports on the Forms 10K, 10Q, and
8K, and in other filings we make with the SEC from time to time. Elastic
undertakes no obligation to update any of these forward-looking
statements.
Thank You
Search. Observe. Protect.
STOP HERE
44
Closing slide
This presentation includes forward-looking
statements that are subject to risks and
uncertainties. Actual results may differ materially
as a result of various risk factors included in the
reports on the Forms 10-K, 10-Q, and 8-K, and in
other filings we make with the SEC from time to
time. Elastic undertakes no obligation to update
any of these forward-looking statements.
Elastic Security
• A single application for data
analysis across all data domains
and sources
• Configurable data lifecycle
management
• Elastic Common Schema
• No penalties for adding data
sources, endpoints or ingesting
data
• Flexible Storage Tiers
Bullet title (Inter 24 pt)
• Try to keep your use of bullet slides to a minimum
• Be creative and think visually
• If you need to source something copy and paste the text box at the
bottom left onto your page
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
– Second-line bullets are Inter 14pt
• Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Bullet title (Inter 24 pt)
• Try to keep your use of bullet slides to a minimum
• Be creative and think visually
• If you need to source something copy and paste the text box at the
bottom left onto your page
Subtitle sentence case (Inter 18pt)
Bullet slide title treatment can be up to two lines in
length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
‒ Second-line bullets are Inter 14pt
‒ Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Subtitle sentence case (Inter 18pt)
Place a quote from someone
really, really important and it will
shrink to fit this space…
Author Name Here
Author Name Here
Place a quote from someone
really, really important and it will
shrink to fit this space…
Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Pie Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
62%
Supporting text
goes here under
the number
62%
Supporting text
goes here under
the number
Pie Chart Slide With Multiple Colors
Sub-title or chart title here in sentence case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title Goes
Here and Can Be a Few
Lines Long
Subtitle goes here in sentence
case
Transition Slide Title
Short and Sweet
1M 1M 1M
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
Big Number Treatment
1M 1M 1M
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
HEADER HERE
Supporting text
goes here under
the number
Big Number Treatment (Dark Mode)
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 1
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 2
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 3
Table Layout Treatment
Subtitle text placeholder sentence case
HEADER HEADER HEADER HEADER
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Information Information Information Information
Option 4
Please use this area
for content, screen
shot, or quote; the
next few slide show
examples
Please use this area
for content, screen
shot, or quote; the
next few slide show
examples
We mine and analyze
4 billion events every
day to detect security
hacks and threats.
We mine and analyze
4 billion events every
day to detect security
hacks and threats.
Searching for
Rides
73
With organic logging growing 50%
year over year, and monitoring
infrastructure spend at nearly 10%,
one rogue log can ruin the platform.
The checks and balances necessary
to make sure we don’t hit that
roadblock are built with the Elastic
Stack and Beats.
TEXT GOES HERE IN ALL CAPS
Additional text goes here to support the content and can
be a couple lines in length and sits bottom left aligned
74
With organic logging growing 50%
year over year, and monitoring
infrastructure spend at nearly 10%,
one rogue log can ruin the
platform. The checks and balances
necessary to make sure we don’t
hit that roadblock are built with the
Elastic Stack and Beats.
TEXT GOES HERE IN ALL CAPS
Additional text goes here to support the content and can
be a couple lines in length and sits bottom left aligned
”
The Elastic Stack is critical to us. Every day
millions of users and customers worldwide
trust Box to execute mission-critical
business functions.
“
Some text can go here
Some text can go here
You can use
this area for a
text treatment
that supports
your chosen
imagery
You can use
this area for a
text treatment
that supports
your chosen
imagery
Slide Title Here With
a Few Bullets
Subtitle goes here
• Bullet one goes here in
sentence case and no period
• Bullets should be kept short
and sweet; stay focused
• Use bullets to help break up
content that you need to
have on the screen
Slide Title Here With
a Few Bullets
Subtitle goes here
● Bullet one goes here in
sentence case and no
period
● Bullets should be kept short
and sweet; stay focused
● Use bullets to help break up
content that you need to
have on the screen
Slide Title Here
With Key Points
Subtitle goes here
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
LOGGING METRICS APM
ADVANCED
SEARCH
SECURITY
ANALYTICS
DATA
SCIENCE
FOUNDATION
SPECIALIZATIONS
Slide Title Here
With Key Points
Subtitle goes here
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Header Here
Body copy goes here and just increase the
indent level to get to the proper formatting
Image Treatment With Caption Layout
How to add your own photos and crop properly…
Your image will populate the
container but you will likely need
to adjust the crop. Double click
on the image to adjust. Use the
blue dots to adjust the size.
Click on the grayed out portion
of the image and drag to the
left or right until you are happy
with the crop.
1 2 3
Right click on the image and go
to replace image. Select a new
image from your machine.
You can use
this area for a
text treatment
that supports
your chosen
imagery
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
1
Enter title for section three here and use sentence case
3
Enter title for section four here and use sentence case
4
Enter title for section five here and use sentence case
5
Enter title for section two here and use sentence case
2
Option 1A
NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt)
• Bullets are sentence case (Inter 18pt)
○ Second-line bullets are Inter 14pt
■ Third-line bullets are Inter 12pt
• Limit the number of bullets on a slide
• Text highlights are orange, but not underlined
• Try not to go below the recommended font sizes
Subtitle sentence case (Inter 18pt)
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
1
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
Enter title for section two here and use sentence case
2
Option 1B
NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
3
4
5
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 2
NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 3
NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Agenda Slide
Use color to highlight
Enter title for section one here and use sentence case
Enter title for section two here and use sentence case
Enter title for section three here and use sentence case
Enter title for section four here and use sentence case
Enter title for section five here and use sentence case
1
2
3
4
5
Option 4
NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS.
ALWAYS START A NEW PRESENTATION USING THE
CORPORATE TEMPLATE AND ADD YOUR CONTENT
TO THIS SLIDE.
Process Diagram Treatment, 5 Ideas
See style page for more color options
1 2 3 4 5
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas + Highlight
See style page for more color options
1 2 3 4 5
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 4 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 4 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
Supporting text
goes here under
the number
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas
See style page for more color options
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
5
Supporting text
goes here under
the number
Process Diagram Treatment, 5 Ideas + Highlight
See style page for more color options
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
1 2 3 4 5
Process Diagram Treatment, 4 Ideas
See style page for more color options
1 2 3 4
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Process Diagram Treatment, 3 Ideas
See style page for more color options
1 2 3
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Supporting text
goes here under
the number
Title Here Title Here Title Here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Box With Bullet Treatment
Title Here Title Here Title Here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Box With Bullet Treatment with Color Choice
• One bullet here
• Two bullet here
• Three bullet here
Title Here
• One bullet here
• Two bullet here
• Three bullet here
Title Here
• One bullet here
• Two bullet here
• Three bullet here
Title Here
Box Bullet Treatment
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
• One bullet here
• Two bullet here
• Three bullet here
Title Here Title Here Title Here
Box Bullet Treatment with Color Scheme
Thank You
Search. Observe. Protect.
Screenshot Treatment With Browser Window
How to drop in your screen shot…
The browser window is like a
frame so anything you drop
behind it will show through.
Drop in your screen shot, go
to the format menu and crop
it to show only what you
want.
2
Last, be sure to right click on
your screen shot, go to order
and send to back.
3
1
Screenshot Treatment With Title and Browser Window
NOTE USE THIS LAYOUT
FOR PLACING ONE FULL
BLEED SCREENSHOT
Use This Slide for Code, Light Version
Use template colors to highlight
curl –XPUT localhost:9200/
_template/twitter –d ‘
{
“template” : “twitter_*”,
“setting” : {
“number_of_shards” : 4,
“number_of_replicas” : 1
}
}’
Use This Slide for Code, Dark Version
Use template colors to highlight
curl –XPUT localhost:9200/
_template/twitter –d ‘
{
“template” : “twitter_*”,
“setting” : {
“number_of_shards” : 4,
“number_of_replicas” : 1
}
}’
Color Palette
254
197
20
47
67
145
250
115
79
240
78
152
151
156
171
67
71
83
0
119
204
0
191
179
PRIMARY
Styles and Treatments
SHAPES
LOGOS
Please use logos according
to brand guidelines. These
logos can be sized up and
down without losing quality.
Please press shift before
sizing to keep proper
proportions.
Various template colors can
be used for shapes. Shapes
should have a 3pt line stroke.
Video or Large Image Treatment
Sub header goes here
Search. Observe. Protect.
3 solutions
Elastic Enterprise Search Elastic Security
Elastic Observability
Elastic Enterprise Search
Workplace Search App Search Site Search
Elastic Observability
Logs Metrics APM Uptime
Endpoint SIEM
Elastic Security
3 solutions powered by 1 stack
Kibana
Elasticsearch
Beats Logstash
Elastic Stack
Elastic Enterprise Search Elastic Security
Elastic Observability
The Elastic Stack
Reliably and securely take data from
any source, in any format, then search,
analyze, and visualize it in real time.
Deploy anywhere.
SaaS Orchestration
Elastic Cloud
on Kubernetes
Elastic Cloud Elastic Cloud
Enterprise
Elastic Enterprise Search Elastic Security
Elastic Observability
Kibana
Elasticsearch
Beats Logstash
Powered by
the stack
3 solutions
Deployed
anywhere
Deploy anywhere.
SaaS Orchestration
Elastic Cloud
on Kubernetes
Elastic Cloud Elastic Cloud
Enterprise
Elastic Enterprise Search Elastic Security
Elastic Observability
Kibana
Elasticsearch
Beats Logstash
Powered by
the stack
3 solutions
Deployed
anywhere
Deploy anywhere.
SaaS Orchestration
Elastic Cloud Elastic Cloud on
Kubernetes
Elastic Cloud
Enterprise
Subscription Options
ELASTIC CLOUD
FREE PAID
Open Source
Features
Free Proprietary
Features
Paid Proprietary Features
+
Elastic Support
PAID
OPEN SOURCE BASIC GOLD PLATINUM ENTERPRISE
SELFMANAGED
SaaS
Resource-based Pricing
Endpoint Security
No endpoint-based pricing
SIEM
No seat/ingest-based pricing
APM
No agent-based pricing
Metrics
No host-based pricing
Logs
No ingest-based pricing
App Search
No docs-based pricing
Site Search
No query-based pricing
Workplace Search
No user-based pricing
Elastic Enterprise Search Elastic Security
Elastic Observability
31 Solution Logos
ENTERPRISE
SEARCH
OBSERVABILITY SECURITY
Elastic Logo + Tagline
FULL COLOR
REVERSE
Solution Logo Lockups
Solution Logo Lockups
Product Logos
ELASTIC CLOUD
ON KUBERNETES
ECK
KIBANA LOGSTASH
ELASTICSEARCH
BEATS ELASTIC CLOUD
ELASTIC
CLOUD
ENTERPRISE
Product Logos
APM
APP SEARCH
WORKPLACE
SEARCH
METRICS SIEM
LOGS
SITE SEARCH ENDPOINT
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Product Logo Lockups
Iconography Usage
Product Feature Icons
Do not use these icons for
anything other than what
they are created for.
Product Feature Icons are created
to correlate with a specific feature
within the product and are not
flexible in use. Please see labels as
a guide.
Generic Icons
These icons are made to fit across
multiple concepts within reason.
See labels as a general guide.
Please use discretion.
Training Icons
Do not use these icons for
anything other than what
they are created for.
Training Icons are created to
correlate with a specific feature
within the training relm and are not
flexible in use. Please see labels as
a guide.
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specialization
Engineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea chart
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specialization
Engineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea chart
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specialization
Engineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea chart
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection
Feature Icons
winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index
management
Life cycle
management
create single job create advanced
job
create multi
metric job
create population
job
machine
learning
advanced
settings
apm sql visualize dashboards
canvas upgrade assistant management security analytics add data search
profiler
users and
roles
saved objects reporting security settings
grok debugger language clients infra console discover dev tools watcher rollups cross cluster
replication
data visualizer
metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
Training Icons
apm metrics Security analytics logging
specialization
Engineering 1 Engineering 2 certification Advanced search Data science
subscription on-demand Instructor led
stack
Generic Icons
training support subscription
customers
structured schema schemaless rapid query
execution
sql No sql Horizontal scale
flexible data
model
downloads custom consulting community community
members
Sophisticated query
language
node idea Light bulb
news user reliable extensible upgrade IoT plugin scale real-time high-five
location distributed visibility plan E commerce family vacation presentation education guide book
benefits certificate video contribution target Health monitor overlap conversation speaker government
Generic Icons
To do Source code Color outside
of the lines
blog Send
message
docs mobile browser Love
letter
connection

More Related Content

What's hot

Integrating advanced analytics with Elasticsearch
Integrating advanced analytics with ElasticsearchIntegrating advanced analytics with Elasticsearch
Integrating advanced analytics with Elasticsearch
Elasticsearch
 
Microsoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applicationsMicrosoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applications
Elasticsearch
 
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Elasticsearch
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
Elasticsearch
 
Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and visionKeynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and vision
Elasticsearch
 
Elastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environments
Elasticsearch
 
Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesAutomate threat detections and avoid false positives
Automate threat detections and avoid false positives
Elasticsearch
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Elasticsearch
 
Centralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLACentralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLA
Elasticsearch
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
Elasticsearch
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite ElasticElastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elasticsearch
 
ECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and ComplianceECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and Compliance
Elasticsearch
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
Elasticsearch
 
Advanced correlations for threat detection and more
Advanced correlations for threat detection and moreAdvanced correlations for threat detection and more
Advanced correlations for threat detection and more
Elasticsearch
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
Elasticsearch
 
Automate Your Container Deployments Securely
Automate Your Container Deployments SecurelyAutomate Your Container Deployments Securely
Automate Your Container Deployments Securely
DevOps.com
 
Infrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insightInfrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insight
Elasticsearch
 
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiKubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Yusuf Hadiwinata Sutandar
 
Keynote: Elastic Observability evolution and vision
  Keynote: Elastic Observability evolution and vision  Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and vision
Elasticsearch
 
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic StackSiscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Elasticsearch
 

What's hot (20)

Integrating advanced analytics with Elasticsearch
Integrating advanced analytics with ElasticsearchIntegrating advanced analytics with Elasticsearch
Integrating advanced analytics with Elasticsearch
 
Microsoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applicationsMicrosoft: Enterprise search for cloud native applications
Microsoft: Enterprise search for cloud native applications
 
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
 
Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and visionKeynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and vision
 
Elastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environmentsElastic and Google: Observability for multicloud and hybrid environments
Elastic and Google: Observability for multicloud and hybrid environments
 
Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesAutomate threat detections and avoid false positives
Automate threat detections and avoid false positives
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
Centralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLACentralized logging in a changing environment at the UK’s DVLA
Centralized logging in a changing environment at the UK’s DVLA
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite ElasticElastic Security : Protéger son entreprise avec la Suite Elastic
Elastic Security : Protéger son entreprise avec la Suite Elastic
 
ECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and ComplianceECS: Delivering Better Cyber Intelligence and Compliance
ECS: Delivering Better Cyber Intelligence and Compliance
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
 
Advanced correlations for threat detection and more
Advanced correlations for threat detection and moreAdvanced correlations for threat detection and more
Advanced correlations for threat detection and more
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
 
Automate Your Container Deployments Securely
Automate Your Container Deployments SecurelyAutomate Your Container Deployments Securely
Automate Your Container Deployments Securely
 
Infrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insightInfrastructure monitoring made easy, from ingest to insight
Infrastructure monitoring made easy, from ingest to insight
 
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with KialiKubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
 
Keynote: Elastic Observability evolution and vision
  Keynote: Elastic Observability evolution and vision  Keynote: Elastic Observability evolution and vision
Keynote: Elastic Observability evolution and vision
 
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic StackSiscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
 

Similar to Get full visibility and find hidden security issues

Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Elasticsearch
 
CJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment InstructionCJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment Instruction
VinaOconner450
 
TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)
Mike Felch
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security data
markgrover
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
Mirantis
 
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
ALTER WAY
 
As You Seek – How Search Enables Big Data Analytics
As You Seek – How Search Enables Big Data AnalyticsAs You Seek – How Search Enables Big Data Analytics
As You Seek – How Search Enables Big Data Analytics
Inside Analysis
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
Prabath Siriwardena
 
Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)
Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)
Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)
Elasticsearch
 
Dell Digital Transformation Through AI and Data Analytics Webinar
Dell Digital Transformation Through AI and  Data Analytics WebinarDell Digital Transformation Through AI and  Data Analytics Webinar
Dell Digital Transformation Through AI and Data Analytics Webinar
Bill Wong
 
2017 bio it world
2017 bio it world2017 bio it world
2017 bio it world
Chris Dwan
 
Solving Cybersecurity at Scale
Solving Cybersecurity at ScaleSolving Cybersecurity at Scale
Solving Cybersecurity at Scale
DataWorks Summit
 
Initiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AIInitiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AI
Amazon Web Services
 
Declarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemTDeclarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemT
Laura Chiticariu
 
AWS Sydney Summit 2013 - Big Data Analytics
AWS Sydney Summit 2013 - Big Data AnalyticsAWS Sydney Summit 2013 - Big Data Analytics
AWS Sydney Summit 2013 - Big Data Analytics
Amazon Web Services
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Cambridge Semantics
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
SaraPia5
 
Elasticsearch in Netflix
Elasticsearch in NetflixElasticsearch in Netflix
Elasticsearch in Netflix
Danny Yuan
 
The information supernova
The information supernovaThe information supernova
The information supernova
Alaa Al-Agamawi
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics
DATAVERSITY
 

Similar to Get full visibility and find hidden security issues (20)

Obtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultosObtén visibilidad completa y encuentra problemas de seguridad ocultos
Obtén visibilidad completa y encuentra problemas de seguridad ocultos
 
CJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment InstructionCJUS 703Biblical Worldview of Corrections Assignment Instruction
CJUS 703Biblical Worldview of Corrections Assignment Instruction
 
TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)
 
Amundsen: From discovering to security data
Amundsen: From discovering to security dataAmundsen: From discovering to security data
Amundsen: From discovering to security data
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
 
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
 
As You Seek – How Search Enables Big Data Analytics
As You Seek – How Search Enables Big Data AnalyticsAs You Seek – How Search Enables Big Data Analytics
As You Seek – How Search Enables Big Data Analytics
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)
Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)
Replicate Elasticsearch Data with Cross-Cluster Replication (CCR)
 
Dell Digital Transformation Through AI and Data Analytics Webinar
Dell Digital Transformation Through AI and  Data Analytics WebinarDell Digital Transformation Through AI and  Data Analytics Webinar
Dell Digital Transformation Through AI and Data Analytics Webinar
 
2017 bio it world
2017 bio it world2017 bio it world
2017 bio it world
 
Solving Cybersecurity at Scale
Solving Cybersecurity at ScaleSolving Cybersecurity at Scale
Solving Cybersecurity at Scale
 
Initiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AIInitiate Edinburgh 2019 - Big Data Meets AI
Initiate Edinburgh 2019 - Big Data Meets AI
 
Declarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemTDeclarative Multilingual Information Extraction with SystemT
Declarative Multilingual Information Extraction with SystemT
 
AWS Sydney Summit 2013 - Big Data Analytics
AWS Sydney Summit 2013 - Big Data AnalyticsAWS Sydney Summit 2013 - Big Data Analytics
AWS Sydney Summit 2013 - Big Data Analytics
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Elasticsearch in Netflix
Elasticsearch in NetflixElasticsearch in Netflix
Elasticsearch in Netflix
 
The information supernova
The information supernovaThe information supernova
The information supernova
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics
 

More from Elasticsearch

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
Elasticsearch
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
Elasticsearch
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios web
Elasticsearch
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
Elasticsearch
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.
Elasticsearch
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Elasticsearch
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
Elasticsearch
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of find
Elasticsearch
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiences
Elasticsearch
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified search
Elasticsearch
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisiones
Elasticsearch
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud
Elasticsearch
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
Elasticsearch
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insights
Elasticsearch
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
Elasticsearch
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
Elasticsearch
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public good
Elasticsearch
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and Elastic
Elasticsearch
 
クローラーを迅速に入手:効果的なWebクローラーの作成方法
クローラーを迅速に入手:効果的なWebクローラーの作成方法クローラーを迅速に入手:効果的なWebクローラーの作成方法
クローラーを迅速に入手:効果的なWebクローラーの作成方法
Elasticsearch
 
どこにいてもWorkplace Searchで何でも検索
どこにいてもWorkplace Searchで何でも検索どこにいてもWorkplace Searchで何でも検索
どこにいてもWorkplace Searchで何でも検索
Elasticsearch
 

More from Elasticsearch (20)

An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
From MSP to MSSP using Elastic
From MSP to MSSP using ElasticFrom MSP to MSSP using Elastic
From MSP to MSSP using Elastic
 
Cómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios webCómo crear excelentes experiencias de búsqueda en sitios web
Cómo crear excelentes experiencias de búsqueda en sitios web
 
Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas Te damos la bienvenida a una nueva forma de realizar búsquedas
Te damos la bienvenida a una nueva forma de realizar búsquedas
 
Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.Plongez au cœur de la recherche dans tous ses états.
Plongez au cœur de la recherche dans tous ses états.
 
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
 
An introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolboxAn introduction to Elasticsearch's advanced relevance ranking toolbox
An introduction to Elasticsearch's advanced relevance ranking toolbox
 
Welcome to a new state of find
Welcome to a new state of findWelcome to a new state of find
Welcome to a new state of find
 
Building great website search experiences
Building great website search experiencesBuilding great website search experiences
Building great website search experiences
 
Keynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified searchKeynote: Harnessing the power of Elasticsearch for simplified search
Keynote: Harnessing the power of Elasticsearch for simplified search
 
Cómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisionesCómo transformar los datos en análisis con los que tomar decisiones
Cómo transformar los datos en análisis con los que tomar decisiones
 
Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud Explore relève les défis Big Data avec Elastic Cloud
Explore relève les défis Big Data avec Elastic Cloud
 
Comment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitablesComment transformer vos données en informations exploitables
Comment transformer vos données en informations exploitables
 
Transforming data into actionable insights
Transforming data into actionable insightsTransforming data into actionable insights
Transforming data into actionable insights
 
Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?Opening Keynote: Why Elastic?
Opening Keynote: Why Elastic?
 
Empowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside GovernmentEmpowering agencies using Elastic as a Service inside Government
Empowering agencies using Elastic as a Service inside Government
 
The opportunities and challenges of data for public good
The opportunities and challenges of data for public goodThe opportunities and challenges of data for public good
The opportunities and challenges of data for public good
 
Enterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and ElasticEnterprise search and unstructured data with CGI and Elastic
Enterprise search and unstructured data with CGI and Elastic
 
クローラーを迅速に入手:効果的なWebクローラーの作成方法
クローラーを迅速に入手:効果的なWebクローラーの作成方法クローラーを迅速に入手:効果的なWebクローラーの作成方法
クローラーを迅速に入手:効果的なWebクローラーの作成方法
 
どこにいてもWorkplace Searchで何でも検索
どこにいてもWorkplace Searchで何でも検索どこにいてもWorkplace Searchで何でも検索
どこにいてもWorkplace Searchで何でも検索
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 

Get full visibility and find hidden security issues

  • 1. 1 ElasticON Security Thorben Jändling - Senior Solutions Architect (EMEA in the Global Security Specialists Group at Elastic Get Full Visibility
  • 2. 2 Thorben Jändling Senior Solutions Architect in the Global Security Specialist Group @ Elastic.co Career as a Security Engineer for various national CSIRTs https://www.linkedin.com/in/thorbenj/ thorbenj@elastic.co eMail @thorbenj on elasticstack.slack.com
  • 3. Blind spots are everywhere
  • 4. Every person and every asset is a target
  • 5. 5 1B 5 Data Domains Practitioners analyze endpoint, cloud, network, application, user, and more! Events Per Day Most organizations average 1 billion events per day SOC Analysts Security Operation Centers vary in size, but most have less than 5 analysts THE DATA DILEMMA
  • 6. 5 1B 5 Data Domains Practitioners analyze endpoint, cloud, network, application, user, and more! Events Per Day Most organizations average 1 billion events per day SOC Analysts Security Operation Centers vary in size, but most have less than 5 analysts THE DATA DILEMMA
  • 7. 5 1B 5 Data Domains Practitioners analyze endpoint, cloud, network, application, user, and more! Events Per Day Most organizations average 1 billion events per day SOC Analysts Security Operation Centers vary in size, but most have less than 5 analysts THE DATA DILEMMA
  • 8. Solve the dilemma by answering 4 key questions What data do I need to collect? 1 Now that I have it, how do I manage the data? 3 How do I make it actionable? 4 How do I get that data? 2
  • 9. 9 9 Elastic Solutions built on the Elastic Stack • App Search • Site Search • Workplace Search Enterprise Search • Logs • Metrics • Service Monitoring • Application Performance Observability • SIEM • Endpoint Security Security Elastic Stack Kibana Beats Logstash Elasticsearch EPP
  • 10. Development Team Ops: Log Monitoring Availability Response Time Uptime Tool Ops: Infra Monitoring Web Logs App Logs Database Logs Container Logs Log Tool Real User Mon. Txn Perf Mon. Dist. Tracing APM Tool Ops: Service Monitoring Container Metrics Host Metrics Database Metics Network Metrics Storage Metrics Metrics Tool Business KPIs Business Tool Business Team Typical observability stack
  • 11. Dev, Ops, Sec and Business Teams Elastic approach to observability APM Data Uptime Data Metrics Data Log Data Business Data All your operational data in a single powerful datastore — Elasticsearch Kibana Elasticsearch
  • 12. What data do I need to collect? • MITRE ATT&CK™ provides the data sources required to detect 250 adversary techniques • There are 50 unique data sources • Examples include, “Process Monitoring”, “DNS Records”, “Authentication Logs”, and more!
  • 13. What data do I need to collect? • MITRE ATT&CK™ provides the data sources required to detect 250 adversary techniques • There are 50 unique data sources • Examples include, “Process Monitoring”, “DNS Records”, “Authentication Logs”, and more!
  • 14. Solve the dilemma by answering 4 key questions What data do I need to collect? 1 Now that I have it, how do I manage the data? 3 How do I make it actionable? 4 How do I get that data? 2
  • 15. Data Source Integrations Easily normalise and ingest your data https://www.elastic.co/integrations
  • 16. Endpoint Security with Elastic Agent Unified agent for logs, metrics, security and more BEFORE five+ agents on every host Filebeat for logs Metricbeat for metrics Winlogbeat for Windows events plus sysmon Heartbeat for uptime APM agent for app traces NOW one agent on every host Elastic Agent for logs, metrics, and security; including: Endpoint Security for EPP and kernel level event collection (no sysmon needed)
  • 17. Elastic Agent • Centrally manage all data collection and endpoint protection
  • 18. Elastic Agent • Single click integration of data sources
  • 19. Elastic Agent • Customizable configurations for complete control and configurability.
  • 20. Elastic Agent • Endpoint Security to protect your endpoints and collect security events.
  • 21. Solve the dilemma by answering 4 key questions What data do I need to collect? 1 Now that I have it, how do I manage the data? 3 How do I make it actionable? 4 How do I get that data? 2
  • 22. Elastic Security • A single application for data analysis across all data domains and sources
  • 24. Elastic Security • Configurable data lifecycle management
  • 25. Elastic Security • No penalties for adding data sources, endpoints or ingesting data Elastic Stack
  • 27. Elastic Common Schema (ECS) How data is normalized inside Elastic Defines a common set of fields and objects to ingest data into Elasticsearch Enables cross-source analysis of diverse data Designed to be extensible ECS is adopted throughout the Elastic Stack Contributions & feedback welcome at https://github.com/elastic/ecs Searching without ECS src:10.42.42.42 OR client_ip:10.42.42.42 OR apache2.access.remote_ip: 10.42.42.42 OR context.user.ip:10.42.42.42 OR src_ip:10.42.42.42 Searching with ECS source.ip:10.42.42.42
  • 28. Solve the dilemma by answering 4 key questions What data do I need to collect? 1 Now that I have it, how do I manage the data? 3 How do I make it actionable? 4 How do I get that data? 2
  • 29. Threat Hunting • Proactively Search for threats
  • 30. Threat Hunting • Customisable timeline templates to empower even the most junior analysts.
  • 31. Threat Hunting • Document your investigation with integrated case management
  • 32. Automated Detection • Speed and scale of Elasticsearch to detect known and unknown threats
  • 33. Automated Detection • Easily automate threat detection using Search Queries, Machine Learning, Thresholds, EQL Correlation and (threat) Indicator Matching!
  • 34. Automated Detection • 450 built-in detections; built in the open by our Protections team together with our community
  • 35. Threat Prevention • Kernel Level data collection enables deep visibility
  • 36. Threat Prevention • Protect your Windows, macOS, and Linux hosts.
  • 37. Threat Prevention • Prevent malware without signatures using modern ML technologies & behaviour analytics
  • 38. Demo
  • 39. Data Dilemma Solved by Elastic Security Common framework for data collection 1 Configurable data management with an open standard for analysis 3 Actionable Data - Threat Hunting, Automated Detection, Threat Prevention 4 Single agent for data collection and endpoint protection 2
  • 40. Try free on Cloud: ela.st/security-trial Take a quick spin: demo.elastic.co Connect on Slack: ela.st/slack Join the Elastic Security community
  • 41. Thank You Search. Observe. Protect. Safe Harbor Statement This presentation includes forward-looking statements that are subject to risks and uncertainties. Actual results may differ materially as a result of various risk factors included in the reports on the Forms 10K, 10Q, and 8K, and in other filings we make with the SEC from time to time. Elastic undertakes no obligation to update any of these forward-looking statements.
  • 44. 44 Closing slide This presentation includes forward-looking statements that are subject to risks and uncertainties. Actual results may differ materially as a result of various risk factors included in the reports on the Forms 10-K, 10-Q, and 8-K, and in other filings we make with the SEC from time to time. Elastic undertakes no obligation to update any of these forward-looking statements.
  • 45. Elastic Security • A single application for data analysis across all data domains and sources • Configurable data lifecycle management • Elastic Common Schema • No penalties for adding data sources, endpoints or ingesting data • Flexible Storage Tiers
  • 46. Bullet title (Inter 24 pt) • Try to keep your use of bullet slides to a minimum • Be creative and think visually • If you need to source something copy and paste the text box at the bottom left onto your page Subtitle sentence case (Inter 18pt)
  • 47. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) Subtitle sentence case (Inter 18pt) Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) – Second-line bullets are Inter 14pt • Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes
  • 48. Bullet title (Inter 24 pt) • Try to keep your use of bullet slides to a minimum • Be creative and think visually • If you need to source something copy and paste the text box at the bottom left onto your page Subtitle sentence case (Inter 18pt)
  • 49. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) ‒ Second-line bullets are Inter 14pt ‒ Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes Subtitle sentence case (Inter 18pt)
  • 50. Place a quote from someone really, really important and it will shrink to fit this space… Author Name Here
  • 51. Author Name Here Place a quote from someone really, really important and it will shrink to fit this space…
  • 52. Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 53. Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 54. Pie Chart Slide With Multiple Colors Sub-title or chart title here in sentence case 62% Supporting text goes here under the number 62% Supporting text goes here under the number
  • 55. Pie Chart Slide With Multiple Colors Sub-title or chart title here in sentence case
  • 56. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 57. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 58. Transition Slide Title Goes Here and Can Be a Few Lines Long Subtitle goes here in sentence case
  • 60. 1M 1M 1M HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number Big Number Treatment
  • 61. 1M 1M 1M HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number HEADER HERE Supporting text goes here under the number Big Number Treatment (Dark Mode)
  • 62. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 1
  • 63. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 2
  • 64. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 3
  • 65. Table Layout Treatment Subtitle text placeholder sentence case HEADER HEADER HEADER HEADER Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Information Option 4
  • 66.
  • 67. Please use this area for content, screen shot, or quote; the next few slide show examples
  • 68. Please use this area for content, screen shot, or quote; the next few slide show examples
  • 69. We mine and analyze 4 billion events every day to detect security hacks and threats.
  • 70. We mine and analyze 4 billion events every day to detect security hacks and threats.
  • 71.
  • 73. 73 With organic logging growing 50% year over year, and monitoring infrastructure spend at nearly 10%, one rogue log can ruin the platform. The checks and balances necessary to make sure we don’t hit that roadblock are built with the Elastic Stack and Beats. TEXT GOES HERE IN ALL CAPS Additional text goes here to support the content and can be a couple lines in length and sits bottom left aligned
  • 74. 74 With organic logging growing 50% year over year, and monitoring infrastructure spend at nearly 10%, one rogue log can ruin the platform. The checks and balances necessary to make sure we don’t hit that roadblock are built with the Elastic Stack and Beats. TEXT GOES HERE IN ALL CAPS Additional text goes here to support the content and can be a couple lines in length and sits bottom left aligned
  • 75. ” The Elastic Stack is critical to us. Every day millions of users and customers worldwide trust Box to execute mission-critical business functions. “
  • 76. Some text can go here Some text can go here
  • 77. You can use this area for a text treatment that supports your chosen imagery
  • 78. You can use this area for a text treatment that supports your chosen imagery
  • 79. Slide Title Here With a Few Bullets Subtitle goes here • Bullet one goes here in sentence case and no period • Bullets should be kept short and sweet; stay focused • Use bullets to help break up content that you need to have on the screen
  • 80. Slide Title Here With a Few Bullets Subtitle goes here ● Bullet one goes here in sentence case and no period ● Bullets should be kept short and sweet; stay focused ● Use bullets to help break up content that you need to have on the screen
  • 81. Slide Title Here With Key Points Subtitle goes here Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting LOGGING METRICS APM ADVANCED SEARCH SECURITY ANALYTICS DATA SCIENCE FOUNDATION SPECIALIZATIONS
  • 82. Slide Title Here With Key Points Subtitle goes here Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting Header Here Body copy goes here and just increase the indent level to get to the proper formatting
  • 83. Image Treatment With Caption Layout How to add your own photos and crop properly… Your image will populate the container but you will likely need to adjust the crop. Double click on the image to adjust. Use the blue dots to adjust the size. Click on the grayed out portion of the image and drag to the left or right until you are happy with the crop. 1 2 3 Right click on the image and go to replace image. Select a new image from your machine.
  • 84. You can use this area for a text treatment that supports your chosen imagery
  • 85. Agenda Slide Use color to highlight Enter title for section one here and use sentence case 1 Enter title for section three here and use sentence case 3 Enter title for section four here and use sentence case 4 Enter title for section five here and use sentence case 5 Enter title for section two here and use sentence case 2 Option 1A NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 86. Bullet slide title treatment can be up to two lines in length (Inter bold 24 pt) • Bullets are sentence case (Inter 18pt) ○ Second-line bullets are Inter 14pt ■ Third-line bullets are Inter 12pt • Limit the number of bullets on a slide • Text highlights are orange, but not underlined • Try not to go below the recommended font sizes Subtitle sentence case (Inter 18pt) Agenda Slide Use color to highlight Enter title for section one here and use sentence case 1 Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case Enter title for section two here and use sentence case 2 Option 1B NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE. 3 4 5
  • 87. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 2 NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 88. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 3 NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 89. Agenda Slide Use color to highlight Enter title for section one here and use sentence case Enter title for section two here and use sentence case Enter title for section three here and use sentence case Enter title for section four here and use sentence case Enter title for section five here and use sentence case 1 2 3 4 5 Option 4 NOTE THIS SLIDE IS NOT IN THE LAYOUT OPTIONS. ALWAYS START A NEW PRESENTATION USING THE CORPORATE TEMPLATE AND ADD YOUR CONTENT TO THIS SLIDE.
  • 90. Process Diagram Treatment, 5 Ideas See style page for more color options 1 2 3 4 5 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 91. Process Diagram Treatment, 5 Ideas + Highlight See style page for more color options 1 2 3 4 5 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 92. Process Diagram Treatment, 4 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 93. Process Diagram Treatment, 4 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 94. Process Diagram Treatment, 3 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 Supporting text goes here under the number Supporting text goes here under the number
  • 95. Process Diagram Treatment, 3 Ideas See style page for more color options Supporting text goes here under the number 1 2 3 Supporting text goes here under the number Supporting text goes here under the number
  • 96. Process Diagram Treatment, 5 Ideas See style page for more color options 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number 5 Supporting text goes here under the number
  • 97. Process Diagram Treatment, 5 Ideas + Highlight See style page for more color options Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number 1 2 3 4 5
  • 98. Process Diagram Treatment, 4 Ideas See style page for more color options 1 2 3 4 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 99. Process Diagram Treatment, 3 Ideas See style page for more color options 1 2 3 Supporting text goes here under the number Supporting text goes here under the number Supporting text goes here under the number
  • 100. Title Here Title Here Title Here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Box With Bullet Treatment
  • 101. Title Here Title Here Title Here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Box With Bullet Treatment with Color Choice
  • 102. • One bullet here • Two bullet here • Three bullet here Title Here • One bullet here • Two bullet here • Three bullet here Title Here • One bullet here • Two bullet here • Three bullet here Title Here Box Bullet Treatment
  • 103. • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here • One bullet here • Two bullet here • Three bullet here Title Here Title Here Title Here Box Bullet Treatment with Color Scheme
  • 105. Screenshot Treatment With Browser Window How to drop in your screen shot… The browser window is like a frame so anything you drop behind it will show through. Drop in your screen shot, go to the format menu and crop it to show only what you want. 2 Last, be sure to right click on your screen shot, go to order and send to back. 3 1
  • 106. Screenshot Treatment With Title and Browser Window
  • 107.
  • 108. NOTE USE THIS LAYOUT FOR PLACING ONE FULL BLEED SCREENSHOT
  • 109. Use This Slide for Code, Light Version Use template colors to highlight curl –XPUT localhost:9200/ _template/twitter –d ‘ { “template” : “twitter_*”, “setting” : { “number_of_shards” : 4, “number_of_replicas” : 1 } }’
  • 110. Use This Slide for Code, Dark Version Use template colors to highlight curl –XPUT localhost:9200/ _template/twitter –d ‘ { “template” : “twitter_*”, “setting” : { “number_of_shards” : 4, “number_of_replicas” : 1 } }’
  • 112. Styles and Treatments SHAPES LOGOS Please use logos according to brand guidelines. These logos can be sized up and down without losing quality. Please press shift before sizing to keep proper proportions. Various template colors can be used for shapes. Shapes should have a 3pt line stroke.
  • 113. Video or Large Image Treatment Sub header goes here
  • 115. 3 solutions Elastic Enterprise Search Elastic Security Elastic Observability
  • 116. Elastic Enterprise Search Workplace Search App Search Site Search
  • 119. 3 solutions powered by 1 stack Kibana Elasticsearch Beats Logstash Elastic Stack Elastic Enterprise Search Elastic Security Elastic Observability
  • 120. The Elastic Stack Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
  • 121. Deploy anywhere. SaaS Orchestration Elastic Cloud on Kubernetes Elastic Cloud Elastic Cloud Enterprise Elastic Enterprise Search Elastic Security Elastic Observability Kibana Elasticsearch Beats Logstash Powered by the stack 3 solutions Deployed anywhere
  • 122. Deploy anywhere. SaaS Orchestration Elastic Cloud on Kubernetes Elastic Cloud Elastic Cloud Enterprise Elastic Enterprise Search Elastic Security Elastic Observability Kibana Elasticsearch Beats Logstash Powered by the stack 3 solutions Deployed anywhere
  • 123. Deploy anywhere. SaaS Orchestration Elastic Cloud Elastic Cloud on Kubernetes Elastic Cloud Enterprise
  • 124. Subscription Options ELASTIC CLOUD FREE PAID Open Source Features Free Proprietary Features Paid Proprietary Features + Elastic Support PAID OPEN SOURCE BASIC GOLD PLATINUM ENTERPRISE SELFMANAGED SaaS
  • 125. Resource-based Pricing Endpoint Security No endpoint-based pricing SIEM No seat/ingest-based pricing APM No agent-based pricing Metrics No host-based pricing Logs No ingest-based pricing App Search No docs-based pricing Site Search No query-based pricing Workplace Search No user-based pricing Elastic Enterprise Search Elastic Security Elastic Observability
  • 126. 31 Solution Logos ENTERPRISE SEARCH OBSERVABILITY SECURITY Elastic Logo + Tagline FULL COLOR REVERSE
  • 129. Product Logos ELASTIC CLOUD ON KUBERNETES ECK KIBANA LOGSTASH ELASTICSEARCH BEATS ELASTIC CLOUD ELASTIC CLOUD ENTERPRISE
  • 130. Product Logos APM APP SEARCH WORKPLACE SEARCH METRICS SIEM LOGS SITE SEARCH ENDPOINT
  • 137. Iconography Usage Product Feature Icons Do not use these icons for anything other than what they are created for. Product Feature Icons are created to correlate with a specific feature within the product and are not flexible in use. Please see labels as a guide. Generic Icons These icons are made to fit across multiple concepts within reason. See labels as a general guide. Please use discretion. Training Icons Do not use these icons for anything other than what they are created for. Training Icons are created to correlate with a specific feature within the training relm and are not flexible in use. Please see labels as a guide.
  • 138. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 139. Training Icons apm metrics Security analytics logging specialization Engineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 140. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea chart news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 141. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection
  • 142. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 143. Training Icons apm metrics Security analytics logging specialization Engineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 144. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea chart news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 145. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection
  • 146. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 147. Training Icons apm metrics Security analytics logging specialization Engineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 148. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea chart news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 149. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection
  • 150. Feature Icons winlogbeat heartbeat packetbeat metricbeat functionbeat filebeat auditbeat index patterns Index management Life cycle management create single job create advanced job create multi metric job create population job machine learning advanced settings apm sql visualize dashboards canvas upgrade assistant management security analytics add data search profiler users and roles saved objects reporting security settings grok debugger language clients infra console discover dev tools watcher rollups cross cluster replication data visualizer metrics monitoring notebook logging spaces logstash pipeline gis application timelion graph --
  • 151. Training Icons apm metrics Security analytics logging specialization Engineering 1 Engineering 2 certification Advanced search Data science subscription on-demand Instructor led stack
  • 152. Generic Icons training support subscription customers structured schema schemaless rapid query execution sql No sql Horizontal scale flexible data model downloads custom consulting community community members Sophisticated query language node idea Light bulb news user reliable extensible upgrade IoT plugin scale real-time high-five location distributed visibility plan E commerce family vacation presentation education guide book benefits certificate video contribution target Health monitor overlap conversation speaker government
  • 153. Generic Icons To do Source code Color outside of the lines blog Send message docs mobile browser Love letter connection