Learn how Elastic Security has evolved to help SecOps teams take a broader, more inclusive approach to security and set their organizations up for success.
6. 6
Elastic Security helps us perform the threat
detection, continuous monitoring, and incident
response functions that we need to effectively
protect UC Davis … Since the solution is backed
by the security community’s continuing
contributions, we gain the capability to handle
the latest attacks.
“
11. 11
Safe Harbor
Statement
This presentation includes forward-looking
statements that are subject to risks and
uncertainties. Actual results may differ materially
as a result of various risk factors included in the
reports on the Forms 10-K, 10-Q, and 8-K, and in
other filings we make with the SEC from time to
time. Elastic undertakes no obligation to update
any of these forward-looking statements.
12. 12
If our mission is to
protect the world’s
data from attack, the
world needs access
to our software.
14. Over 350 million downloads
2,000 employees in 40 countries
IPO 2018, NYSE “ESTC”
Founded 2012
A Brief Overview
About Elastic
World’s #1 database
search engine (DBEngines)
17. Democratizing Security
Elastic for everyone
Build on the
free and open
Elastic (ELK
Stack
Release a free
and open SIEM
Eliminate
antiquated
pricing models
1 2 3 4 5
19. Democratizing Security
Elastic for everyone
Build on the
free and open
Elastic (ELK
Stack
Release a free
and open SIEM
Eliminate
antiquated
pricing models
Develop
protections in
the open with
the community
1 2 3 4 5
21. Democratizing Security
Elastic for everyone
Build on the
free and open
Elastic (ELK
Stack
Release a free
and open SIEM
Eliminate
antiquated
pricing models
Develop
protections in
the open with
the community
Release free
and open
endpoint
protection
1 2 3 4 5
22. Join the free and open
revolution
No gate, no barrier, no bullsh*t.
Security for all, from the makers
of the Elastic (ELK Stack
24. These are just some of our partners and community members. The presence of a vendor logo doesn’t imply a business relationship with Elastic.
Security orchestration,
automation, response
Security incident
response
General ticket & case
management
● Host sources
● Network sources
● Cloud platforms &
applications
● User activity sources
● SIEMs & centralized
security data stores
Community
Consulting
Education & training
Internal context
External context
Elastic Community
Scale your security program
—Logging Made Easy—
26. Monitoring and
Compliance
Threat
Prevention and
Detection
Hunting and
Incident
Response
• Managing your cyber risk
posture
• Continual visibility
expansion via data
ingestion and ECS focus
• Building on the heritage of
Elastic Endgame
• Continued expansion into
security domains
• Making all data actionable
across all time
• Reducing complexity,
making hunting part of any
analyst workflow
Expansion into Each Use Case
27. 27
Closing slide
This presentation includes forward-looking
statements that are subject to risks and
uncertainties. Actual results may differ materially
as a result of various risk factors included in the
reports on the Forms 10-K, 10-Q, and 8-K, and in
other filings we make with the SEC from time to
time. Elastic undertakes no obligation to update
any of these forward-looking statements.
28. 28
Try free on Cloud:
ela.st/security-trial
Take a quick spin:
demo.elastic.co
Connect on Slack:
ela.st/slack
Join the Elastic Security community