Elastic Security Pros review quotes

Prasanth Prasad - PeerSpot reviewer
Feb 15, 2024
It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten.
CN
Dec 7, 2020
The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash.
RJ
Apr 6, 2023
The most valuable thing is that this solution is widely used for work management and research. It's easy to jump into the security use case with the same technology.
Learn what your peers think about Elastic Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
757,198 professionals have used our research since 2012.
Don Jarmon - PeerSpot reviewer
Oct 31, 2023
Stability-wise, I rate the solution a ten out of ten.
SN
Mar 4, 2020
ELK Logstash is easy and fast, at least for the initial setup with the out of box uses.
ER
Aug 3, 2020
The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes.
KF
Jul 1, 2022
We chose the product based on the ability to scan for malware using a malware behavioral model as opposed to just a traditional hash-based antivirus. Therefore, it's not as intensive.
JM
May 18, 2020
The most valuable features are the speed, detail, and visualization. It has the latest standards.
SA
May 21, 2021
It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast.
JC
Feb 24, 2021
The cost is reasonable. It's not overly pricey.
 

Elastic Security Cons review quotes

Prasanth Prasad - PeerSpot reviewer
Feb 15, 2024
Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language.
CN
Dec 7, 2020
We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised.
RJ
Apr 6, 2023
In terms of improvement, there could be more automation in responding to and evaluating detections.
Learn what your peers think about Elastic Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
757,198 professionals have used our research since 2012.
Don Jarmon - PeerSpot reviewer
Oct 31, 2023
With Elastic Security, the challenge arises from the fact that there is a learning curve in relation to queries and understanding the query language provided to extract usable data.
SN
Mar 4, 2020
In terms of what could be improved with Elastic, in some use cases, especially on the advanced level, they are not ready made, so you'll have to write some scripts.
ER
Aug 3, 2020
The solution needs to be more reactive to investigations. We need to be able to detect and prevent any attacks before it can damage our infrastructure. Currently, this solution doesn't offer that.
KF
Jul 1, 2022
It could use maybe a little more on the Linux side.
JM
May 18, 2020
If you compare this with CrowdStrike or Carbon Black, they can improve.
SA
May 21, 2021
There should be a simulation environment to check whether my Elastic implementation is functioning perfectly fine. Other solutions have their own Android and iOS applications that I can install on my mobile so that I am continuously connected to the SIEM.
JC
Feb 24, 2021
This type of monitoring is not very mature just yet. We need more real-time information in a way that's easier to manage.