Elastic Security Primary Use Case
With Elastic Security in my company, we ingest logs from various security systems through a cloud connection and stream logs from different sources.
We primarily use the solution for log management. We use its basic functionality.
View full review »We primarily use Elastic Security as a log aggregator, so we use it like a SIEM. It ingests all our logs and reports on them in aggregate.
Buyer's Guide
Elastic Security
April 2024
Learn what your peers think about Elastic Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
SA
reviewer1393731
Consultant at a computer software company with 5,001-10,000 employees
There are around 150 pre-built use cases. One of the major use cases is when somebody tries to fiddle with logs, Elastic SIEM creates an alert because logs are the most critical things from the security aspect. For example, I have more than 1,000 terminals, which can be desktops, laptops, or any sort of servers. If somebody tries to delete Windows logs, Elastic SIEM immediately generates an alert indicating that somebody is trying to fiddle with the logs. Elastic SIEM sends me a pop-up message as well as an email.
View full review »We use Elastic Security for basic SIEM reporting.
View full review »We primarily use the solution for security purposes.
View full review »I sell Elastic Security to my customers. Almost all my customers use the free version, but some use the enterprise version.
View full review »KS
KarthikeyanSrinivasan
Sr Cloud Data Architect at Sun Cloud LLC
It is for our own infrastructure. We are trying to do ELK Stack for everything. We are trying to build our own monitoring solution. For now, we are using it as an alerting solution, and SIEM is going to be our destination.
View full review »The product is for use cases involving observability, visualization, dashboards, analytics, and security.
We are using the solution for log management. We use it for monitoring and observing.
View full review »MF
Maria Foss
Chief Operating Officer / SR. Project Manager at SCS
We use it as a SIEM for monitoring a client's environment.
View full review »I worked for a telco client for the security model of Elastic, but my role was unit manager. I don't have a lot of technical expertise, but I decided on the solution for a client, and I was responsible for the delivery.
I worked with the security of the mobile app. I see all the logs in Elastic for SIEM. I monitored the logging and some logs from the machine for a UNIX system with some use cases like the machine's file system.
This solution is deployed on-premise.
We provide this solution to our customers, which are telcos, in the finance industry, and in retail.
View full review »SC
reviewer1602072
AVP, Site Reliability Engineer at a financial services firm with 10,001+ employees
Our primary use case of this solution is for application performance monitoring. We are customers of ELK.
View full review »My use case for the product revolved around conducting demonstrations and testing. It also helped me with tracing ransomware and managing threat scenarios.
View full review »We have different use cases. We implement it for the banking and healthcare sectors. It's the most useful for the e-commerce platforms that we deploy it for. The most important feature is Elasticsearch.
They also use it for security. Elastic Security has been deployed in the National Bank of Dubai. They are currently using Elastic Stack and they're also using the security version.
It's a good platform and the very best in the current market. We looked at the Forester report from December 2022 where it was said to be a leader.
View full review »SK
reviewer2285439
Executive Cybersecurity at a computer software company with 11-50 employees
We are looking for the same tool on-premises that we can provide to our client as an MSSP. We're evaluating different types of tools in the market.
Although, we have a premium version, and I was checking the functions and features here.
We have some questions about the query language. So that also from this console and so that we can actually want to have a demonstration session where we can clarify this thing query to manage.
RI
reviewer2198715
DevOps Engineer at a tech services company with 51-200 employees
We are using Elastic Security for logging the application logs, as we use a microservice architecture. So all application logs are saved to this LogSpot.
View full review »CN
CharlesNetshivhera
Senior DevOps Engineer at a financial services firm with 10,001+ employees
It is currently deployed as a single instance, but we are currently looking at clusters. We are using it for a logging solution. I'm a developer and act as a server engineer for DevOps Engineers. It's used by developers and mobile developers. It could be used by quite a few different teams.
View full review »AM
reviewer2125281
Intern Cybersecurity at a computer software company with 10,001+ employees
I use Elastic Search to collect logs from an Active Directory server and forward the incidents to the SOAR solution.
PC
PH Chiu
Consultant at RIPEN
My customers use Elastic Security for security monitoring, threat hunting, and threat identification.
View full review »LM
reviewer1569672
Devops/SRE tech lead at a transportation company with 201-500 employees
We do not use monitoring due to the fact that we use Prometheus for monitoring. We don't use APM and so on. We use ELK only for logging.
View full review »SA
reviewer1393731
Consultant at a computer software company with 5,001-10,000 employees
This is a log aggregation tool and we are using it for security purposes.
There are 145 pre-built use cases, but we are still making some ourselves. One we built is an alarm for log deletion. For example, if a hacker tries to delete the log from a bank machine then it will raise an alarm immediately. A second use case is an alert for too many false login attempts, perhaps indicating a brute-force attack.
View full review »Basically, we are using this product for monitoring and for developing the processes for our company.
View full review »We use Elastic Security to manage logs and time series data. More recently, we have used it for NetFlow data.
View full review »SD
Steve Drill
VP Platform Engineering at Hydrogen
ELK Stack is made up of Elasticsearch, Logstash, and Kibana. What we have is considered modified ELK Stack where instead of the Logstash we use Fluentd, but it serves the same purpose as basically a pipe to get the data into the Elasticsearch.
We primarily use the solution for everything you could think of from error detection to general logging and auditing, to security awareness.
We used this solution for gathering our application logs and analyzing application behavior.
View full review »MU
reviewer2263155
Lead Security Engineer at a tech services company with 201-500 employees
We use Elastic Security for monitoring. Our client is a financial client, so we detect their infrastructure from that perspective. For example, if there is any unauthorized access to their financial systems, we need to know about that. We monitor all the instances they are using all the storage buckets they use, and then if they have exposed any APIs, we need to monitor those as well. They are using AWS Cloud, and we need to monitor their cloud services.
View full review »RJ
reviewer1411278
Big Data Team Leader at a tech services company with 51-200 employees
Elastic Security is usually used to deliver and analyze logs for security teams. Some common use cases include search and analytics of log data from the system and sending it to other components. We are using features like point security and detection of gathering data.
View full review »WI
Wan Ikbal Ismat W.
Principal Cyber Security Manager at Ask4key
My clients use this solution for security purposes and SIEM and log management.
View full review »ER
reviewer1363986
IT at a tech vendor with 10,001+ employees
We primarily use the solution to have a correlation on all the Windows event logs. We use it more for forensic purposes now. We are looking for something which will be a more proactive product for us and be able to detect any threats and take automatic action.
View full review »TV
reviewer1222155
Manager- Information Security at a tech services company with 51-200 employees
We primarily use the solution for endpoint protection.
View full review »SM
reviewer1433385
Associate Director - Solutions at a comms service provider with 1,001-5,000 employees
We use this solution for the Microsoft deployment of auto-management.
View full review »GA
reviewer2227065
Presales Solutions Architect (Cyber Security) at a tech services company with 11-50 employees
Our use case for Elastic Security is for log management and security information for the management team.
View full review »TW
reviewer1269834
I.T. Manager at a healthcare company with 51-200 employees
We plan to use it to analyze the data that we're pumping into it from Active Directory and from firewalls, then we'll pass that information onto our own external SOC.
View full review »FB
Fazil BasheerSyed
Technical Team Lead at Quester
I was using this product up until recently when I changed companies, but I have been asked to implement logging in my new role and this is one of the options that I am considering.
It was used in conjunction with Kibana to examine our logs and perform debugging. When a user complained about misbehavior in an application, we would research the logs, test, and try to find out where the bug is.
MA
Maxime AGARIM
Junior System Engineer at Efficom-lille
We use Logstash to retrieve data from our servers, from different sources, to our Elastic Stack. There, Elastic Search allows us to search it, and we can visualize the data with Kibana.
View full review »MR
MarioReale
Cloud Engineer at GARR
The primary use of this solution is to gather authentication information and use it to determine which identity provider is breaking on which service provider. We store it as anonymized session information for each user.
View full review »We are using Elastic Security as part of the Elastic Search component. The solution provides us with security, such as threat protection.
View full review »RG
Rubén García
Desarrollador Java Senior Full Stack at Optimissa Capital Markets Consulting
My primary use case is to check market prices.
View full review »JC
reviewer1187142
Senior Tech Engineer at a tech services company with 1,001-5,000 employees
In general, the solution is working together with Open Shift's deployment for the continuous delivery of many projects. This product takes the metrics and checks the log for components that Open Shift deploys. We work with the observation team that monitors the entire company to understand what can be observed and analyzed.
We are a service provider, and use this solution to work with our customers.
We use this solution for collecting firewall logs and then supplying them to the log analyzer.
We are running Fortinet FortiGate for our firewall, and these are the logs that we are analyzing. Normally, we have a problem with the visualization part.
View full review »SA
reviewer1269303
Senior Manager Analytics at a financial services firm with 501-1,000 employees
The primary use case of this solution is for IT monitoring, predictive maintenance, and anomaly detection.
View full review »AR
reviewer991806
Founder & Chief Executive Officer at a consultancy with 11-50 employees
We are using ELK Logstash for application log management and fault detection.
View full review »Elastic SIEM is used to monitor and deal with system log files.
View full review »JJ
reviewer1331592
CEO at a tech services company with 51-200 employees
We use Elastic SIEM for security and analytics.
View full review »SN
reviewer1174176
Associate Delivery Lead at a tech services company with 1,001-5,000 employees
The primary use cases are for infrastructure monitoring networks, security analytics, and SIEM.
We are evaluating it for business analytics as well.
JM
reviewer1341687
Director of Engineering at a tech services company with 201-500 employees
We want to track and to respond to our security incidents. That's the main reason we use it, to analyze and see like what all the incidents that are happening. We also deploy it for some of our clients.
View full review »Buyer's Guide
Elastic Security
April 2024
Learn what your peers think about Elastic Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.