How to create maintainable and reusable Logstash pipelines
The advantages of resource-based pricing in security
With resource-based pricing, only pay for data usage – not ingest, document, or another metric. Ingest first, then make informed decisions on what data to keep.
Cost-saving strategies for the Elasticsearch Service: Data storage efficiency
As your infrastructure grows, so do your costs. We’ll walk you through how Elasticsearch Service gives you the flexibility you need to scale cost-effectively.
Discovering anomalous patterns based on parent-child process relationships
Elastic Security heads to RSA 2020
Stop by our booths at RSA 2020 (#1427 and #2227) to learn about the latest in Elastic Endpoint Security and Elastic SIEM.
How to prevent an Elasticsearch server breach
Mac system extensions for threat detection: Part 3
Elastic on Elastic: Securing our endpoints with Elastic Security
The Elastic InfoSec team's internal use of Elastic Security has increased visibility and exponentially expanded its response capabilities to threats.