Articles by Woody Walton

Principal Solutions Architect, Elastic


The strata of data: Accessing the gold in human information

What do data and rocks have in common? Surprisingly, a lot. The way data resides in our environment bears quite a few similarities with geology — helping us understand how best to store, manage, and leverage data for its intended purposes.


Zero Trust requires unified data

A critical but often overlooked component of Zero Trust is unified visibility into all of your data. A unified data layer, as Elastic, can help organizations achieve the speed and scale they need to implement Zero Trust.


Using Elastic as a global data mesh: Unify data access with security, governance, and policy

The Elastic search analytics platform can be used as a global data mesh. Learn more about what a data mesh is, how it's different from a data fabric, and key differentiators that uniquely position Elastic as a strategic data mesh layer.


When it comes to big data, what’s old is new again (and again)

Data is the lifeblood of our digital world. In this post, we take a close look at three strategies designed to help you find the information you need, from metadata to distributed search to dynamic categorization.


Elastic provides the foundation for the DoD's pillars of Zero Trust Networking

For most public sector organizations, especially the U.S. Department of Defense, enacting a strong Zero Trust security strategy is critical. Learn how Elastic Security provides the foundation for the fundamental pillars of a Zero Trust architecture.


Achieving the 8 guiding principles of the DOD’s Data Strategy with Elastic

Learn how Elastic ingests and queries massive amounts of diverse datasets in near real time and across a distributed environment to support all eight of the DOD Data Strategy’s guiding principles.


Enabling DevSecOps with the Elastic Stack

DevSecOps brings together dev, security, and IT ops to automate, accelerate, and secure software delivery. Elastic easily integrates with and streamlines the monitoring of DevSecOps infrastructures and data sources from top to bottom.