Mountain View, CA, USA
  |  By Bill Wright
In the wake of recent cyber attacks against US water utilities, the vulnerability of local entities dependent on operational technology (OT) has been starkly highlighted. This danger was further emphasized last week when Congress held a hearing titled Securing Operational Technology: A Deep Dive into the Water Sector. Witnesses at the hearing painted a stark picture of the significant cybersecurity risks facing small utility companies today.
  |  By Abby Zumstein
Your one-stop shop for transparent cloud security information Elastic® knows that security and compliance requirements are mandatory for regulated and non-regulated customers alike. We strongly believe in providing clear and transparent information to earn your trust in Elastic as an organization and in the services we provide. Our Trust Center is a public one-stop shop for information on security, compliance, privacy, and resiliency for Elastic and the Elastic Cloud.
  |  By Udayasimha Theepireddy (Uday),
Generative AI and large language models (LLMs) are revolutionizing natural language processing (NLP), offering enhanced conversational AI experiences for customer service and boosting productivity. To meet enterprise needs, it’s important to ensure the responses that are generated are accurate as well as respect the permissions model associated with the underlying content.
  |  By Elastic
With the new year in swing, we’re excited to announce that Elastic® 8.12 is now available! This release supports Elastic Security’s mission to redefine security operations by pushing the boundaries of what constitutes a SIEM. Our team is prioritized on elevating your SOC with intelligent, AI powered analytics and the 8.12 release is another step toward this reality.
  |  By Joe DeFever
Security teams with an existing security information and event management (SIEM) investment may find themselves having to pay more to their vendor in order to ingest and index more of their data. In fact, nearly half (44%) of organizations want to augment or replace their current SIEM solution. It may be time to replace your SIEM. Fortunately, Elastic allows all users to try out a new, powerful SIEM with little to no upfront cost.
  |  By Leanne Link
How US federal agencies can better meet advanced event logging requirements Recently, the US Government Accountability Office (GAO) released a study tracking US federal agencies’ progress on meeting the requirements set out in OMB M-21-31. Released in 2021, the Office of Management and Budget (OMB)’s M-21-31 memorandum provided guidance and requirements for federal agencies in order to improve centralized visibility into logging data before, during, and after cybersecurity incidents.
  |  By Udayasimha Theepireddy (Uday),
In the ever-evolving landscape of cybersecurity, having a robust and efficient security information and event management (SIEM) system is crucial. One powerful solution that has gained significant traction is the Elastic® integration with Amazon Security Lake. This integration not only facilitates the collection of security-related log and event data, but also empowers organizations to analyze and understand their security posture comprehensively.
  |  By Aaron Jewitt
The Elastic InfoSec Threat Detection team is responsible for building, tuning, and maintaining the security detections used to protect all Elastic® systems. Internally, we call ourselves Customer Zero and we strive to always use the newest versions of our products. This blog details how we are building packages of detection rules that work together to create a high fidelity alert for strange user behavior.
  |  By Mike Paquette,
Elastic Security 8.11 introduces pipe queries with Elasticsearch Query Language (ES|QL), an Elastic AI Assistant connector for AWS Bedrock, and data integrations for Okta, Microsoft Entra ID, Wiz, and Palo Alto Prisma Cloud. Together, these enhancements deliver vital guidance and context to threat hunters and investigators. Elastic Security 8.11 is available now on Elastic Cloud — the only hosted Elasticsearch® offering to include all of the new features in this latest release.
  |  By Bill Wright
On Monday, October 30, President Biden signed the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence — the longest in history at 117 pages. The executive order (EO) aims to advance and regulate artificial intelligence (AI) in the US. This landmark order pulls together a number of priorities that influence not just the AI industry, but also society at large.
  |  By Elastic
Join us for an insightful journey as we unpack the advantages of Generative AI, how Elasticians utilize it in their daily roles, and the future of it in Cybersecurity.
  |  By Elastic
Cybersecurity is evolving. Protection needs to be dynamic. Investigation… faster. An effective response requires accurate context. Modernizing your security operations with Elastic extends security visibility, uncovers potential threats, and integrates with existing security systems — for a swift and proactive response. Everything you need on one open and unified platform, built for the hybrid cloud. Elastic Security empowers your business to achieve more even in the most complex digital environments.
  |  By Elastic
It’s the perfect pairing of your private data with generative AI (GAI) and large language models (LLMs) like ChatGPT. With Elastic, the possibilities are endless for more human, intuitive ways to serve up key information for your customers and teams — all while safeguarding the privacy of all your data.
  |  By Elastic
Get a look at the power of Elasticsearch and generative AI (GAI) in action — always putting privacy first and safeguarding your proprietary data. Several examples show off the art of the possible, with intuitive, personalized results you can’t achieve with just publicly available data.
  |  By Elastic
Over 24% of organizations run more than 1,000 containers at a time. This begs the question: Are your containers as protected as they should be? Learn how one of Elastic's new capabilities: cloud security posture management can help you modernize your cloud security operations.
  |  By Elastic
Root cause analysis plays an important role in web applications, IT operations, security, and industrial OT. This video series explains general approaches to root cause analysis and how Elastic accelerates the process with visualizations and dashboards, machine learning to detect anomalies and classify conditions, and interactive tools that empower analysts to drill into additional information that lead to root cause of potential system issues and security incidents.
  |  By Elastic
In Q4 of 2022 there were more than 6,000 new CVE Records published. This begs the question: how susceptible are you to the latest vulnerabilities? Learn how one of Elastic’s new capabilities: cloud security posture management can help you modernize your cloud security operations.
  |  By Elastic
95% of workloads will be deployed on cloud-native platforms by 2025. This begs the question: are your cloud workloads truly secure? Learn how cloud workload protection, one of Elastic’s new capabilities, can help you modernize your cloud security operations.
  |  By Elastic
99% of cloud failures are due to mistakes like misconfiguration. This begs the question: Are your cloud workloads configured correctly? Learn how cloud security posture management, one of Elastic’s new capabilities, can help you modernize your cloud security operations.
  |  By Elastic
Use Elasticsearch and Agent to protect all of your endpoints and take action when malicious actors threaten your environment.

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases. Built on an open source foundation, the Elastic Stack lets you reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.

The Elastic Stack:

  • Kibana gives shape to your data and is the extensible user interface for configuring and managing all aspects of the Elastic Stack.
  • Elasticsearch is a distributed, JSON-based search and analytics engine designed for horizontal scalability, maximum reliability, and easy management.
  • Beats is a platform for lightweight shippers that send data from edge machines to Logstash and Elasticsearch.
  • Logstash is a dynamic data collection pipeline with an extensible plugin ecosystem and strong Elasticsearch synergy.

Founded in 2012 by the people behind the Elasticsearch, Kibana, Beats, and Logstash open source projects, Elastic's global community has more than 80,000 members across 45 countries. Since its initial release, Elastic's products have achieved more than 100 million cumulative downloads.