Overview
Product Information on Elastic Security
What is Elastic Security?
Elastic Security Pricing
Overall experience with Elastic Security
“Unified SIEM and XDR Platform Streamlines Threat Detection Across Hybrid Environments”
“Frequent Elasticsearch Updates Sacrifice Stability and Maturity of Tool”
About Company
Company Description
Elastic enables organizations to securely harness search-powered AI so anyone can find the answers they need in real-time using all their data, at scale. By integrating AI with search technology, it facilitates the discovery of actionable insights from large volumes of both structured and unstructured data, addressing the need for real-time, scalable data processing. Our Elasticsearch Platform delivers search-powered AI for observability, security and search. Companies can now solve real-time business problems and achieve better business outcomes by taking advantage of massive amounts of structured and unstructured data, securing and protecting private information more effectively, and optimizing infrastructure and talent resources more efficiently. Elastic’s complete, easy-to-use cloud-based platform offers solutions in search, security, and observability, aimed at aiding businesses in leveraging AI technology securely and effectively.
Company Details
Do You Manage Peer Insights at Elastic?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Elastic Security
Reviewer Insights for: Elastic Security
Deciding Factors: Elastic Security Vs. Market Average
Performance of Elastic Security Across Market Features
Elastic Security Likes & Dislikes
It is the seamless unification of SIEM, XDR and endpoint protection into one powerhouse platform. It's like having a full-spectrum security orchestra that plays perfectly in tune. Real-time AI-driven threat detection and Kibanas drag-and-drop dashboard make investigating complex attacks intuitive and fast, turning hours of manual log-sifting into minutes of actionable insights. Plus, its scalability handles massive data volumes across hybrid environments without compromising performance, delivering unbeatable TCO compared to fragmented legacy tools. Its empowered our team to shift from constant alert overload to strategic hunting, which is a game-changer for any SOC under pressure.
It is the seamless unification of SIEM, XDR and endpoint protection into one powerhouse platform. It's like having a full-spectrum security orchestra that plays perfectly in tune. Real-time AI-driven threat detection and Kibanas drag-and-drop dashboard make investigating complex attacks intuitive and fast, turning hours of manual log-sifting into minutes of actionable insights. Plus, its scalability handles massive data volumes across hybrid environments without compromising performance, delivering unbeatable TCO compared to fragmented legacy tools. Its empowered our team to shift from constant alert overload to strategic hunting, which is a game-changer for any SOC under pressure.
It is the seamless unification of SIEM, XDR and endpoint protection into one powerhouse platform. It's like having a full-spectrum security orchestra that plays perfectly in tune. Real-time AI-driven threat detection and Kibanas drag-and-drop dashboard make investigating complex attacks intuitive and fast, turning hours of manual log-sifting into minutes of actionable insights. Plus, its scalability handles massive data volumes across hybrid environments without compromising performance, delivering unbeatable TCO compared to fragmented legacy tools. Its empowered our team to shift from constant alert overload to strategic hunting, which is a game-changer for any SOC under pressure.
The AI capabilities, based on what is considered GA in the product right now, is really, really subpar. I also dislike that we can't easily downgrade if we perform an upgrade and it causes issues. Overall, the product is really good but the constant drive to introduce new features seems to negatively impact the stability and reliability of the tool Also, the documentation provided by Elastic is far too complex and vague to be of any real help when troubleshooting. And - it's REALLY, REALLY hard to find experienced engineers working with Elasticsearch.
The AI capabilities, based on what is considered GA in the product right now, is really, really subpar. I also dislike that we can't easily downgrade if we perform an upgrade and it causes issues. Overall, the product is really good but the constant drive to introduce new features seems to negatively impact the stability and reliability of the tool Also, the documentation provided by Elastic is far too complex and vague to be of any real help when troubleshooting. And - it's REALLY, REALLY hard to find experienced engineers working with Elasticsearch.
The AI capabilities, based on what is considered GA in the product right now, is really, really subpar. I also dislike that we can't easily downgrade if we perform an upgrade and it causes issues. Overall, the product is really good but the constant drive to introduce new features seems to negatively impact the stability and reliability of the tool Also, the documentation provided by Elastic is far too complex and vague to be of any real help when troubleshooting. And - it's REALLY, REALLY hard to find experienced engineers working with Elasticsearch.
Top Elastic Security Alternatives
Peer Discussions
Elastic Security Reviews and Ratings
- Sales Systems Engineer50M-1B USDIT ServicesReview Source
Unified SIEM and XDR Platform Streamlines Threat Detection Across Hybrid Environments
It´s transformed our SOC from reactive firefighting to proactive threat domination. We deployed it across hybrid environments (on-prem servers, AWS, and OT networks), and the unified SIEM+XDR approach with AI-Driven detection rules cut our mean time to respond by over 70% in the first quarter alone. Kibana´s intuitive dashboards and real-time visualizations make threat hunting feel effortless, while features like Endpoint Security and Attack Discovery have stopped sophisticated attacks we´d have missed with legacy tools.


