Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Elastic: Your Logs Deserve Better Than a CSV Dump

Truth in IT
05/09/2025
19
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett with Small World Big Data and we are here at Rsac 2025. Lots and lots of people. Lots and lots of cybersecurity to talk about. I'm in the Elastic booth, and we're going to find out a little bit more from Sneha about Elastic storage and why they're here at Rsac. So let's start with that. Well, first of all, how did you get to Elastic? What's your back story? All right. Thank you for talking to me. So my backstory is I've been working in the security industry for some time now. My story way back starts as a software engineer. And then from there, I worked in another company before this and as a product manager doing mobile security. And then Elastic is doing a lot more in SIM as well as cloud security and endpoint security. And so this was an interesting area for me to be in, so that that's what got me to Elastic and I do product management here. So I have done some app development in my in my lifetime, and I remember Elastic as this great search engine you could roll into your stack and stuff like that. I'm a little curious to find out though. The story about how Elastic comes to be at RSA. Rsa. How does it turn into a security company? Yeah, that's a great question. So many of you are probably familiar with Elastic and probably know it as the Elk stack. And so that's probably what you're talking about as well, where you can use Elastic as your search solution. Now, a few years ago, Elastic was also many developers as well as just, you know, people who were using Elastic started building out of the box solutions from it for specifically use cases like security. So sending in the security logs, for example, and then sending in their IT logs to do monitoring of their infrastructure. How do I protect my infrastructure? And so from there the product sort of evolved, and now we have an out of the box solution that is built on top of the Elk stack itself. And that's what we're doing here at RSA, is talking about that out of the box solution, which is primarily our Elastic SIM. So that's what we're doing. All right. So this is something that came out of the way. People were using it over time layered up. And you got to a set of value propositions. That was enough to box up and then propagate and get to other people looking at RSA. The crowd that's here, RSA conference, there's a lot of themes going on. What what are some of the themes you've noticed and how would Elastic security perhaps help them with those? Yeah, I mean, it's no doubt that everybody is talking about AI and everybody is talking about how, you know, I can come in in the intersection of security as well as data. And that's exactly the place where Elastic adds a lot of value. So we have integrations with so many different companies, which are all over the show floor here. So you can essentially bring that data to Elastic. And because you can search for it in seconds across so many of your different clusters that are present, that's really like interesting trend that we are seeing. Right. So with AI kind of being in the mix of all of that, we have integrated so many of those different AI capabilities into our security solution. We also have our search solution where we are complementing and offering that with our security solution. So for example, we have a vector database that you can use in our search solution. And that is something that is integrated into our security platform. So let's say I'm looking at a specific attack. And I can go into the assistant and start asking natural language questions. Hey, help me with this attack. What is my next step? How do I investigate. And you can just kind of go from there. So we're kind of cross-pollinating our own solution. So we're building upon the power that we have with surge. And then, you know, taking all the benefits that AI brings to the table and almost reimagining the way Elastic now works while just, you can, you know, make use of that power and start to ask all that questions in natural language. Yeah. I mean, we could probably have a whole nother show in another discussion on rag and vector embeddings and databases, because that's another hot topic we're covering at Small World Big Data recently. But it's interesting to see that intersection across domains, right? I think the most interesting things happen when you have expertise and skill sets and capabilities from multiple things come together, right? So this is really interesting to me to see Elastic get into the security space. If you wanted to tell one thing to everybody here about Elastic and what it can do for them, what would you tell them? It's simple right? Search is really important, especially now with AI kind of coming in everywhere. Search is important, data is important. And Elastic comes exactly at the intersection of that and helps you with the use case that you care about. And in this case, in this particular show floor, it's about protecting your data across the different domains. So that's what I would say to people is come check out how that very unique intersection happens. And that's where Elastic brings to the table. If someone wants to learn now more about what Elastic is doing in the security space in addition to the vector databases, what would you recommend they start with? I mean, it's probably a kind of big website on there. Where where would you say if someone here is in the security role and wants to start learning more about what you were just talking about, where should they start? Yeah, that's a great question. So actually more recently and you also mentioned to me that, you know, you're familiar with the Elk stack. We recently released, uh, a new offering where you can go in without any kind of management. We have a way for you to start your Elastic trial with Elastic serverless. And so now that is something where you can just without any management, without having to figure out your clusters or without having to figure out anything. You can get straight into the security project, you can get straight into the observability project or straight into search, and start using the benefits of Elastic that offers. So that's what I would tell people. Go to Elastic, go check out our serverless offering that just came out. And you can just start a free trial and you can use all the features that we have that come with it right away in the free trial. That's probably the best offer we've had all day so far on security has come, come to free to. Trial, and then if you like it, you can definitely convert over. And that's what we hope you'll do. All right. Thank you so much for being here and talking to us today. Thank you. Take care folks. Check out Elastic.

Mike Matchett meets with Sneha Sachidananda of Elastic to discuss how the company has evolved beyond the ELK stack into full-stack security. Elastic’s SIEM solution is built on their high-speed search foundation and now includes AI-driven threat hunting and natural language investigation via vector databases. With out-of-the-box integrations and Elastic’s new serverless offerings, security teams can trial and deploy powerful analytics without infrastructure overhead— making it easier to detect and respond to threats across their environment.

Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • elastic
  • cybersecurity
  • siem
  • threat
  • hunting
  • log
  • analytics
  • vector
  • search
  • ai
  • for
  • security
  • serverless
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Elastic: Your Logs Deserve Better Than a CSV Dump

            Upcoming Webinar Calendar

            • 09/24/2025
              01:00 PM
              09/24/2025
              Transforming Risk into Resilience: Managing Data and Access in Regulated Settings
              https://www.truthinit.com/index.php/channel/1500/transforming-risk-into-resilience-managing-data-and-access-in-regulated-settings/
            • 09/24/2025
              02:00 PM
              09/24/2025
              Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop
              https://www.truthinit.com/index.php/channel/1427/achieving-full-network-and-application-visibility-through-zero-trust-with-netskope-and-extrahop/
            • 09/25/2025
              12:00 PM
              09/25/2025
              Netskope: Secure the Future--AI Usage & Data Security in the Enterprise
              https://www.truthinit.com/index.php/channel/1434/ensuring-data-security-and-ai-integration-for-a-resilient-enterprise-future/
            • 10/02/2025
              12:00 PM
              10/02/2025
              Essential Insights on SOC 2 for Startup Founders
              https://www.truthinit.com/index.php/channel/1524/essential-insights-on-soc-2-for-startup-founders/
            • 10/15/2025
              01:00 PM
              10/15/2025
              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?
              https://www.truthinit.com/index.php/channel/1521/managing-human-risk-in-an-ai-driven-threat-landscape-are-your-defenses-evolving-fast-enough/
            • 10/16/2025
              11:00 AM
              10/16/2025
              Trend Micro Webinar: Risk in Real Time: Agentic SIEM
              https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
            • 10/16/2025
              12:30 PM
              10/16/2025
              Effective Implementation of ISO 27001 Standards for Startups
              https://www.truthinit.com/index.php/channel/1523/effective-implementation-of-iso-27001-standards-for-startups/
            • 10/23/2025
              12:00 PM
              10/23/2025
              360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
              https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
            • 10/28/2025
              12:00 PM
              10/28/2025
              Netskope: Data Security Reimagined: Regain Your Control and Confidence
              https://www.truthinit.com/index.php/channel/1432/data-security-reimagined-regain-your-control-and-confidence/
            • 11/20/2025
              12:00 PM
              11/20/2025
              360View: Budget Optimization: Doing More with Less
              https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
            • 12/11/2025
              12:00 PM
              12/11/2025
              Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
              https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
            • 12/18/2025
              12:00 PM
              12/18/2025
              360View: 2026 IT Predictions & Emerging Trends
              https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

            Upcoming Spotlight Events

            • Oct
              15

              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

              10/15/202501:00 PM ET
              More events

              Upcoming Industry Events

              • Sep
                24

                Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop

                09/24/202502:00 PM ET
                • Sep
                  25

                  Netskope: Secure the Future--AI Usage & Data Security in the Enterprise

                  09/25/202512:00 PM ET
                  • Oct
                    16

                    Trend Micro Webinar: Risk in Real Time: Agentic SIEM

                    10/16/202511:00 AM ET
                    More events

                    Upcoming 360 View Events

                    • Oct
                      23

                      360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                      10/23/202512:00 PM ET
                      • Nov
                        20

                        360View: Budget Optimization: Doing More with Less

                        11/20/202512:00 PM ET
                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Sep
                            16

                            KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                            09/16/202501:00 PM ET
                            • Sep
                              11

                              Cyera: An Executive’s Guide to Secure AI Adoption

                              09/11/202501:00 PM ET
                              • Aug
                                13

                                Resilience by Design: Reducing Data Risk, Downtime, and Regulatory Exposure w. Hitachi Vantara

                                08/13/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Sep
                                  23

                                  Enhancing Visibility, Control, and Trust in Cloud-First Data Security Posture

                                  09/23/202501:00 PM ET
                                  • Sep
                                    18

                                    Netskope: Harnessing AI’s Dual Nature: Progress and Protection

                                    09/18/202501:00 PM ET
                                    • Sep
                                      18

                                      Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro

                                      09/18/202510:00 AM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version