Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Elastic: Your Logs Deserve Better Than a CSV Dump

Truth in IT
05/09/2025
19
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett with Small World Big Data and we are here at Rsac 2025. Lots and lots of people. Lots and lots of cybersecurity to talk about. I'm in the Elastic booth, and we're going to find out a little bit more from Sneha about Elastic storage and why they're here at Rsac. So let's start with that. Well, first of all, how did you get to Elastic? What's your back story? All right. Thank you for talking to me. So my backstory is I've been working in the security industry for some time now. My story way back starts as a software engineer. And then from there, I worked in another company before this and as a product manager doing mobile security. And then Elastic is doing a lot more in SIM as well as cloud security and endpoint security. And so this was an interesting area for me to be in, so that that's what got me to Elastic and I do product management here. So I have done some app development in my in my lifetime, and I remember Elastic as this great search engine you could roll into your stack and stuff like that. I'm a little curious to find out though. The story about how Elastic comes to be at RSA. Rsa. How does it turn into a security company? Yeah, that's a great question. So many of you are probably familiar with Elastic and probably know it as the Elk stack. And so that's probably what you're talking about as well, where you can use Elastic as your search solution. Now, a few years ago, Elastic was also many developers as well as just, you know, people who were using Elastic started building out of the box solutions from it for specifically use cases like security. So sending in the security logs, for example, and then sending in their IT logs to do monitoring of their infrastructure. How do I protect my infrastructure? And so from there the product sort of evolved, and now we have an out of the box solution that is built on top of the Elk stack itself. And that's what we're doing here at RSA, is talking about that out of the box solution, which is primarily our Elastic SIM. So that's what we're doing. All right. So this is something that came out of the way. People were using it over time layered up. And you got to a set of value propositions. That was enough to box up and then propagate and get to other people looking at RSA. The crowd that's here, RSA conference, there's a lot of themes going on. What what are some of the themes you've noticed and how would Elastic security perhaps help them with those? Yeah, I mean, it's no doubt that everybody is talking about AI and everybody is talking about how, you know, I can come in in the intersection of security as well as data. And that's exactly the place where Elastic adds a lot of value. So we have integrations with so many different companies, which are all over the show floor here. So you can essentially bring that data to Elastic. And because you can search for it in seconds across so many of your different clusters that are present, that's really like interesting trend that we are seeing. Right. So with AI kind of being in the mix of all of that, we have integrated so many of those different AI capabilities into our security solution. We also have our search solution where we are complementing and offering that with our security solution. So for example, we have a vector database that you can use in our search solution. And that is something that is integrated into our security platform. So let's say I'm looking at a specific attack. And I can go into the assistant and start asking natural language questions. Hey, help me with this attack. What is my next step? How do I investigate. And you can just kind of go from there. So we're kind of cross-pollinating our own solution. So we're building upon the power that we have with surge. And then, you know, taking all the benefits that AI brings to the table and almost reimagining the way Elastic now works while just, you can, you know, make use of that power and start to ask all that questions in natural language. Yeah. I mean, we could probably have a whole nother show in another discussion on rag and vector embeddings and databases, because that's another hot topic we're covering at Small World Big Data recently. But it's interesting to see that intersection across domains, right? I think the most interesting things happen when you have expertise and skill sets and capabilities from multiple things come together, right? So this is really interesting to me to see Elastic get into the security space. If you wanted to tell one thing to everybody here about Elastic and what it can do for them, what would you tell them? It's simple right? Search is really important, especially now with AI kind of coming in everywhere. Search is important, data is important. And Elastic comes exactly at the intersection of that and helps you with the use case that you care about. And in this case, in this particular show floor, it's about protecting your data across the different domains. So that's what I would say to people is come check out how that very unique intersection happens. And that's where Elastic brings to the table. If someone wants to learn now more about what Elastic is doing in the security space in addition to the vector databases, what would you recommend they start with? I mean, it's probably a kind of big website on there. Where where would you say if someone here is in the security role and wants to start learning more about what you were just talking about, where should they start? Yeah, that's a great question. So actually more recently and you also mentioned to me that, you know, you're familiar with the Elk stack. We recently released, uh, a new offering where you can go in without any kind of management. We have a way for you to start your Elastic trial with Elastic serverless. And so now that is something where you can just without any management, without having to figure out your clusters or without having to figure out anything. You can get straight into the security project, you can get straight into the observability project or straight into search, and start using the benefits of Elastic that offers. So that's what I would tell people. Go to Elastic, go check out our serverless offering that just came out. And you can just start a free trial and you can use all the features that we have that come with it right away in the free trial. That's probably the best offer we've had all day so far on security has come, come to free to. Trial, and then if you like it, you can definitely convert over. And that's what we hope you'll do. All right. Thank you so much for being here and talking to us today. Thank you. Take care folks. Check out Elastic.

Mike Matchett meets with Sneha Sachidananda of Elastic to discuss how the company has evolved beyond the ELK stack into full-stack security. Elastic’s SIEM solution is built on their high-speed search foundation and now includes AI-driven threat hunting and natural language investigation via vector databases. With out-of-the-box integrations and Elastic’s new serverless offerings, security teams can trial and deploy powerful analytics without infrastructure overhead— making it easier to detect and respond to threats across their environment.

Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • elastic
  • cybersecurity
  • siem
  • threat
  • hunting
  • log
  • analytics
  • vector
  • search
  • ai
  • for
  • security
  • serverless
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Elastic: Your Logs Deserve Better Than a CSV Dump

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection Strategies for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-strategies-for-enhanced-threat-prevention-8-0/
              • 01/28/2026
                10:00 AM
                01/28/2026
                Strategies for Safeguarding Data in the AI Era through DSPM
                https://www.truthinit.com/index.php/channel/1797/strategies-for-safeguarding-data-in-the-ai-era-through-dspm/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: seguridad integral para datos sensibles
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-seguridad-integral-para-datos-sensibles/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection Strategies for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Strategies for Safeguarding Data in the AI Era through DSPM

                      01/28/202610:00 AM ET
                      • Jan
                        28

                        Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                        01/28/202610:55 AM ET
                        More events

                        Recent Spotlight Events

                        • Dec
                          10

                          The Next Generation of Managed Data Security Services

                          12/10/202501:00 PM ET
                          • Dec
                            02

                            The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                            12/02/202501:00 PM ET
                            • Nov
                              20

                              Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                              11/20/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version