Elastic Security and Elastic Observability are key players in threat detection and performance monitoring. Elastic Observability holds a slight edge due to its expansive monitoring features and data insights.
Features: Elastic Security offers threat detection, anomaly detection, and detailed alerts. Elastic Observability provides robust data visualization, broad integration capabilities, and superior data analysis.
Room for Improvement: Elastic Security could improve complex configurations, reporting features, and usability. Elastic Observability needs enhancements in scalability, data processing speed, and handling of large-scale data.
Ease of Deployment and Customer Service: Elastic Security is known for straightforward deployment but requires advanced technical support. Elastic Observability offers a simple deployment process and slightly better customer service.
Pricing and ROI: Elastic Security is seen as cost-effective initially but has mixed ROI reviews. Elastic Observability, while more expensive initially, provides more reliable ROI according to users.
Support is prompt and helpful.
One example is the inability to monitor very old databases with the newest version.
Elastic Observability could improve asset discovery as the current requirement to push the agent is not ideal.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
Elastic Observability seems to have a good scale-out capability.
What is not scalable for us is not on Elastic's side.
The license is reasonably priced, however, the VMs where we host the solution are extremely expensive, making the overall cost in the public cloud high.
Elastic Observability is cost-efficient and provides all features in the enterprise license without asset-based licensing.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
It is very stable, and I would rate it ten out of ten based on my interaction with it.
Elastic Observability is really stable.
In terms of stability, I would rate Elastic a solid eight out of ten.
The most valuable feature is the integrated platform that allows customers to start from observability and expand into other areas like security, EDR solutions, etc.
All the features that we use, such as monitoring, dashboarding, reporting, the possibility of alerting, and the way we index the data, are important.
Elastic Security offers good insight regarding alerts, reports, and cases.
Elastic Observability is primarily used for monitoring login events, application performance, and infrastructure, supporting significant data volumes through features like log aggregation, centralized logging, and system metric analysis.
Elastic Observability employs Elastic APM for performance and latency analysis, significantly aiding business KPIs and technical stability. It is popular among users for system and server monitoring, capacity planning, cyber security, and managing data pipelines. With the integration of Kibana, it offers robust visualization, reporting, and incident response capabilities through rapid log searches while supporting machine learning and hybrid cloud environments.
What are Elastic Observability's key features?Companies in technology, finance, healthcare, and other industries implement Elastic Observability for tailored monitoring solutions. They find its integration with existing systems useful for maintaining operation efficiency and security, particularly valuing the visualization capabilities through Kibana to monitor KPIs and improve incident response times.
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.