Try our new research platform with insights from 80,000+ expert users
2019-08-08T07:02:00Z

What is your primary use case for ELK Logstash?

Julia Miller - PeerSpot reviewer
  • 0
  • 227
PeerSpot user
17

17 Answers

RG
Real User
2021-12-22T18:42:00Z
Dec 22, 2021
Search for a product comparison
KS
Real User
2021-09-07T20:37:45Z
Sep 7, 2021
reviewer1602072 - PeerSpot reviewer
Real User
2021-06-15T14:50:34Z
Jun 15, 2021
reviewer1569672 - PeerSpot reviewer
Real User
2021-05-07T15:17:51Z
May 7, 2021
SD
Real User
2021-03-05T22:55:47Z
Mar 5, 2021
reviewer1433385 - PeerSpot reviewer
Real User
2021-02-24T19:44:00Z
Feb 24, 2021
Learn what your peers think about Elastic Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
reviewer1187142 - PeerSpot reviewer
Real User
2021-02-24T07:05:01Z
Feb 24, 2021
CN
Real User
2020-12-07T15:14:00Z
Dec 7, 2020
reviewer991806 - PeerSpot reviewer
Real User
2020-08-09T07:19:00Z
Aug 9, 2020
reviewer1363986 - PeerSpot reviewer
Real User
2020-08-03T06:11:07Z
Aug 3, 2020
FB
Real User
2020-07-07T11:18:18Z
Jul 7, 2020
MA
Real User
2020-03-22T06:49:00Z
Mar 22, 2020
reviewer1174176 - PeerSpot reviewer
Real User
2020-03-04T08:49:00Z
Mar 4, 2020
MR
Real User
2020-03-03T08:47:43Z
Mar 3, 2020
reviewer1269303 - PeerSpot reviewer
Real User
2020-03-03T08:47:40Z
Mar 3, 2020
it_user771693 - PeerSpot reviewer
Real User
2019-09-10T10:06:00Z
Sep 10, 2019
it_user782697 - PeerSpot reviewer
Real User
2019-08-08T07:02:00Z
Aug 8, 2019
Elastic Security is a robust, open-source security solution designed to offer integrated threat prevention, detection, and response capabilities across an organization's entire digital estate. Part of the Elastic Stack (which includes Elasticsearch, Logstash, and Kibana), Elastic Security leverages the power of search, analytics, and data aggregation to provide real-time insight into threats and vulnerabilities. It is a comprehensive platform that supports a wide range of security needs, from...
Download Elastic Security ReportRead more

Related Q&As