Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Product | Market Share (%) |
---|---|
Elastic Security | 2.9% |
Wazuh | 13.2% |
Grafana Loki | 8.4% |
Other | 75.5% |
Type | Title | Date | |
---|---|---|---|
Category | Log Management | Aug 29, 2025 | Download |
Product | Reviews, tips, and advice from real users | Aug 29, 2025 | Download |
Comparison | Elastic Security vs Wazuh | Aug 29, 2025 | Download |
Comparison | Elastic Security vs Splunk Enterprise Security | Aug 29, 2025 | Download |
Comparison | Elastic Security vs Datadog | Aug 29, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
CrowdStrike Falcon | 4.3 | N/A | 96% | 132 interviewsAdd to research |
Wazuh | 3.7 | 13.2% | 80% | 48 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 34 |
Midsize Enterprise | 11 |
Large Enterprise | 13 |
Company Size | Count |
---|---|
Small Business | 533 |
Midsize Enterprise | 341 |
Large Enterprise | 907 |
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
Elastic Security was previously known as Elastic SIEM, ELK Logstash.
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Author info | Rating | Review Summary |
---|---|---|
Assistant Director at PTA | 4.5 | We use Elastic Security for centralized monitoring in Pakistan's telecom sector, handling 7,000-8,000 alerts per minute efficiently. While continuous upgrades for vulnerabilities are needed, its community-based model offers cost-effective enterprise security, ideal for security scholars and SMEs. |
I Specialist Security Engineer I at Platin Bilisim | 4.5 | I've used Elastic Security for two years and find it effective, scalable, and cost-efficient, though installation can be complex. It integrates key modules well, offers strong AI features, and I recommend it for unified security management. |
Performance Practice Specialist at a local government with 10,001+ employees | 4.0 | I evaluated Elastic Security and found its advanced features, like machine learning and ChatGPT integration, valuable. It's versatile and cost-effective but requires a substantial setup, consuming many resources. Despite a successful proof of concept, I haven't deployed it yet. |
Senior Cyber Security Manager at a tech services company with 11-50 employees | 4.0 | Elastic Security provides integrated security solutions for enterprises, offering observability, SIEM capabilities, and user-friendly rule creation through Kibana. It’s flexible like Microsoft Sentinel but sometimes struggles with threat identification compared to more established solutions like CrowdStrike and Defender. |
Chief Technology Officer & Co-founder at CS2 | 4.0 | I use Elastic Security to consolidate logs from various devices effectively. Its valuable features include anomaly detection and automation. Despite a complex setup, it offers better cost predictability and AI assistance compared to Splunk, making it more affordable. |
Cyber Security Engineer II at a healthcare company with 10,001+ employees | 3.0 | Elastic Security is highly customizable with easy-to-build dashboards and exceptional speed. However, it's challenging to navigate due to inconsistent formatting and complex data organization, especially without prior knowledge of the environment. We also considered Microsoft Sentinel before choosing Elastic Security. |
Information Technology Security Specialist at IPro SIA | 3.5 | I use Elastic Security for basic SIEM reporting. Its valuable features include non-licensed agents and a good interface. However, the dashboards lack aesthetic appeal, and query building can be challenging without familiarity with Elastic syntaxes. |
Assistant Manager - IT Security at Photon inc | 3.5 | We primarily use Elastic Security for log management due to its customizable dashboards, scalability, and affordability. While it's mostly stable, the user interface is complex, and premium support needs improvement. We've also used Wazuh and Rapid7 before. |