Sovereign solutions for sensitive workloads: Elastic on Google Distributed Cloud Hosted
Elastic Blog
by Valerio Arvizzigno
19h ago
Maintaining sovereignty over sensitive workloads is paramount, especially in industries like public sector and telecommunications. Combining this need with cloud adoption and the innovation acceleration it provides is not always an easy path. Thus, sovereign cloud solutions, ensuring data residency, regulatory compliance, and security become indispensable for organizations dealing with highly sensitive data. With data sovereignty, organizations retain control over their data, mitigating risks associated with data breaches, regulatory noncompliance, and geopolitical considerations. Elastic prio ..read more
Visit website
Zero Trust requires unified data
Elastic Blog
by Woody Walton,Michael Young
19h ago
It’s vital to have a common understanding and shared context for complex technical topics. The previously adopted perimeter model of security has become outdated and inadequate. Zero Trust (ZT) is the current security model being designed and deployed across the US federal government. It’s important to point out that ZT is not a security solution itself. Instead, it’s a security methodology and framework that assumes threats exist both inside and outside of an environment.  The ZT security model has two parts: Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA). ZTA focuses ..read more
Visit website
NLP vs. LLMs: Understanding the differences
Elastic Blog
by The Elastic Platform team
19h ago
As AI continues to grow and solve problems across countless industries, a key part of that tech is the ability to seamlessly bridge the gap between human language and machine understanding. This is where natural language processing (NLP) and large language models (LLMs) come in. They provide distinct and specialized approaches for connecting the power of human communication with software and machines. Or in simpler terms, NLP and LLMs enable us to have human-like conversations with software. NLP is the translator, analyzing and manipulating human language based on defined rules and structures ..read more
Visit website
Improving the event queue in Elastic Agent and Beats
Elastic Blog
by Fae Charlton,Alexandros Sapranidis
3d ago
In version 8.12, we introduced performance presets — a simpler way to tune Elastic Agent and Beats for a variety of scenarios. This improved performance for common environments without the fine-tuning that was often required in the past.  Starting with version 8.13, we focused on improving our internal libraries to better support these presets. The result was a rewrite of our internal event queue that brings reduced memory usage to all Beats. In our internal benchmark suite, Filebeat 8.13 showed memory reductions of about 20% on all presets. In this post we'll look at how we achieved that ..read more
Visit website
Telco as a Service (TaaS) with Elastic and Wilab
Elastic Blog
by Piotr Kobziakowski,Juergen Obermann,Martin Ferreyra,Tomas Achaval-Palacio
3d ago
Telco as a Service (TaaS) is poised to revolutionize the telecom industry by enabling operators to dynamically create and offer applications using open network capabilities and data. This model mirrors the successful approach of digital app stores like Apple's App Store but with a new universe of data that comes from the telecom ecosystem. By leveraging TaaS, telecom operators can rapidly develop and deploy new services and applications, tapping into a wealth of network data and capabilities. This not only fosters innovation but also enables telecom companies to respond swiftly to market deman ..read more
Visit website
Vector database vs. graph database: Understanding the differences
Elastic Blog
by The Elastic Platform team
3d ago
Big data management isn’t just about storing as much data as possible. It’s about being able to identify meaningful insights, discover hidden patterns, and make informed decisions. This quest for advanced analytics has been the driving force behind innovations in data modeling and storage solutions, way beyond traditional relational databases. Two of these innovations are vector databases and graph databases. Both are significant advancements in managing data, providing unique data structures with their own distinct strengths. But you need to have an understanding of how they work and how they ..read more
Visit website
Elastic Stack 7.17.20 released
Elastic Blog
by Maha Alsayasneh
6d ago
..read more
Visit website
Tracing history: The generative AI revolution in SIEM
Elastic Blog
by Mike Nichols,Mike Paquette
6d ago
The cybersecurity domain mirrors the physical space, with the security operations center (SOC) acting as your digital police department. Cybersecurity analysts are like the police, working to deter cybercriminals from attempting attacks on their organization or stopping them in their tracks if they try it. When an attack occurs, incident responders, akin to digital detectives, piece together clues from many different sources to determine the order and details of events before  building a remediation plan. To accomplish this goal, teams stitch together numerous (sometimes dozens) of produc ..read more
Visit website
Elastic Stack 8.13.2 released
Elastic Blog
by Maha Alsayasneh
6d ago
..read more
Visit website
Elastic wins Google Cloud Partner of the Year for the fourth time
Elastic Blog
by Lon Holden
6d ago
..read more
Visit website

Follow Elastic Blog on FeedSpot

Continue with Google
Continue with Apple
OR