Sumo Logic

Redwood City, CA, USA
2010
Jan 24, 2023   |  By Chas Clawson
Open source security tools are no longer experimental or only used by hobbyists. They protect some of the largest global enterprises and critical digital infrastructure. This evolution occurred more rapidly than anyone imagined or predicted.
Jan 12, 2023   |  By Enrico Benzoni
The need for fast incident response is a given. No industry professional would deny how critical a rapid response is when dealing with a cyber threat and an incident. However, it is equally important to understand that the quickest response is not always the best in cybersecurity. Security operations centers (SOCs) and organizations must factor in other variables, too, when preparing for the inevitable, as recent cyber stats suggest.
Jan 10, 2023   |  By Chas Clawson and Zoe Hawkins
More and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient Agile development practices. As this movement has occurred, development teams are moving faster than ever by employing Continuous Integration (CI) and Continuous Deployment (CD) practices that are serving to shorten development cycles and get new features into production faster. This does, however, come with greater security risk in some respects.
Dec 22, 2022   |  By Stefan Tapp
Almost every day we hear of another data breach. There has been no shortage of headline-hitting breaches here in Australia, such as Medibank and Optus. The old-school method of ransomware encrypting any data it has access to and requesting a ransom for the decryption key to restore data has evolved. It is now a more insidious and far-reaching problem involving bad actors exfiltrating data and requesting a ransom to keep from exposing that data publicly.
Dec 14, 2022   |  By Chas Clawson
Security can often be distilled down to protecting data. And with microservice-driven applications, the approach to cloud database security has evolved quite dramatically. Beyond just securing data in the cloud, it’s now also difficult to know where the data resides, where the data is flowing, and how this data should be classified.
Dec 8, 2022   |  By Dario Forte
It seems that “no-code” is a term we hear more often in the security automation context these days. While it’s not quite a popular concept, it is nonetheless worth discussing. And this is especially true because automation has become one of the major talking points in cybersecurity. How is no-code automation implemented in cybersecurity? How do no-code and Sumo Logic automation compare to each other?
Dec 6, 2022   |  By Chas Clawson and Colin Fernandes
As companies increasingly move to microservices, they discover the security challenges they pose. Learn about security in a microservices architecture, and about security best practices to ensure your microservices application is secure.
Nov 17, 2022   |  By Anton Ovrutsky
When we hear the term “Credential Access” our detection engineer thoughts typically turn to the Windows LSASS Process and tools like Mimikatz. Recently, however, researchers have drawn our attention to Microsoft Office processes. These processes also store credential material, in the form of access tokens.
Nov 15, 2022   |  By Janet Alexander
When delivering customer experiences from the cloud, defending the app includes the data it houses and the business it represents. The DevSecOps mindset, “You build it, you run it, you secure it” helps, but only when all teams are empowered with the info they need to see a threat, regardless of where it is.
Nov 3, 2022   |  By Janet Alexander
During our sixth-annual user conference, Illuminate, Dave Frampton, General Manager of the security business at Sumo Logic, hosted a panel discussion with Yaron Levi, CISO of Dolby, and Tyson Martin, member of the CISO group at AWS, about the challenges and opportunities of securing modern applications. These are the key takeaways from that conversation..
Jan 20, 2023   |  By Sumo Logic
Learn about Sumo Logic's various security solutions: Cloud Security Analytics, Cloud SIEM, and Cloud SOAR. Each solution can help monitor, investigate, and respond to security incidents, but each also specializes in one of these areas.
Dec 14, 2022   |  By Sumo Logic
Learn about Sumo Logic's various security solutions: Cloud Security Monitoring & Analytics, Cloud SIEM, and Cloud SOAR. Each solution can help monitor, investigate, and respond to security incidents, but each also specializes in one of these areas.
Nov 16, 2022   |  By Sumo Logic
Watch a quick overview of Incidents in Cloud SOAR.
Nov 10, 2022   |  By Sumo Logic
Learn how to automate the incident response cycle with a custom playbook in Sumo Logic Cloud SOAR.
Oct 19, 2022   |  By Sumo Logic
Learn how to automate and orchestrate incident response with Cloud SOAR's playbooks.
Sep 28, 2022   |  By Sumo Logic
Join Sumo Logic's own Security Consultant Matt Virga on the best ways to ensure a smooth Cloud SIEM experience from data normalization to ingest mappings.
Sep 27, 2022   |  By Sumo Logic
Instructor John Merideth leads our first Cloud SOAR live class instruction and at Illuminate 2022.
Sep 22, 2022   |  By Sumo Logic
From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.
Sep 20, 2022   |  By Sumo Logic
Tune in to this lively panel dialogue with security industry thought leaders exploring how securing modern applications as a part of digital transformation is disrupting traditional security people, processes, and technology practices. Dave Frampton, VP/GM of the Security Business at Sumo Logic, will moderate a discussion with Yaron Levi, CISO of Dolby Labs, and Tyson Martin, Principal Security Advisor for AWS, on how CISOs can play both a good offense and defense to navigate this transition.
Sep 20, 2022   |  By Sumo Logic
Getting FedRAMP authorization, and thus ensuring a secure environment for US government organizations, can be instrumental for your company. But there’s more than one way to make it happen, as evidenced by the varied approaches of HackerOne and Sumo Logic.
Nov 8, 2018   |  By Sumo Logic
Security information and event management (SIEM) solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Nov 1, 2018   |  By Sumo Logic
SIEM stands for Security Information and Event Management and these solutions have been around since 2000. They were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Oct 1, 2018   |  By Sumo Logic
In this paper we will discuss some of the general philosophies and perspectives that will assist anyone who wants to securely leverage the benefits the cloud by using its strengths to overcome issues that have traditionally been labeled as weaknesses.
Jul 1, 2018   |  By Sumo Logic
This white paper describes the technologies and processes used by Sumo Logic to secure customer data, and provides background on the company's deeply ingrained security culture.
Jun 1, 2018   |  By Sumo Logic
This white paper is intended to support stakeholders movement of applications to the cloud, and provide some fundamental approaches to adopt in order to better protect every layer of the AWS infrastructure.

Empowering the People Who Power Modern Business. A Cloud-native Machine Data Analytics Platform for DevSecOps.

Sumo Logic is a secure, cloud-native, machine data analytics service, delivering real-time, continuous intelligence from structured, semi-structured and unstructured data across the entire application lifecycle and stack.

Build, run and secure your AWS, Azure, Google Cloud Platform or Hybrid applications with Sumo Logic, a cloud-native, machine data analytics service for log management and time series metrics.

  • Optimize Continuous Delivery: Accelerate development, testing, & deployment of your application.
  • Monitor & Troubleshoot in Real Time: Enable DevOps to proactively identify and fix performance issues.
  • Secure Your Platform: Detect, investigate and respond to security issues instantly.
  • Simplify Compliance Management: Ensure compliance with HIPAA, PCI, GDPR and much more.

One platform for real-time, Continuous Intelligence.