Sumo Logic

Redwood City, CA, USA
2010
Sep 19, 2023   |  By Christopher Beier and Anton Ovrutsky
For many years, hackers and cybercriminals have used social engineering techniques to gain unauthorized access to confidential information. It is easy to predict that these attacks will continue to advance in sophistication and frequency. Whether they are using AI to create better lures or cyber criminals are just getting more adept at exploiting human nature, the success of these attacks proves the tactics are winning.
Sep 12, 2023   |  By Peter Kazmir
Playbooks — and automated processes in general — used to be associated primarily with security orchestration, automation and response (SOAR) platforms, but that has changed recently. Many modern security information and event management (SIEM) solutions have started incorporating SOAR-like functionality, enabling you to automate security workflows and improve your mean time to detect (MTTD) and mean time to respond (MTTR).
Aug 30, 2023   |  By JT Rakitan
What to expect when you’re expecting a cybersecurity audit for compliance A cybersecurity audit is a structured evaluation or assessment conducted to determine an organization's level of compliance with relevant cybersecurity regulations, industry standards and internal policies. Read on to learn what an audit is looking for, the challenges of an audit, how to prepare for one, and the tools that can help your organization get ready.
Aug 24, 2023   |  By Christopher Beier and Janet Alexander
Even the mightiest, most prestigious companies and enterprises are not exempt from the advanced threats of cyber attackers. In the ever-evolving cybersecurity threat landscape, an organization's security team like yours needs robust security measures for network security, endpoint security, threat detection, anomaly detection, data protection, security monitoring, application security and information security.
Aug 17, 2023   |  By Anton Ovrutsky
Consider the following scenario: you are asked by your leadership to find dedicated time for threat hunting activities within your network. After some time, access to the shiny new tool of choice is granted and you are super excited to get started. You log into the tool and are greeted with a lovely search bar; how do you proceed from here? The tool presenting the blank search bar is undoubtedly powerful and feature packed.
Aug 8, 2023   |  By Janet Alexander
So, you want to be a cybersecurity analyst. You’ll be pleased to know it’s a profession with a strong job outlook, thanks to the increasing importance of cybersecurity. With the rise in high-profile data breaches, privacy concerns and rapid technological advancements, there is a greater demand for cybersecurity analysts now than ever.
Jul 31, 2023   |  By Dana Torgersen
The U.S. Securities and Exchange Commission (SEC) announced new regulations for public companies requiring them to disclose a “material cybersecurity incident” via formal report due four business days after a company determines that a cybersecurity incident is material. This is creating a lot of buzz, with companies worried if they will be prepared.
Jul 18, 2023   |  By Chas Clawson
Within the security community of late, the focus has been on “shifting left”, and while that has merit, it is somewhat myopic missing some of the realities of defense in practice. Instead, I propose a simple framework to help guide initiatives that will “level up” defenses and greatly improve security postures wholistically. Some license is taken in terminology in order to keep things simple, memorable, and applicable.
Jun 26, 2023   |  By Anton Ovrutsky
For those responsible directly or indirectly for the cyber defense of their organizations, June 2023 is proving to be an extremely challenging month. In this month alone, vulnerabilities were discovered in various appliances, ranging from CVE-2023-27997 impacting FortiGate devices to CVE-2023-35708 impacting MOVEit Transfer software as well as the exploitation activity discovered of Barracuda appliances via CVE-2023-2868.
Jun 20, 2023   |  By Dana Torgersen
The financial outlook for the rest of 2023 and 2024 is far from cheery, and economic uncertainty is affecting everyone and everything, including the cybersecurity sector. Security budget cuts or freezes are the course many organizations are tempted to take in this financially precarious situation. Conservative spending is a natural response to the present economic downturn and a possible recession knocking on our doors, implying fewer clients, lower profits, and higher costs.
Sep 20, 2023   |  By Sumo Logic
Please join us as Peter teaches us about Sumo Logic's UEBA in Cloud SIEM Enterprise!
Sep 19, 2023   |  By Sumo Logic
Join this webinar with Sumo Logic and SANS to learn: What impact do human targets have on cybersecurity Why solving the human problem may ultimately be a technology problem Where AI/ML technologies can help security teams better understand human behaviors and protect the enterprise.
Sep 14, 2023   |  By Sumo Logic
In this video, we’ll show you some best practices for configuring and troubleshooting data set collection into Cloud SIEM using Sumo Logic parsers.
Aug 18, 2023   |  By Sumo Logic
In this session, David and Peter walk us through Sumo's new MITRE ATT&CK Coverage Explorer.
Jul 25, 2023   |  By Sumo Logic
In this session, Anton covers threat hunting/threat detection with Sumo Logic's Cloud SIEM Enterprise and Cloud Security Analytics.
Jul 17, 2023   |  By Sumo Logic
Learn about the App Central page for installing and managing integrations into Cloud SIEM Automation Service.
Jun 29, 2023   |  By Sumo Logic
Learn about using Cloud SIEM to define and automate smart actions, including enrichments and notifications, to quickly investigate, understand, and react to potential security threats.
Jun 23, 2023   |  By Sumo Logic
In this session, Lukasz covers rule tuning in Sumo Logic's Cloud SIEM Enterprise.
Nov 8, 2018   |  By Sumo Logic
Security information and event management (SIEM) solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Nov 1, 2018   |  By Sumo Logic
SIEM stands for Security Information and Event Management and these solutions have been around since 2000. They were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Oct 1, 2018   |  By Sumo Logic
In this paper we will discuss some of the general philosophies and perspectives that will assist anyone who wants to securely leverage the benefits the cloud by using its strengths to overcome issues that have traditionally been labeled as weaknesses.
Jul 1, 2018   |  By Sumo Logic
This white paper describes the technologies and processes used by Sumo Logic to secure customer data, and provides background on the company's deeply ingrained security culture.
Jun 1, 2018   |  By Sumo Logic
This white paper is intended to support stakeholders movement of applications to the cloud, and provide some fundamental approaches to adopt in order to better protect every layer of the AWS infrastructure.

Empowering the People Who Power Modern Business. A Cloud-native Machine Data Analytics Platform for DevSecOps.

Sumo Logic is a secure, cloud-native, machine data analytics service, delivering real-time, continuous intelligence from structured, semi-structured and unstructured data across the entire application lifecycle and stack.

Build, run and secure your AWS, Azure, Google Cloud Platform or Hybrid applications with Sumo Logic, a cloud-native, machine data analytics service for log management and time series metrics.

  • Optimize Continuous Delivery: Accelerate development, testing, & deployment of your application.
  • Monitor & Troubleshoot in Real Time: Enable DevOps to proactively identify and fix performance issues.
  • Secure Your Platform: Detect, investigate and respond to security issues instantly.
  • Simplify Compliance Management: Ensure compliance with HIPAA, PCI, GDPR and much more.

One platform for real-time, Continuous Intelligence.