Sumo Logic

Redwood City, CA, USA
Jul 27, 2022   |  By Peter Kazmir
Security analysts and administrators need every advantage to keep up with prioritizing and investigating alerts. A SIEM (security information and event management) solution helps uncover threats, but it takes a lot of time assigning and updating tags, criticality, and signal suppression. Sometimes users opt to skip the step altogether, especially if there are a lot of entities to add or update at once. Other times, they introduce errors during this manual step.
Jun 29, 2022   |  By Enrico Benzoni & Dana Torgersen
A common question we receive is: should security orchestration, automation and response (SOAR) replace security information and event management (SIEM)? While the two technologies share some common components, they serve different purposes. As security teams look to modernize their security operations center (SOC) to meet the demands of cloud environments, automation is the key priority. To that end, it’s vital to understand the roles of both SIEM and SOAR.
Jun 16, 2022   |  By Threat Labs
Monday, May 30th, 2022, Microsoft issued CVE-2022-30190 for a Remote Code Execution vulnerability with the Microsoft Support Diagnostic Tool (MSDT) in Windows: “A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application.
Jun 6, 2022   |  By Chas Clawson
One of the universal truths in technology is that security always lags behind innovation. Companies must move quickly as they seek to innovate, increase efficiencies and be disruptive in ever-crowded markets. Living on the bleeding edge means you will get a few cuts, but the risk of not adopting new technologies is greater than those of a few system failures or breaches. One challenge is that it is often not apparent what new risks exist until boundaries are pushed.
Jun 1, 2022   |  By Julian Crowley
With more and more organizations moving from traditional on-premises infrastructure to the cloud, it remains critical for organizations to have robust security monitoring, regardless of their cloud platform of choice. Sumo Logic Threat Labs has expanded our log parsing, mapping and detection rules for Microsoft Azure. While our Cloud SIEM has broad coverage for AWS and GCP platforms, we wanted to close the gap for Azure coverage, which previously addressed: Azure - Event Hub Deleted Signal Firing
May 17, 2022   |  By Melissa Sussmann
If you are an application developer or security analyst, you likely spend a lot of time thinking about your customers’ security. IT operations teams have found many ways to help secure login portals by implementing dual authentication and Single-Sign-On (SSO) portals. Many IT organizations have learned to use SSO and Two Factor Authentication (2FA) to help secure their codebase and employee data. This method is great, assuming that all users are compliant with 2FA.
Apr 30, 2022   |  By Dario Forte
I recently had the opportunity to discuss state-of-the-art technologies to support security operations with industry analysts. I asked questions and confirmed that the current view of SOAR (security orchestration, automation and response) and SIEM (security information and event management) goes well beyond the security operation center (SOC).
Apr 18, 2022   |  By Wyatt Nutter
Nowadays, it’s mostly a foregone conclusion that companies need a security program and centralized log aggregation and correlation platform. Unfortunately, the conversation all too often turns toward tactics for data collection and detection of specific threat actors or common vulnerabilities and exposures (CVEs).
Apr 14, 2022   |  By Enrico Benzoni & Dana Torgersen
Security professionals involved in the IT and cybersecurity industry for the last 10+ years have most likely come across the terms SIEM and recently SOAR, but there is still much confusion about what the specific use cases and purposes are. So, are these tools the same thing? Do security teams need one, the other, or both within their security operation center (SOC) infrastructure?
Mar 28, 2022   |  By Sumo Logic
The news that hacking group Lapsus$ gained unauthorized access to Single Sign-On (SSO) provider Okta through a third-party support account sent chills through information security professionals everywhere. Organizations have adopted SSO identity providers to enable a modern workforce that is increasingly reliant on secure access to cloud-hosted applications to perform critical business functions.
Aug 2, 2022   |  By Sumo Logic
Join our Geeks+Gurus of Sumo Logic for an interactive conversation on the current state of cybersecurity. In this 25-minute conversation, Dana Torgersen, Enrico Benzoni and Fabian Rodriguez will touch on the latest security technologies, the latest threats, and recent questions about security and compliance spending amidst recessionary conditions.
Jul 7, 2022   |  By Sumo Logic
In this 25-minute conversation, Enrico Benzoni interviews Dario Forte, Michele Zambelli and Andrea Fumagalli, to discuss the role of automation in today's cybersecurity landscape. Where is SOAR headed in 2022? How long does it take to get a SOAR project off the ground?
Jul 7, 2022   |  By Sumo Logic
Join the geeks+gurus of Sumo Logic for an interactive conversation on how cloud migration helps businesses innovate faster, modernize aging infrastructure, scale globally, and get continuous real-time insights—even from complex, multi-cloud architectures.
Jun 2, 2022   |  By Sumo Logic
Zero Trust is a modern, strategic approach to cybersecurity that secures organizations by eliminating implicit trust and continuously validating all interactions and experiences. Zero Trust moves cyber defenses from static, network-based perimeters to focus on users, assets, applications and resources without any implicit trust to enhance posture and reduce risk. At its core, Zero Trust is a perimeterless security approach.
May 26, 2022   |  By Sumo Logic
Learn how Threat Intel databases can help generate Signals in Sumo Logic's Cloud SIEM.
Apr 22, 2022   |  By Sumo Logic
Evolving cyber threats drive a growing need to achieve real-time situational awareness. Sumo Logic enables a cohesive security strategy by proactively identifying critical insights. Teams need a security monitoring solution that quickly detects potential threats, a modern cloud SIEM solution with contextualized threat insights and a cloud SOAR that automates incident management. Learn how Sumo Logic empowers security teams to modernize security operations.
Mar 3, 2022   |  By Sumo Logic
Learn how to normalize entities across data sources in Cloud SIEM with lookup tables you create and configure in Sumo Logic.
Feb 7, 2022   |  By Sumo Logic
This video shows you how to add and manage access keys using Sumo Logic.
Jan 25, 2022   |  By Sumo Logic
Learn whether you need to set up log mappings, parsers, or field extraction rules to get the most out of your data with Sumo Logic and Cloud SIEM.
Jan 21, 2022   |  By Sumo Logic
Modernizing security operations to handle current and evolving threats is critical to the success of every business. Sumo Logic Cloud SOAR is a security orchestration, automation and response solution used by enterprises and MSSPs to reduce incident response time, streamline workflows and boost SOC efficiency.
Nov 8, 2018   |  By Sumo Logic
Security information and event management (SIEM) solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Nov 1, 2018   |  By Sumo Logic
SIEM stands for Security Information and Event Management and these solutions have been around since 2000. They were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Oct 1, 2018   |  By Sumo Logic
In this paper we will discuss some of the general philosophies and perspectives that will assist anyone who wants to securely leverage the benefits the cloud by using its strengths to overcome issues that have traditionally been labeled as weaknesses.
Jul 1, 2018   |  By Sumo Logic
This white paper describes the technologies and processes used by Sumo Logic to secure customer data, and provides background on the company's deeply ingrained security culture.
Jun 1, 2018   |  By Sumo Logic
This white paper is intended to support stakeholders movement of applications to the cloud, and provide some fundamental approaches to adopt in order to better protect every layer of the AWS infrastructure.

Empowering the People Who Power Modern Business. A Cloud-native Machine Data Analytics Platform for DevSecOps.

Sumo Logic is a secure, cloud-native, machine data analytics service, delivering real-time, continuous intelligence from structured, semi-structured and unstructured data across the entire application lifecycle and stack.

Build, run and secure your AWS, Azure, Google Cloud Platform or Hybrid applications with Sumo Logic, a cloud-native, machine data analytics service for log management and time series metrics.

  • Optimize Continuous Delivery: Accelerate development, testing, & deployment of your application.
  • Monitor & Troubleshoot in Real Time: Enable DevOps to proactively identify and fix performance issues.
  • Secure Your Platform: Detect, investigate and respond to security issues instantly.
  • Simplify Compliance Management: Ensure compliance with HIPAA, PCI, GDPR and much more.

One platform for real-time, Continuous Intelligence.