{"id":10482,"date":"2025-02-28T16:16:25","date_gmt":"2025-03-01T00:16:25","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=resource&#038;p=10482"},"modified":"2026-03-04T17:13:53","modified_gmt":"2026-03-05T01:13:53","slug":"ascential","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/case-studies\/ascential","title":{"rendered":"Ascential"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"results-at-a-glance\">Results at a glance<\/h3>\n\n\n\n<div class=\"wp-block-greenshift-blocks-iconlist gspb_iconsList gspb_iconsList-id-gsbp-4a24fcd\" id=\"gspb_iconsList-id-gsbp-4a24fcd\"><div class=\"gspb_iconsList__item\" data-id=\"0\"><svg class=\"\" style=\"display:inline-block;vertical-align:middle\" width=\"18\" height=\"18\" viewBox=\"0 0 1024 1024\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path style=\"fill:#565D66\" d=\"M871.696 166.932l-526.088 526.088-193.304-193.304c-9.372-9.372-24.568-9.372-33.942 0l-56.568 56.568c-9.372 9.372-9.372 24.568 0 33.942l266.842 266.842c9.372 9.372 24.568 9.372 33.942 0l599.626-599.626c9.372-9.372 9.372-24.568 0-33.942l-56.568-56.568c-9.372-9.372-24.568-9.372-33.94 0z\"><\/path><\/svg><span class=\"gspb_iconsList__item__text\">Reduced time to detect with quick visibility into security issues<\/span><\/div><\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-iconlist gspb_iconsList gspb_iconsList-id-gsbp-0bb5ad2\" id=\"gspb_iconsList-id-gsbp-0bb5ad2\"><div class=\"gspb_iconsList__item\" data-id=\"0\"><svg class=\"\" style=\"display:inline-block;vertical-align:middle\" width=\"18\" height=\"18\" viewBox=\"0 0 1024 1024\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path style=\"fill:#565D66\" d=\"M871.696 166.932l-526.088 526.088-193.304-193.304c-9.372-9.372-24.568-9.372-33.942 0l-56.568 56.568c-9.372 9.372-9.372 24.568 0 33.942l266.842 266.842c9.372 9.372 24.568 9.372 33.942 0l599.626-599.626c9.372-9.372 9.372-24.568 0-33.942l-56.568-56.568c-9.372-9.372-24.568-9.372-33.94 0z\"><\/path><\/svg><span class=\"gspb_iconsList__item__text\">Expedited response actions with clear, concise root cause information<\/span><\/div><\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-iconlist gspb_iconsList gspb_iconsList-id-gsbp-a617356\" id=\"gspb_iconsList-id-gsbp-a617356\"><div class=\"gspb_iconsList__item\" data-id=\"0\"><svg class=\"\" style=\"display:inline-block;vertical-align:middle\" width=\"18\" height=\"18\" viewBox=\"0 0 1024 1024\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path style=\"fill:#565D66\" d=\"M871.696 166.932l-526.088 526.088-193.304-193.304c-9.372-9.372-24.568-9.372-33.942 0l-56.568 56.568c-9.372 9.372-9.372 24.568 0 33.942l266.842 266.842c9.372 9.372 24.568 9.372 33.942 0l599.626-599.626c9.372-9.372 9.372-24.568 0-33.942l-56.568-56.568c-9.372-9.372-24.568-9.372-33.94 0z\"><\/path><\/svg><span class=\"gspb_iconsList__item__text\">Adopted DevSecOps practice with security integrated into application development<\/span><\/div><\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-iconlist gspb_iconsList gspb_iconsList-id-gsbp-1d29c35\" id=\"gspb_iconsList-id-gsbp-1d29c35\"><div class=\"gspb_iconsList__item\" data-id=\"0\"><svg class=\"\" style=\"display:inline-block;vertical-align:middle\" width=\"18\" height=\"18\" viewBox=\"0 0 1024 1024\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path style=\"fill:#565D66\" d=\"M871.696 166.932l-526.088 526.088-193.304-193.304c-9.372-9.372-24.568-9.372-33.942 0l-56.568 56.568c-9.372 9.372-9.372 24.568 0 33.942l266.842 266.842c9.372 9.372 24.568 9.372 33.942 0l599.626-599.626c9.372-9.372 9.372-24.568 0-33.942l-56.568-56.568c-9.372-9.372-24.568-9.372-33.94 0z\"><\/path><\/svg><span class=\"gspb_iconsList__item__text\">Increased brand reputation and trust with robust security practices<\/span><\/div><\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-iconlist gspb_iconsList gspb_iconsList-id-gsbp-2b1a2e4\" id=\"gspb_iconsList-id-gsbp-2b1a2e4\"><div class=\"gspb_iconsList__item\" data-id=\"0\"><svg class=\"\" style=\"display:inline-block;vertical-align:middle\" width=\"18\" height=\"18\" viewBox=\"0 0 1024 1024\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path style=\"fill:#565D66\" d=\"M871.696 166.932l-526.088 526.088-193.304-193.304c-9.372-9.372-24.568-9.372-33.942 0l-56.568 56.568c-9.372 9.372-9.372 24.568 0 33.942l266.842 266.842c9.372 9.372 24.568 9.372 33.942 0l599.626-599.626c9.372-9.372 9.372-24.568 0-33.942l-56.568-56.568c-9.372-9.372-24.568-9.372-33.94 0z\"><\/path><\/svg><span class=\"gspb_iconsList__item__text\">Optimized product value and ROI through a win-win partnership<\/span><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"challenge\">Challenge<\/h3>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"with-a-multi-cloud-environment-ascential-needed-to-centralize-visibility-across-its-teams-and-processes-to-quickly-detect-security-incidents\">With a multi-cloud environment, Ascential needed to centralize visibility across its teams and processes to quickly detect security incidents.<\/h5>\n\n\n\n<p>With a broad portfolio of SaaS-based software products, Ascential runs a large amount of infrastructure on AWS with smaller footprints on Microsoft Azure and Google Cloud Platform.<\/p>\n\n\n\n<p>The company wanted to ensure its security, DevOps and operational management tools were providing the right level of security to protect the data that resides across Ascential\u2019s multi-cloud environment. Obtaining real-time security insights across the company\u2019s ecosystem was a top priority. This central visibility and early detection of security incidents was also essential to the company from a governance and regulatory standpoint.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"solution\">Solution<\/h3>\n\n\n\n<p>Ascential adopted Sumo Logic Cloud SIEM as a critical component of the company\u2019s policies, processes and tools that protect its environment. \u201cSumo Logic Cloud SIEM is an important part of our security practices. It enables us to demonstrate, as an organization, that we take security seriously and that we\u2019re always creating an environment that is safe for ourselves and our customers,\u201d said Sean Harley, EVP &amp; CIO at Ascential.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div id=\"customer-info-block_e51f1cca31ff9cb01cd4d14c792b8cb3\" class=\"customer-info-block\"><div class=\"content-testimonial-block-wrapper blue headshot\"><div class=\"content-testimonial-block-item\"><div class=\"content-testimonial-block-item__rail\"><\/div><div class=\"content-testimonial-block-item__content\"><div class=\"content-testimonial-block-item__top\"><figure class=\"content-testimonial-block-item__headshot-wrap\">\n                                <img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/headshot_Quote_Ascential_2023-08-09-212132_lntf.png\" alt=\"Sean Harley\" class=\"content-testimonial-block-item__headshot\" title=\"\"><\/figure><\/figure><div class=\"content-testimonial-block-item__name-wrap\"><p class=\"content-testimonial-block-item__name\">Sean Harley<\/p><p class=\"content-testimonial-block-item__title\">EVP &amp; CIO<\/p><\/div><\/div><div class=\"content-testimonial-block-item__quote\"><div class=\"content-testimonial-block-item__quote-text\">\u201cSumo Logic is at the heart of our DevSecOps strategy to bring security central to the application development functions and give us the data for our decision making.\n\u201d<\/div><\/div><div class=\"content-testimonial-block-item__logo-wrap\"><a href=\"https:\/\/www.sumologic.com\/case-studies\/ascential\" class=\"content-testimonial-block-item__logo-link\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/ascential-logo-wht.svg\" alt=\"Sean Harley logo\" class=\"content-testimonial-block-item__logo\" title=\"\"><\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"results\">Results<\/h3>\n\n\n\n<p><strong>Empowering the SOC team\u2019s security insights and threat hunting<\/strong><\/p>\n\n\n\n<p>Ascential has wide-ranging tools in its security stack and each includes a range of disparate logging and monitoring capabilities. Through Cloud SIEM\u2019s support for ingesting data from a variety of tools, the platform aggregates Ascential\u2019s security technologies and enriches logs to provide central security monitoring and contextualized insights. As a result, Ascential\u2019s 24\/7 multi-regional SOC team is equipped with the information they need to quickly identify issues and act on them.<\/p>\n\n\n\n<p>\u201cWe\u2019ve improved our time to detect issues and our capability to respond to alerts using Cloud SIEM, which allows us to effectively cut through all the noise we see across our estate and advance our security posture. The platform is also essential for our threat hunting practice and equips our SOC team with a proactive approach to identify and respond to threats,\u201d said Harley.<\/p>\n\n\n\n<p><strong>Demonstrating brand trust for customers<\/strong><\/p>\n\n\n\n<p>With Cloud SIEM in place serving as the backbone of the SOC team\u2019s visibility into security issues, Ascential can demonstrate robust security practices to its customers and auditors. Likewise, through the platform\u2019s central dashboards, the team has captured robust visibility and governance across its many security tools.<\/p>\n\n\n\n<p>\u201cCloud SIEM is a big part of our demonstrating strong security practices for our internal and external audits, as well as showing that we\u2019re securing our environment to keep customer data safe,\u201d said Harley, adding that \u201cthis also builds trust in our brand and is an element that\u2019s part of our RFPs and sales process.\u201d<\/p>\n\n\n\n<p><strong>Cloud SIEM enables DevSecOps journey<\/strong><\/p>\n\n\n\n<p>Since adopting Cloud SIEM, Ascential\u2019s security practices have expanded from the SOC team to include considerations for security as part of the software development and business operations. This has empowered Ascential to incorporate security into the software development lifecycle and to instill a culture of security through awareness training of the company\u2019s engineering team and general staff.<\/p>\n\n\n\n<p>\u201cWe\u2019re combining awareness and tooling on our journey to move to DevSecOps, and the Cloud SIEM capabilities really help us move this journey forward. Sumo Logic is at the heart of our DevSecOps strategy to bring security central into the application development functions and give us the data for our decision making,\u201d said Harley.<\/p>\n\n\n\n<p><strong>Realizing full value through a strong vendor relationship<\/strong><\/p>\n\n\n\n<p>As with all technology investments, Ascential needs to get full value from their Cloud SIEM platform. As one of Ascential\u2019s strategic partners, Sumo Logic embraces this goal and works closely with the SOC team to perform regular health checks and recommend areas where new features can benefit the company.<\/p>\n\n\n\n<p>\u201cOur partnership with Sumo Logic is a win-win from my perspective. With Sumo, we can demonstrate to our Board and finance teams that we are getting true value from our product purchase,\u201d said Harvey.<\/p>\n\n\n\n<div id=\"wistia-block_9d1e1dd94c42e295dd75a6903595e06b\" class=\"wistia-video-block\" data-wistia-video=\"wistia_jmvxsasfq9\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/jmvxsasfq9.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='jmvxsasfq9']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/jmvxsasfq9\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"jmvxsasfq9\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_jmvxsasfq9\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/jmvxsasfq9\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_jmvxsasfq9\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>With a multi-cloud environment, Ascential needed to centralize visibility across its teams and processes. Learn how they reduced time to detect and adopted a DevSecOps practice.<\/p>\n","protected":false},"author":4,"featured_media":56728,"template":"","meta":{"_acf_changed":true,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"3","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[29],"resource-solution":[52,56],"translation_priority":[221]},"selected_primary_terms":{"resource-type":[],"resource-solution":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"#gspb_iconsList-id-gsbp-4a24fcd.gspb_iconsList .gspb_iconsList__item__text{margin-left:15px}#gspb_iconsList-id-gsbp-4a24fcd.gspb_iconsList .gspb_iconsList__item{display:flex;flex-direction:row;align-items:center;position:relative}#gspb_iconsList-id-gsbp-0bb5ad2.gspb_iconsList .gspb_iconsList__item svg path,#gspb_iconsList-id-gsbp-1d29c35.gspb_iconsList .gspb_iconsList__item svg path,#gspb_iconsList-id-gsbp-2b1a2e4.gspb_iconsList .gspb_iconsList__item svg path,#gspb_iconsList-id-gsbp-4a24fcd.gspb_iconsList .gspb_iconsList__item svg path,#gspb_iconsList-id-gsbp-a617356.gspb_iconsList .gspb_iconsList__item svg path{fill:#2184f9!important}#gspb_iconsList-id-gsbp-0bb5ad2.gspb_iconsList [data-id='0'] svg,#gspb_iconsList-id-gsbp-1d29c35.gspb_iconsList [data-id='0'] svg,#gspb_iconsList-id-gsbp-2b1a2e4.gspb_iconsList [data-id='0'] svg,#gspb_iconsList-id-gsbp-4a24fcd.gspb_iconsList [data-id='0'] svg,#gspb_iconsList-id-gsbp-a617356.gspb_iconsList [data-id='0'] svg,body #gspb_iconsList-id-gsbp-0bb5ad2.gspb_iconsList .gspb_iconsList__item img,body #gspb_iconsList-id-gsbp-0bb5ad2.gspb_iconsList .gspb_iconsList__item svg,body #gspb_iconsList-id-gsbp-1d29c35.gspb_iconsList .gspb_iconsList__item img,body #gspb_iconsList-id-gsbp-1d29c35.gspb_iconsList .gspb_iconsList__item svg,body #gspb_iconsList-id-gsbp-2b1a2e4.gspb_iconsList .gspb_iconsList__item img,body #gspb_iconsList-id-gsbp-2b1a2e4.gspb_iconsList .gspb_iconsList__item svg,body #gspb_iconsList-id-gsbp-4a24fcd.gspb_iconsList .gspb_iconsList__item img,body #gspb_iconsList-id-gsbp-4a24fcd.gspb_iconsList .gspb_iconsList__item svg,body #gspb_iconsList-id-gsbp-a617356.gspb_iconsList .gspb_iconsList__item img,body #gspb_iconsList-id-gsbp-a617356.gspb_iconsList .gspb_iconsList__item svg{margin:0!important}#gspb_iconsList-id-gsbp-0bb5ad2.gspb_iconsList .gspb_iconsList__item__text{margin-left:15px}#gspb_iconsList-id-gsbp-0bb5ad2.gspb_iconsList .gspb_iconsList__item{display:flex;flex-direction:row;align-items:center;position:relative}#gspb_iconsList-id-gsbp-a617356.gspb_iconsList .gspb_iconsList__item__text{margin-left:15px}#gspb_iconsList-id-gsbp-a617356.gspb_iconsList .gspb_iconsList__item{display:flex;flex-direction:row;align-items:center;position:relative}#gspb_iconsList-id-gsbp-1d29c35.gspb_iconsList .gspb_iconsList__item__text{margin-left:15px}#gspb_iconsList-id-gsbp-1d29c35.gspb_iconsList .gspb_iconsList__item{display:flex;flex-direction:row;align-items:center;position:relative}#gspb_iconsList-id-gsbp-2b1a2e4.gspb_iconsList .gspb_iconsList__item__text{margin-left:15px}#gspb_iconsList-id-gsbp-2b1a2e4.gspb_iconsList .gspb_iconsList__item{display:flex;flex-direction:row;align-items:center;position:relative}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"3185,3180,3170","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[29],"resource-solution":[52,56],"class_list":["post-10482","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-case-studies","resource-solution-devops-and-it-operations","resource-solution-secops-and-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource\/10482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/56728"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=10482"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource-type?post=10482"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/resource-solution?post=10482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}