{"id":109,"date":"2024-10-14T14:31:17","date_gmt":"2024-10-14T14:31:17","guid":{"rendered":"http:\/\/www.sumologic.com\/?page_id=109"},"modified":"2026-02-17T15:12:18","modified_gmt":"2026-02-17T23:12:18","slug":"threat-detection","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/solutions\/threat-detection","title":{"rendered":"Threat detection"},"content":{"rendered":"\n<section class=\"e-stn e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 e-stn--main-banner\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<p class=\"eyebrow has-ultramarine-blue-color has-text-color has-link-color wp-elements-eacac8f285dc3569b9655a4dcc263e53\">&lt; <a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-siem\" data-type=\"page\" data-id=\"22\">CLOUD SIEM<\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-8d1fc2dfd5775ba2e26974a80db5d494\" id=\"no-more-tradeoffs-get-both-speed-and-accuracy\">Detect, investigate, and respond\u2014Faster real-time threat intelligence.<\/h1>\n\n\n\n<p class=\"description has-chinese-silver-color has-text-color has-link-color wp-elements-68ee59f6238205b12ee2608ab50e1c49\">Get accurate, high-fidelity detections powered by behavioral analytics, MITRE ATT&amp;CK mapping, and automation\u2014so your security team can focus on stopping threats, not chasing alerts.<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/demo\/complete-threat-detection-investigation-and-response-demo\" target=\"_blank\">\n<p class=\"title\">TDIR Walkthrough<\/p>\n<\/a><\/div>\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/case-studies\/kobalt-io\" target=\"_self\">\n<p class=\"title\">Read Kobalt.io case study<\/p>\n<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"e-div e-div-c798c7a4466427637118b74d5226a20455577ae2 e-div--media-wrapper\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"458\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/hero-TDIR_651x458.png\" alt=\"Threat detection\" class=\"wp-image-9011\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-TDIR_651x458.png 651w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-TDIR_651x458-300x211.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-TDIR_651x458-575x405.png 575w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n<\/div>\n\n<div class=\"e-img e-img--section-bg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/main-banner-bg-blur.svg\" alt=\"\" class=\"wp-image-1076\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-bca39d0678b768d2f453e1f198650d89ee6f9557 e-stn--navigation-tabs e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-bca39d0678b768d2f453e1f198650d89ee6f9557 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #ffffffe0; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a8a430092d6301ca0b738e2949102462319d06f7  col-sm-12\">\n<div class=\"e-div e-div-06cdc3be1138087fcdd84f8d2519217157acd654 e-div--navigation-tabs-wrapper\">\n<p id=\"section-nav-1\">Dojo AI<\/p>\n\n\n\n<p id=\"section-nav-2\">MITRE ATT&amp;CK<\/p>\n\n\n\n<p id=\"section-nav-3\">UEBA<\/p>\n\n\n\n<p id=\"section-nav-4\">Threat intelligence<\/p>\n\n\n\n<p id=\"section-nav-5\">AI-driven triage<\/p>\n\n\n\n<p id=\"section-nav-6\">Entity Relationship Graph<\/p>\n\n\n\n<p id=\"section-nav-7\">Automation<\/p>\n\n\n\n<p id=\"section-nav-faq\">FAQ<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-3874a3fd946b4d9ca2dcd40be23053e3d1e7196c e-stn--dlt e-mt-0 e-pt-50  e-pt-sm-0 e-mb-0 e-pb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-3874a3fd946b4d9ca2dcd40be23053e3d1e7196c { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #fff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}@media only screen and (max-width: 1200px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-3874a3fd946b4d9ca2dcd40be23053e3d1e7196c { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}@media only screen and (max-width: 576px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-3874a3fd946b4d9ca2dcd40be23053e3d1e7196c { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-f5ce374d0251b1eeaae539dd91079af48af6ab5c  col-sm-9\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-c541c4e24d3ae4056ee0723a9a599406\" id=\"explore-modern-threat-detection-and-investigation\">Explore modern threat detection and investigation<\/h2>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-text-align-center has-delft-blue-color has-text-color has-link-color wp-elements-8c930ed7d08d8a17d25b023aa1da35b3\">Threat detection, investigation, and response (TDIR) in Cloud SIEM now includes the power of Dojo AI\u2014bringing explainable intelligence to every stage of the workflow. Advanced analytics, automation, and integrated threat intelligence help identify risks early, streamline investigation, and drive decisive action.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-1\" class=\"e-stn e-stn-dc63693cdf25c6a3c45a7960474df9791d3b2b5c e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-dc63693cdf25c6a3c45a7960474df9791d3b2b5c { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #fff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-715bee2ba74c6b325e1072bb2b8b7d0c\" id=\"secure-saas-and-cloud-based-applications\">Dojo AI: Accelerating security decisions<\/h2>\n\n\n\n<p>Sumo Logic Dojo AI is a multi-agent AI system built to power intelligent security operations and incident response. It is designed to act autonomously, keeping human analysts in the loop while continuously adapting to evolving threats.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/solutions\/dojo-ai\" target=\"_blank\">\n<p class=\"title\">Learn more<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_6e6c4eef9c10e567c2d6c0e69d618043\" class=\"wistia-video-block\" data-wistia-video=\"wistia_ic2g9slbwr\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/ic2g9slbwr.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='ic2g9slbwr']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/ic2g9slbwr\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"ic2g9slbwr\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_ic2g9slbwr\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/ic2g9slbwr\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_ic2g9slbwr\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-2\" class=\"e-stn e-stn-c283737d522fe85a630debd574f46357ccedbb47 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"browser-ui dark\">\n<figure class=\"browser-ui__wrap\">\n<img decoding=\"async\" class=\"browser-ui__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/sl-8bc01x9qnfjo.webp\" alt=\"\" width=\"1920\" height=\"1080\" loading=\"lazy\" title=\"\">\n\n\n<div id=\"storylane-block_559ebb9a3cb53a38d18adf898cd047ff\" class=\"storylane-block\"><button onclick=\"Storylane.Play({type:'popup', demo_type:'image', width:1920, height:1080, scale:'0.95', demo_url:'https:\/\/app.storylane.io\/demo\/8bc01x9qnfjo?embed=popup', padding_bottom:'calc(56.25% + 25px)'})\"\n                class=\"btn-left-icon__blue\">\n                Take a tour\n            <\/button><\/div><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-327bea3ab712e95315951a466a66cee7\" id=\"secure-saas-and-cloud-based-applications\">MITRE ATT&amp;CK alignment<\/h2>\n\n\n\n<p>Instantly understand the scope of detection with industry-leading 80% TTP coverage from our MITRE ATT&amp;CK Coverage Explorer, offering real-time insights on adversary tactics, empowering security teams to optimize rules and align defenses effectively.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/demo\/mitre-attack-coverage-explorer\" target=\"_self\">\n<p class=\"title\">View demo<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-c3b71dd69a650ae04f3a705a1afc25a7efb9c9fe e-stn--logo-bar-one e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-c3b71dd69a650ae04f3a705a1afc25a7efb9c9fe { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-59fc957c0cbce13601680a0270a309c356e82a00  col-sm-12 col-lg-4 col-xl-2\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color wp-elements-88946ea81a7664bff224223bee53f8a9\" id=\"trusted-by-more-than2-500-customers-globally\">Trusted by more than<br>2,500 customers globally<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-468811b45e42232c58293a7625e6ddd4d9ca1d38  col-sm-12 col-lg-8 col-xl-10\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"24\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/bugcrowd-logo-blk.svg\" alt=\"\" class=\"wp-image-26425\" title=\"\"><\/figure>\n<\/div>\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"99\" height=\"24\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hashicorp-logo-blk.svg\" alt=\"\" class=\"wp-image-26241\" title=\"\"><\/figure>\n<\/div>\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"26\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/logo-grammarly-blk.svg\" alt=\"\" class=\"wp-image-23226\" title=\"\"><\/figure>\n<\/div>\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"154\" height=\"24\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/netskope-logo-blk.svg\" alt=\"\" class=\"wp-image-26352\" title=\"\"><\/figure>\n<\/div>\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"103\" height=\"19\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/logo-Samsung.svg\" alt=\"\" class=\"wp-image-23228\" style=\"width:125px;height:auto\" title=\"\"><\/figure>\n<\/div>\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"75\" height=\"24\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/sega-logo-blk.svg\" alt=\"\" class=\"wp-image-26340\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<style>\n.e-stn--logo-bar-one:after {display:none;}\n.e-stn--logo-bar-one {border-top: 1px solid #e3e6ea; border-bottom: 1px solid #e3e6ea;}\n<\/style>\n\n\n\n<section id=\"section-3\" class=\"e-stn e-stn-a3bbd15449d5fc3c408366b64e30d60b24db9b27 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-a3bbd15449d5fc3c408366b64e30d60b24db9b27 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #fff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-883ce99055d9330b683a15c5055d803e\" id=\"secure-saas-and-cloud-based-applications\">Insider threat detection<\/h2>\n\n\n\n<p>Detect insider threats with confidence using UEBA baselining. Sumo Logic learns behavior patterns in minutes and uses historical baselines to flag anomalies like unusual access or data movement\u2014reducing noise and improving accuracy.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/trx416x3jm\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Watch video<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_d1ee50890a474e1c07df5b6d041da44f\" class=\"wistia-video-block\" data-wistia-video=\"wistia_trx416x3jm\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/trx416x3jm.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='trx416x3jm']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/trx416x3jm\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"trx416x3jm\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_trx416x3jm\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/trx416x3jm\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_trx416x3jm\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-4\" class=\"e-stn e-stn-96d0c63b6b6cb5c683e62eb0e0e66df2e5ac91bb e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"556\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977-1024x556.jpg\" alt=\"\" class=\"wp-image-9014\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977-1024x556.jpg 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977-300x163.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977-768x417.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977-1536x834.jpg 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977-575x312.jpg 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Real-time_Incident_1800x977.jpg 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-10606d96d824370ce011c272006ce4ed\" id=\"secure-saas-and-cloud-based-applications\">Real-time streaming and enrichment<\/h2>\n\n\n\n<p>Cloud SIEM, powered by over 900 customizable rules, streamlines threat detection and response with reduced mean time to detect (MTTD) and alert management effort. Use real-time global threat intelligence to enrich all your high-severity alerts, with built-in premium feeds and input to bring your own feed for full context during triage.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/glossary\/threat-intelligence\" target=\"_self\">\n<p class=\"title\">Learn more<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-5\" class=\"e-stn e-stn-f3a60e70bb3b80ada5dc0f705a03fff056e838b1 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-f3a60e70bb3b80ada5dc0f705a03fff056e838b1 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #fff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-1262fbd640eeae12e651a8bdec0bb5c3\" id=\"secure-saas-and-cloud-based-applications\">AI-driven triage<\/h2>\n\n\n\n<p>The SOC Analyst Agent, within Dojo AI uses agentic AI to streamline triage and investigation. It delivers verdicts on alert severity and collects related activity into a clear context, helping analysts quickly understand impact and scope. By filtering out noise and repetitive reviews, analysts stay focused on real threats and respond more effectively, with consistent outcomes across teams.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/blog\/tuning-cloud-siem-machine-learning\" target=\"_blank\">\n<p class=\"title\">Read blog<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"587\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031-1024x587.jpg\" alt=\"\" class=\"wp-image-9021\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031-1024x587.jpg 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031-300x172.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031-768x440.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031-1536x880.jpg 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031-575x329.jpg 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI_Triage_1800x1031.jpg 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-6\" class=\"e-stn e-stn-6a728229c7c4a13eb4e3092bcc82f185aa5c5fac e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"browser-ui dark\">\n<figure class=\"browser-ui__wrap\">\n<img decoding=\"async\" class=\"browser-ui__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/sl-8bc01x9qnfjo.webp\" alt=\"\" width=\"1920\" height=\"1080\" loading=\"lazy\" title=\"\">\n\n\n<div id=\"storylane-block_559ebb9a3cb53a38d18adf898cd047ff\" class=\"storylane-block\"><button onclick=\"Storylane.Play({type:'popup', demo_type:'image', width:1920, height:1080, scale:'0.95', demo_url:'https:\/\/app.storylane.io\/demo\/8bc01x9qnfjo?embed=popup', padding_bottom:'calc(56.25% + 25px)'})\"\n                class=\"btn-left-icon__blue\">\n                Take a tour\n            <\/button><\/div><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-ccbb6ecc7d3bfa33b30f480510db46c7\" id=\"secure-saas-and-cloud-based-applications\">Entity Timelines and Entity Relationship Graphs<\/h2>\n\n\n\n<p>Focus on the central entity in a given Insight, along with any other entities that have had contact or communication within the designated period, to easily determine the blast radius at a glance. The Entity Timeline in Cloud SIEM provides a chronological view over a three-day period, helping track its actions before, during, and after incidents. The Entity Relationship Graph visualizes connections between the central entity and other entities within the same timeframe. Investigate cybersecurity incidents with a detailed, organized view of entity interactions and activities.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/h8qctolngx\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Watch video<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-7\" class=\"e-stn e-stn-932889a7feeb07beebfbd466b94db571e80ee4cd e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-932889a7feeb07beebfbd466b94db571e80ee4cd { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #fff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a3a313b7da9d97753b2894a57d70a55a11613955 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-lg-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-24412934bd98c33e901c8a5820ec45cc\" id=\"secure-saas-and-cloud-based-applications\">Instant remediation<\/h2>\n\n\n\n<p>Quickly prioritize, investigate, and better understand potential security threats with playbooks from our Automation Service that adds deeper context for investigations and automates notification workflows. You can easily execute response actions such as resetting an account or adding a domain to the firewall rules without leaving the Cloud SIEM user interface.<\/p>\n\n\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_a69a0013d03f41db9eaa2b764b7d842c\" class=\"wistia-video-block\" data-wistia-video=\"wistia_5xng27uxkl\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/5xng27uxkl.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='5xng27uxkl']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/5xng27uxkl\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"5xng27uxkl\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_5xng27uxkl\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/5xng27uxkl\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_5xng27uxkl\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"page-section resource-card-section gsbp-145a7c5 alignfull\">\n<div class=\"gsbp-cf6573f\">\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Additional resources<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper grid--3 mt-4\">\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/gartner-siem-critical-capabilities\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/meta-gartner-critical-capabilities-1200x628-fig3.webp\" alt=\"\" width=\"1200\" height=\"628\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">REport<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Gartner Critical Capabilities report<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download report<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/w60azeifw0\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-tcr_DW0Giyg-HD-2.jpg\" alt=\"\" width=\"1280\" height=\"718\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">video<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Brown Bag: Threat Hunting<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Watch video<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/blog\/tuning-cloud-siem-machine-learning\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-blog-Fine-tuning-Cloud-SIEM-social-1.jpg\" alt=\"\" width=\"1118\" height=\"628\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Fine-tuning Cloud SIEM detections through machine learning<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read blog<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/avalon-cyber\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-avalon.io_Color_Hero-Logo-2_600x400px.jpg\" alt=\"\" width=\"1304\" height=\"732\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">MSSP achieves 1,000% improvement in alert fidelity<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/netskope\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-netskope.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Automating insider threat monitoring<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/sps-commerce\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-SPS-Commerce_Logo-v2.jpg\" alt=\"\" width=\"652\" height=\"365\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Unified SIEM dashboard automates security investigations<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section id=\"section-faq\" class=\"e-stn e-stn-b804fec4852b1b767a153fcbcbf7af7f43a839e5 e-stn--faq-accordion\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-029c01502d78b7cff6900cd3b2a145337ca3a946  col-sm-12 col-md-4\">\n<h2 class=\"wp-block-heading has-delft-blue-color has-text-color has-link-color wp-elements-152c54c72ad88816c8399a2df60d129e\" id=\"faqstill-have-questions\">FAQ<br>Still have questions?<\/h2>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-1535be63930f7ed2ef76cc949c67e8736d5f40d3  col-sm-12 col-md-8\">\n<div class=\"faq-accordion\"><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is threat detection and response?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p><a href=\"https:\/\/www.sumologic.com\/glossary\/threat-detection-response\" data-type=\"glossary\" data-id=\"10769\">Threat detection<\/a>\u00a0allows a security team to quickly and accurately identify potential threats to the network, applications, or other assets within the network. This capability is essential for IT security analysts to respond effectively to incidents and mitigate damage.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">Why is threat detection important?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Identifying threats early allows IT teams to respond in real-time, which is essential for protecting network assets. Without timely threat detection, organizations risk data breaches and system compromises.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are the key aspects of threat detection and response?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Threat detection focuses on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying threats quickly and accurately<\/li>\n\n\n\n<li>Understanding potential threats in the cyber environment<\/li>\n\n\n\n<li>Employing effective security tools and response strategies to mitigate damage<\/li>\n<\/ul>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are some main challenges in threat detection and response?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Cybersecurity professionals face multiple challenges, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Endpoint Protection:<\/strong>\u00a0Managing security across diverse devices, especially with remote work and BYOD policies.<\/li>\n\n\n\n<li><strong>Network Detection:<\/strong>\u00a0Monitoring complex, encrypted networks to identify malicious activity.<\/li>\n\n\n\n<li><strong>Unknown Threats:<\/strong>\u00a0Handling advanced threats like AI-powered attacks that evade traditional detection.<\/li>\n\n\n\n<li><strong>Tool Sprawl:<\/strong>\u00a0Managing and integrating multiple security tools effectively.<\/li>\n\n\n\n<li><strong>Staffing Challenges:<\/strong>\u00a0Addressing a shortage of skilled cybersecurity professionals and leveraging third-party detection services if needed.<\/li>\n<\/ul>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">How does Sumo Logic enhance threat detection in cloud environments?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Sumo Logic helps organizations aggregate data, analyze patterns, and configure real-time alerts, allowing for automated response and faster recovery. Its platform leverages advanced machine learning and data protection to strengthen threat detection across cloud infrastructures<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What differentiates Sumo Logic threat detection and investigation from other solutions?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Here are some differentiating factors that set Sumo Logic apart from other solutions:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cloud-native architecture:<\/strong>\u00a0Sumo Logic is built on a cloud-native architecture, which means it is purpose-built for the cloud and designed to handle large-scale, high-velocity data ingestion without infrastructure management.<\/li>\n\n\n\n<li><strong>Log and machine data analytics:<\/strong>\u00a0Sumo Logic specializes in analyzing and correlating log and machine data from various sources, including systems, applications, network devices, and cloud services.<\/li>\n\n\n\n<li>Real-time threat intelligence feeds and leverages machine learning algorithms, enriching security event data for more accurate and proactive threat detection.<\/li>\n\n\n\n<li><strong>Anomaly detection and behavioral analytics:<\/strong>\u00a0Sumo Logic applies advanced analytics techniques, including machine learning and behavioral analytics, to detect anomalies and identify suspicious patterns of activity. It establishes baselines for normal behavior and alerts security teams when deviations or unusual activities are detected, helping to identify potential threats or insider attacks.<\/li>\n\n\n\n<li>Comprehensive data correlation and investigation that allows security teams to connect security events across different data sources.<\/li>\n\n\n\n<li>Cloud security visibility into cloud environments, including public cloud platforms like AWS, Azure, and GCP, with pre-built dashboards and analytics tailored for cloud security monitoring.<\/li>\n\n\n\n<li>Automated threat detection and incident response that automate the detection of security events, generates real-time alerts and triggers predefined workflows for incident response, enabling faster and more efficient incident resolution.<\/li>\n\n\n\n<li><strong>Collaboration and SOC integration:<\/strong>\u00a0Sumo Logic supports collaboration among security teams by providing centralized dashboards, shared workspaces, and incident management features. It facilitates integration with Security Operations Centers (SOCs) and existing security toolsets, enabling seamless workflows and information sharing for effective threat detection and response.<\/li>\n\n\n\n<li>Compliance and audit support with pre-built compliance dashboards, reports, and log analysis capabilities that assist in demonstrating adherence to security standards and regulations.<\/li>\n<\/ol>\n<\/div>\n                    <\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-fe811fee8d6d22b3b1d244ed955c2ecc\" id=\"unify-detection-and-response-with-the-siem-that-connects-the-dots\">Unify detection and response with the SIEM that connects the dots<\/h2>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-dc612c24944d3f4d9ea2a0bce9dce077\" style=\"color:#ffffff\">Cut investigation time, enrich alerts with threat intel, and automate actions\u2014without complexity.<\/p>\n\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/sign-up\" target=\"_self\">\n<p class=\"title\">Get started<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-1151\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":24887,"parent":11298,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"3","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-145a7c5{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative}.gsbp-cf6573f{max-width:100%;width:1380px}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-109","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":62,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/109\/revisions"}],"predecessor-version":[{"id":69961,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/109\/revisions\/69961"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/11298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/24887"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}