{"id":111,"date":"2024-10-14T14:31:41","date_gmt":"2024-10-14T14:31:41","guid":{"rendered":"http:\/\/www.sumologic.com\/?page_id=111"},"modified":"2026-02-17T15:11:59","modified_gmt":"2026-02-17T23:11:59","slug":"security-data-lake","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/solutions\/security-data-lake","title":{"rendered":"Security data lake"},"content":{"rendered":"\n<section class=\"e-stn e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 e-stn--main-banner\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<p class=\"eyebrow has-chinese-silver-color has-text-color has-link-color wp-elements-b3c381a1bf727c4e22f8f53b47d0c22a\">Centralized Data Storage and Analysis<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-5b992d1648c7208d9d1849facb2c76d3\" id=\"security-data-lake-collect-store-search-and-analyze-data\">Security data lake: Collect, store, search and analyze data<\/h1>\n\n\n\n<p class=\"description has-chinese-silver-color has-text-color has-link-color wp-elements-d8355ee9b50ba9dd5236535fce30739c\">Store and use unstructured and structured data in a single security data lake. Cost-effectively demonstrate compliance plus threat detection and investigation from a central, secured location.<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/sign-up\" target=\"_self\">\n<p class=\"title\">Start free trial<\/p>\n<\/a><\/div>\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/case-studies\/medidata\" target=\"_self\">\n<p class=\"title\">Read case study<\/p>\n<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"e-div e-div-c798c7a4466427637118b74d5226a20455577ae2 e-div--media-wrapper\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"762\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/hero-Security-data-lake_hero_850x762.jpg\" alt=\"Security data lake\" class=\"wp-image-9030\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-Security-data-lake_hero_850x762.jpg 850w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-Security-data-lake_hero_850x762-300x269.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-Security-data-lake_hero_850x762-768x688.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-Security-data-lake_hero_850x762-575x515.jpg 575w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n<\/div>\n\n<div class=\"e-img e-img--section-bg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/main-banner-bg-blur.svg\" alt=\"\" class=\"wp-image-1076\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-4421f0efb7208860225ddb95499588c0a6594896 e-stn--accordion-white e-mt-0\"><style><\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-b2198d814819fb1dc680a4d10879e48e892964e7  col-sm-8\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-89f52fcfebf1362de1e73453a65fc067\" id=\"save-time-and-money-with-centralized-data-storage-and-analysis\">Save time and money with centralized data storage and analysis<\/h2>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-text-align-center has-delft-blue-color has-text-color has-link-color wp-elements-46b044bc4e23faf33448d68dc9864525\">Sumo Logic stores and provides full visibility and security analytics for your primary security data lakes and log data in one location for more effective threat detection and threat hunting.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-a8a430092d6301ca0b738e2949102462319d06f7  col-sm-12\"><div class=\"e-acc e-acc--dlt  has-float-panel\" data-settings='{\"forceExpand\":false,\"toggleMode\":true,\"colBreakPoint\":992,\"floatPanel\":true,\"autoSlide\":false,\"autoPlayInterval\":3000,\"pauseOnFocus\":true}' data-accordion='e-acc_69d879278ba15'><div class=\"e-acc__itms-wrpr\"><div class=\"e-acc__itm-wrpr  active\" data-item-id='e-acc-itm-id-5'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-5'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"simplified-data-security\">Simplified data security<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-5' style='display:block'><div class=\"e-acc__itm-bdy\">\n<p>Sumo Logic provides maximum flexibility with our vendor-agnostic data collection and storage of security logs, combined with domain-agnostic analytics.<\/p>\n<\/div><\/div><div class=\"e-acc__flt-itm-wrpr  active\" data-id='e-acc-itm-id-5'\n        id='float_panel_e-acc-itm-id-5'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage-1024x584.png\" alt=\"\" class=\"wp-image-9031\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage-1024x584.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage-300x171.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage-768x438.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage-1536x876.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage-575x328.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-centralized-data-storage.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-6'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-6'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"compliant-data-lake-security\">Compliant data lake security<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-6' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Ensure your data lake security meets audit requirements. With Sumo Logic, data is ingested and managed in a secure and compliant manner right out of the box. We maintain rigorous compliance certifications, including HIPAA, FISMA, SOC 2 Type II, GDPR and FedRAMP\u2122, at no additional charge to ensure your data are safe. Sumo Logic is also a certified PCI-DSS Level 1 Service Provider.<\/p>\n<\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-6'\n        id='float_panel_e-acc-itm-id-6'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"616\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured-1024x616.png\" alt=\"\" class=\"wp-image-9032\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured-1024x616.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured-300x181.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured-768x462.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured-1536x924.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured-575x346.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Your-data-secured.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-7'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-7'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"ai-driven-investigation-and-response\">Scalable, cost-effective log management<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-7' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Data Tier options allow you to store sensitive data for threat detection and first-level investigations alongside your high-volume data for extensive threat investigations.<\/p>\n<\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-7'\n        id='float_panel_e-acc-itm-id-7'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"668\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable-1024x668.png\" alt=\"\" class=\"wp-image-9033\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable-1024x668.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable-300x196.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable-768x501.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable-1536x1002.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable-575x375.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Scalable.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-8'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-8'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"ai-driven-investigation-and-response\">Cloud-native platform<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-8' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Sumo Logic\u2019s cloud-native SaaS platform enables cross-team collaboration between development and security teams as they work to make their apps reliable and secure.<\/p>\n<\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-8'\n        id='float_panel_e-acc-itm-id-8'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"608\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform-1024x608.png\" alt=\"\" class=\"wp-image-9034\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform-1024x608.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform-300x178.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform-768x456.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform-1536x912.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform-575x341.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Cloud-native-platform.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><div class=\"e-acc__itm-wrpr\" data-item-id='e-acc-itm-id-9'><div class=\"e-acc__itm\"><div class=\"e-acc__itm-hdr-wrpr\" data-toggle='collapse' data-target='e-acc-itm-id-9'><div class=\"e-acc__itm-hdr\">\n<h3 class=\"wp-block-heading\" id=\"ai-driven-investigation-and-response\">Amazon Security Lake<\/h3>\n<\/div><\/div><div class=\"e-acc__itm-bdy-wrpr\" id='e-acc-itm-id-9' style='display: none'><div class=\"e-acc__itm-bdy\">\n<p>Sumo Logic ingests data from Amazon Security Lake to gain transparency across all Amazon Web Services environments while providing full visibility into your existing on-premises and multi-cloud environments.<\/p>\n<\/div><\/div><div class=\"e-acc__flt-itm-wrpr\" data-id='e-acc-itm-id-9'\n        id='float_panel_e-acc-itm-id-9'><div class=\"e-acc__flt-itm\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"543\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon-1024x543.png\" alt=\"\" class=\"wp-image-9035\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon-1024x543.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon-300x159.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon-768x407.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon-1536x814.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon-575x305.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-data-lake-Amazon.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div><\/div> <div class=\"e-acc__flt-itms-wrpr\" ><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"page-section resource-card-section gsbp-585e707 alignfull\" id=\"section-6\">\n<div>\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Additional resources<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper mt-3 grid--3\">\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/gartner-siem-critical-capabilities\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/meta-gartner-critical-capabilities-1200x628-fig3.webp\" alt=\"\" width=\"1200\" height=\"628\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">REport<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Gartner Critical Capabilities report<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download report<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/security-data-lake-guide\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-security-data-lake-thumb-v2.jpg\" alt=\"\" width=\"652\" height=\"367\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">brief<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">How to collect, store, search and analyze your data<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download brief<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/cgbe4nqpgp\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb_platform_resource.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">video<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Your data is safe<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Watch video<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/solutions\/audit-compliance\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Compliance.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">solution<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Sumo Logic for audit and compliance<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Learn more<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/guides\/siem-evaluation\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Header_Art-1_2024-01-03-225420_dnbu-copy-2.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Guide<\/div>\n\n\n\n<h3 class=\"resource-block__heading\"><strong>How to evaluate SIEM solutions<\/strong><\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read guide<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/solutions\/cloud-siem\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-solution-siem-hero.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Solution<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Cloud-native SIEM for cloud-native threats<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Learn more<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section id=\"section-7\" class=\"e-stn e-stn-6c51ddd2b8dd9ec12d632c35a61b62586cd316c6 e-stn--faq-accordion\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-029c01502d78b7cff6900cd3b2a145337ca3a946  col-sm-12 col-md-4\">\n<h2 class=\"wp-block-heading has-delft-blue-color has-text-color has-link-color wp-elements-152c54c72ad88816c8399a2df60d129e\" id=\"faqstill-have-questions\">FAQ<br>Still have questions?<\/h2>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-1535be63930f7ed2ef76cc949c67e8736d5f40d3  col-sm-12 col-md-8\">\n<div class=\"faq-accordion\"><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are the differences between a data warehouse vs. security data lake?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>The main areas of difference between a data warehouse and a<a href=\"https:\/\/www.secureworld.io\/industry-news\/unleashing-power-security-data-lake\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0security data lake\u00a0<\/a>are purpose, data handling and architecture. Data warehouses are designed for structured historical data to support business intelligence and decision-making processes, whereas security data lakes are optimized for handling vast amounts of raw, diverse security-related data for advanced analytics, threat detection and incident response. Security data lakes also provide the benefit that the data stored there can be structured, unstructured and semi-structured, all available on tap for quick and easy access.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">Can I build my own security data lake?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Yes, a company can build its own\u00a0<a href=\"https:\/\/medium.com\/anton-on-security\/why-your-security-data-lake-project-will-well-actually-78e0e360c292\" target=\"_blank\" rel=\"noreferrer noopener\">security data lake<\/a>. But it is complex and resource-intensive. Building a security data lake involves setting up a flexible and scalable repository to store raw and unprocessed security-related data from various sources within the organization. Companies should consider the long-term costs and resource commitments involved in building and managing a custom security data lake compared to utilizing existing cloud-based data lake services or specialized security data lake solutions provided by vendors.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">How long can I retain data in Sumo Logic\u2019s security data lake?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p><a href=\"https:\/\/help.sumologic.com\/docs\/manage\/partitions-data-tiers\/manage-indexes-variable-retention\/\" target=\"_blank\" rel=\"noopener\">With Sumo Logic<\/a>, you can keep the data you need for virtually as long as you need it, while other less important data can be retained for a shorter period, reducing your overall cost of operation. Set a data retention period and edit it at any time. The minimum retention period is one day, and the maximum retention period is 5,000 days, which easily surpasses even the most lengthy data retention requirements for even the most stringent\u00a0<a href=\"https:\/\/www.sumologic.com\/solutions\/audit-compliance\" data-type=\"page\" data-id=\"18\">compliance frameworks<\/a>.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">How do I know my data is protected in Sumo Logic\u2019s security data lake?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>All data are ingested into Sumo Logic is managed in a secure and compliant manner right out of the box. More than 2,400 companies and organizations use and trust our cloud-native platform, which employs AES-256 encryption to protect data at rest and TLS for data in transit, with security controls at every application layer and a zero-trust segmentation model.<\/p>\n\n\n\n<p>Sumo Logic maintains multiple compliance certifications\u2014including PCI-DSS and HIPAA certifications, ISO 27001, FedRAMP Moderate Authorization, and SOC 2 Type 2 attestation. Sumo Logic also works directly with top security industry auditors and offers a paid bug bounty program with HackerOne. Plus, we also have a full-time dedicated team performing continuous and ongoing software reviews and penetration testing to keep our customers\u2019 data safe and secure. We spend millions annually to maintain these attestations, which in turn is extended to our customers free of charge.<\/p>\n<\/div>\n                    <\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-c229dcf9803e0ab331592d96864a3bab\" id=\"safely-store-monitor-and-analyze-all-your-security-data\">Safely store, monitor and analyze all your security data<\/h2>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-db948e59308c132e74c666c60cac2bca\" style=\"color:#ffffff\">Start your free trial today and begin improving the security posture of your modern apps and cloud infrastructure.<\/p>\n\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/sign-up\" target=\"_self\">\n<p class=\"title\">Get started<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-1151\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":11298,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-9713641,.related-items{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative;padding-top:var(--cf-space-xl);padding-bottom:var(--cf-space-xl)}.gsbp-1581a8b{max-width:100%;width:1380px}.related-items__left-col{display:flex;flex-direction:column;column-gap:var(--cf-space-m);row-gap:var(--cf-space-3xs)}body .related-items__heading:is(h1,h2,h3,h4,h5,h6){font-size:var(--cf-text-2xl)}.related-items__right-col{display:flex;column-gap:var(--space-l);row-gap:var(--space-l)}.related-items__item{padding-top:var(--cf-space-s);padding-bottom:var(--cf-space-s);padding-left:var(--cf-space-s);padding-right:var(--cf-space-s);display:flex;flex-direction:column;row-gap:var(--cf-space-xs);text-decoration:none;border-width:1px;border-style:solid;border-color:var(--cf-primary-30)}.related-items__item .relate-items__item-img{max-width:100%;height:auto;object-fit:cover}body .relate-items__item-title:is(h1,h2,h3,h4,h5,h6){text-decoration:none;color:var(--cf-primary)}.related-items__item .relate-items__item-img{text-decoration:none;margin-bottom:var(--cf-space-4xs)}.related-items__item .relate-items__item-title{text-decoration:none;font-size:var(--cf-text-l)}.related-items__item .related-items__item-btn{color:var(--cf-primary);padding-top:var(--cf-space-xs);padding-bottom:var(--cf-space-xs);padding-left:var(--cf-space-xs);padding-right:var(--cf-space-xs);border-width:1px;border-style:solid;max-width:150px;display:flex;justify-content:center}.related-items__item .related-items__item-text{color:var(--cf-primary)}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-111","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":28,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/111\/revisions"}],"predecessor-version":[{"id":69960,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/111\/revisions\/69960"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/11298"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}