{"id":11266,"date":"2025-02-19T10:06:26","date_gmt":"2025-02-19T18:06:26","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=integration&#038;p=11266"},"modified":"2026-01-08T22:03:45","modified_gmt":"2026-01-09T06:03:45","slug":"twistlock","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/app-catalog\/twistlock","title":{"rendered":"Twistlock App for Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-a59eaea38dc7229b14e3f23814801d06\" id=\"comprehensive-monitoring-and-analysis-solution-for-detecting-vulnerabilities-and-potential-threats-in-hosts-containers-images-and-registry\">Comprehensive monitoring and analysis solution for detecting vulnerabilities and potential threats in hosts, containers, images and registry.<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/troubleshoot-9.svg\" alt=\"\" class=\"wp-image-10624\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Prioritize, identify and resolve vulnerabilities across all container environments<\/h3>\n\n\n\n<p>Get detailed insight into vulnerabilities affecting hosts, container images and the registry. Remediate vulnerabilities that have documented fixes available<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/detect-insider-threats-1-3.svg\" alt=\"\" class=\"wp-image-10661\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"identify-runtime-threats-in-your-kubernetes-and-containerized-environments\">Identify runtime threats in your Kubernetes and containerized environments<\/h3>\n\n\n\n<p>Get detailed information on system and runtime threats, alerts and management activity<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/compliance-2-1.svg\" alt=\"\" class=\"wp-image-10735\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-compliance\">Monitor compliance<\/h3>\n\n\n\n<p>Monitor compliance with audit records across the entire container and Kubernetes stack<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1339\" height=\"1766\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1.png\" alt=\"\" class=\"wp-image-66180\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1.png 1339w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1-227x300.png 227w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1-776x1024.png 776w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1-768x1013.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1-1165x1536.png 1165w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock_cve_status_dashboard-1-1-575x758.png 575w\" sizes=\"auto, (max-width: 1339px) 100vw, 1339px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Vulnerability details<\/h2>\n\n\n\n<p>Get high-level views of common vulnerabilities and exposures (CVE) along with detailed information. Panels display at-a-glance views for host, image, and registry scans, and available fixes.<\/p>\n\n\n\n<p><br><\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">Identify Runtime Threats<\/h2>\n\n\n\n<p>Get detailed information on system and runtime threats, alerts and management activity.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1338\" height=\"1626\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1.png\" alt=\"\" class=\"wp-image-66207\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1.png 1338w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1-247x300.png 247w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1-843x1024.png 843w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1-768x933.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1-1264x1536.png 1264w, https:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-runtime-dashboard-1-1-575x699.png 575w\" sizes=\"auto, (max-width: 1338px) 100vw, 1338px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1338\" height=\"1299\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/twistlock-compliance-violations-dashboard-1.png\" alt=\"\" class=\"wp-image-11269\" title=\"\"><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Prioritize, identify, and remediate compliance violations.<\/h2>\n\n\n\n<p>Get insight into system-wide compliance violations, their severity, and rules that triggered them.<\/p>\n\n\n\n<p><br><\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":326,"featured_media":24184,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[70,71],"translation_priority":[221]},"selected_primary_terms":{"integration-use-case":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"11371,11363,11259","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[70,71],"class_list":["post-11266","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-development","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/11266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/326"}],"version-history":[{"count":6,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/11266\/revisions"}],"predecessor-version":[{"id":66211,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/11266\/revisions\/66211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/24184"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=11266"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-cloud-provider?post=11266"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-use-case?post=11266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}