{"id":1284,"date":"2024-10-23T14:09:15","date_gmt":"2024-10-23T14:09:15","guid":{"rendered":"http:\/\/www.sumologic.com\/?page_id=1284"},"modified":"2026-01-28T09:33:46","modified_gmt":"2026-01-28T17:33:46","slug":"glossary","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/glossary","title":{"rendered":"Glossary"},"content":{"rendered":"\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-f75bc8cb2226fb79b41adb59880c9186\" id=\"devops-and-security-glossary-terms\">DevOps and Security Glossary Terms<\/h1>\n\n\n\n<a class=\"btn-right-arrow__trans ip-bg-header__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" rel=\" sponsored\" title=\"Integrations docs\">\n<span>Request demo<\/span>\n<\/a>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"200\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-3792\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-31d079448f9083e98c43e46f7cf151c07f226a74 e-stn--navigation-tabs e-stn--glossary-nav\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a8a430092d6301ca0b738e2949102462319d06f7  col-sm-12\"><div class=\"e-div e-div--navigation-tabs-wrapper\"><p id=\"section-nav-1\"\n         class=\"\" data-glossary-hash=\"#A\">\n         <a href=\"\/glossary#A\">A<\/a><\/p><p id=\"section-nav-2\"\n         class=\"\" data-glossary-hash=\"#B\">\n         <a href=\"\/glossary#B\">B<\/a><\/p><p id=\"section-nav-3\"\n         class=\"\" data-glossary-hash=\"#C\">\n         <a href=\"\/glossary#C\">C<\/a><\/p><p id=\"section-nav-4\"\n         class=\"\" data-glossary-hash=\"#D\">\n         <a href=\"\/glossary#D\">D<\/a><\/p><p id=\"section-nav-5\"\n         class=\"\" data-glossary-hash=\"#E\">\n         <a href=\"\/glossary#E\">E<\/a><\/p><p id=\"section-nav-6\"\n         class=\"\" data-glossary-hash=\"#F\">\n         <a href=\"\/glossary#F\">F<\/a><\/p><p id=\"section-nav-7\"\n         class=\"\" data-glossary-hash=\"#G\">\n         <a href=\"\/glossary#G\">G<\/a><\/p><p id=\"section-nav-8\"\n         class=\"\" data-glossary-hash=\"#H\">\n         <a href=\"\/glossary#H\">H<\/a><\/p><p id=\"section-nav-9\"\n         class=\"\" data-glossary-hash=\"#I\">\n         <a href=\"\/glossary#I\">I<\/a><\/p><p id=\"section-nav-10\"\n         class=\"disabled\" data-glossary-hash=\"#J\">\n         <a href=\"\/glossary#J\">J<\/a><\/p><p id=\"section-nav-11\"\n         class=\"\" data-glossary-hash=\"#K\">\n         <a href=\"\/glossary#K\">K<\/a><\/p><p id=\"section-nav-12\"\n         class=\"\" data-glossary-hash=\"#L\">\n         <a href=\"\/glossary#L\">L<\/a><\/p><p id=\"section-nav-13\"\n         class=\"\" data-glossary-hash=\"#M\">\n         <a href=\"\/glossary#M\">M<\/a><\/p><p id=\"section-nav-14\"\n         class=\"\" data-glossary-hash=\"#N\">\n         <a href=\"\/glossary#N\">N<\/a><\/p><p id=\"section-nav-15\"\n         class=\"\" data-glossary-hash=\"#O\">\n         <a href=\"\/glossary#O\">O<\/a><\/p><p id=\"section-nav-16\"\n         class=\"\" data-glossary-hash=\"#P\">\n         <a href=\"\/glossary#P\">P<\/a><\/p><p id=\"section-nav-17\"\n         class=\"disabled\" data-glossary-hash=\"#Q\">\n         <a href=\"\/glossary#Q\">Q<\/a><\/p><p id=\"section-nav-18\"\n         class=\"\" data-glossary-hash=\"#R\">\n         <a href=\"\/glossary#R\">R<\/a><\/p><p id=\"section-nav-19\"\n         class=\"\" data-glossary-hash=\"#S\">\n         <a href=\"\/glossary#S\">S<\/a><\/p><p id=\"section-nav-20\"\n         class=\"\" data-glossary-hash=\"#T\">\n         <a href=\"\/glossary#T\">T<\/a><\/p><p id=\"section-nav-21\"\n         class=\"\" data-glossary-hash=\"#U\">\n         <a href=\"\/glossary#U\">U<\/a><\/p><p id=\"section-nav-22\"\n         class=\"\" data-glossary-hash=\"#V\">\n         <a href=\"\/glossary#V\">V<\/a><\/p><p id=\"section-nav-23\"\n         class=\"\" data-glossary-hash=\"#W\">\n         <a href=\"\/glossary#W\">W<\/a><\/p><p id=\"section-nav-24\"\n         class=\"\" data-glossary-hash=\"#X\">\n         <a href=\"\/glossary#X\">X<\/a><\/p><p id=\"section-nav-25\"\n         class=\"disabled\" data-glossary-hash=\"#Y\">\n         <a href=\"\/glossary#Y\">Y<\/a><\/p><p id=\"section-nav-26\"\n         class=\"disabled\" data-glossary-hash=\"#Z\">\n         <a href=\"\/glossary#Z\">Z<\/a><\/p><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n<section class=\"e-stn e-stn--glossary-search\">\n    <div class=\"container\">\n    <div class=\"wp-block-b3rg-row e-row row\">\n    <div class=\"wp-block-b3rg-column e-col e-col-3fd29a26ff70780ecd7ff03db8f4638045c8c9d8  col-sm-12\">\n    <div class=\"e-div e-div-0162dd5adc5b84600d5bea230d8c418559af071d\">\n    <input type=\"text\" id=\"glossary-search\" placeholder=\"Search\">\n    <p class=\"no-results-msg\">Sorry, but nothing matched your search terms. Please try again with some different keywords.<\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/section><section id=\"section-1\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">A<\/h2><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/active-directory\">Active Directory<span>Active Directory is a specialized software tool that was developed by Microsoft to make it easier for the administrators to manage and deploy system changes.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/agentic-ai\">Agentic AI<span>Agentic AI refers to artificial intelligence systems that can reason, plan, and act on behalf of human teams.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/agile-methodology\">Agile methodology<span>Agile methodology is a set of techniques, values and principles designed to guide how software development teams work together to deliver new applications and updates.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aiops\">AIOps<span>AIOps, artificial intelligence for IT operations, refers to using artificial intelligence and\u00a0machine learning\u00a0to perform and automate tasks normally executed manually by IT operators.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/amazon-redshift\">Amazon Redshift<span>Learn what Amazon Redshift is, how it works, and why it\u2019s a powerful, fully-managed cloud data warehouse for running scalable analytics on large data.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/apache\">Apache<span>Apache HTTP is the most popular web hosting platform in the world and is used across industries and sectors to host all types of applications.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/api\">API<span>API is a specified communication protocol that allows two applications to interface with each other, or for a client application to access information within another application.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/api-management\">API management<span>API (Application Program Interface) management includes the entire process of creating and publishing an API for your application.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-containerization\">Application containerization<span>Application containerization is a rapidly developing technology that is changing the way developers test and run application instances in the cloud.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-infrastructure\">Application infrastructure<span>Application infrastructure includes all of the computational and operational infrastructure and components that are necessary to manage the development, deployment, and management of enterprise applications.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-lifecycle-management\">Application lifecycle management<span>Application lifecycle management (ALM) encompasses all aspects of the application lifecycle, especially the usage, maintenance and servicing of the application after it has already been developed.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-migration\">Application migration<span>Application migration describes the process of moving an application, along with its associated data and host servers, from one environment into another.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-performance-monitoring\">Application performance monitoring<span>APM (Application performance monitoring) tools capture data, and aggregate and analyze the data to detect patterns and present actionable insights in a human-readable format.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-security\">Application security<span>Application security is a catch-all term that encompasses any security measures deployed at the application level of an organization&#039;s technology stack.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/application-whitelisting\">Application whitelisting<span>Application whitelisting is a common method used by IT organizations to secure on-premise and cloud-based networks and infrastructure against malicious cyber attacks and unwanted network penetration.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/asp-net-core-monitoring\">ASP.Net Core monitoring<span>ASP.Net Core is a free and open-source rewrite of the ASP.NET framework running on .NET Core and Full Framework.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/attack-vector\">Attack vector<span>An attack vector is a method or pathway used by a hacker to access or penetrate the target system. Attack vectors can be former employees or even hackers.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/audit-log\">Audit log<span>An audit log is a chronological record of events, actions and changes within a computer system, software application, network or organization.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/authentication-factor\">Authentication factor<span>An authentication factor is a security credential that is used to verify the identity and authorization of a user attempting to gain access or request data from a secured network.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-app-development\">AWS app development tools<span>You can use AWS app development tools to build applications.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-cloudwatch\">AWS CloudWatch<span>Amazon CloudWatch allows developers, system architects, and administrators to monitor their AWS applications in the cloud, in near-real-time.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-codedeploy\">AWS CodeDeploy<span>AWS CodeDeploy deploys application code from AWS S3, GitHub, or BitBucket to EC2 instances or on-prem instances.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-codepipeline\">AWS CodePipeline<span>AWS CodePipeline is a fully managed continuous delivery service that helps you automate your release pipeline<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-ec2\">AWS EC2<span>AWS Classic Load Balancer vs. Application Load Balancer<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-elb\">AWS ELB<span>Amazon Web Services&#039;\u00a0Elastic Load Balancer\u00a0(AWS ELB) integrates seamlessly with Amazon&#039;s other cloud services.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-lambda\">AWS Lambda<span>The AWS Lambda service is a way to run your applications in your AWS environment without worrying about underlying infrastructure such as CPU, memory or storage.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-monitoring\">AWS monitoring<span>AWS is the most popular cloud platform in the world. Learn about the many different tools that are available to monitor and secure the performance of apps powered by AWS.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-rds\">AWS RDS<span>The Amazon Relational Database Service (RDS) enables developers to create and manage relational databases in the cloud.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-rds-postgres-monitoring\">AWS RDS Postgres monitoring<span>For applications based in the Amazon Cloud, tracking and monitoring performance is a critical, but relatively easy, process to undertake to ensure optimum performance and avoid critical failure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-s3\">AWS S3<span>The Amazon Simple Storage Service (Amazon S3) application brings cloud-based, scalable, affordable and reliable storage options under your command.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-s3-cost-optimization\">AWS S3 cost optimization<span>Amazon Simple Storage Service (Amazon S3) is one of the most popular Amazon Web Services (AWS) offering with flexible pricing.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-1\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-security\">AWS Security<span>AWS Security is the process of protecting your data, accounts, and workloads, either using AWS tools or third parties.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-2\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">B<\/h2><p data-glossary=\"section-nav-2\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/blue-green-deployment\">Blue\/green deployment<span>Blue\/green deployment is a methodology for releasing new code into the production environment whose purpose is to reduce software downtime, make it easy to roll back new changes, and avoid service interruptions to applications with critical up-time requirements.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-2\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/business-analytics\">Business analytics<span>The term business analytics refers to the practice or discipline, often with the aid of specialized software tools, of extracting information and insights from collected data that can be used to inform effective planning and decision-making in a business context.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-2\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/business-intelligence\">Business intelligence<span>Business intelligence (BI) describes the set of processes that business use to analyze operational data and create actionable insights that drive effective business decision-making.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-2\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/business-technology\">Business technology<span>Business technology can be simply defined as any application of information technology that is integrated into the operation of a business.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-3\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">C<\/h2><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/caas\">CaaS<span>Containers-as-a-service (CaaS) is a category of cloud services where the service provider offers customers the ability to manage and deploy containerized applications and clusters.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/casb\">CASB<span>A cloud access security broker (CASB) is a software application that mediates user access to a cloud-based application. CASB tools can be hosted on-premises or in the cloud.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-application\">Cloud application<span>A cloud application simply refers to any software application that is deployed in a cloud environment rather than being hosted on a local server or machine.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-automation\">Cloud automation<span>Cloud automation is the practice of using specialized software and methodologies to automate the manual tasks associated with managing cloud-based IT infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-computing\">Cloud computing<span>Cloud computing is the delivery of computer system resources, including applications, virtual machines, containers, data storage and processing power over the internet.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-infrastructure\">Cloud infrastructure<span>Cloud infrastructure consists of all hardware and software components that are needed to support the delivery of cloud services to the customer.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-infrastructure-security\">Cloud infrastructure security<span>Cloud infrastructure security is the cloud computing security practice of securing cloud environments, sensitive data and supporting information systems.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-management\">Cloud management<span>Cloud management is the process of maintaining oversight and administrative control of cloud computing products and services.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-migration\">Cloud migration<span>Cloud migration is the process of moving applications, data, and other components hosted on servers inside an organization to a cloud-based infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-orchestration\">Cloud orchestration<span>Cloud orchestration is designed to help IT organizations manage interconnections and interactions between disparate systems in increasingly complex cloud environments.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-security-monitoring\">Cloud security monitoring<span>Cloud security monitoring typically involves supervising servers, both virtual and physical, in order to continuously assess and analyze data and infrastructures for threats and vulnerabilities.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-security-posture-management\">Cloud security posture management<span>Cloud security posture management (CSPM) is the practice of continuously monitoring and managing the security of an organization&#039;s cloud infrastructure to ensure it aligns with best practices, compliance requirements and security policies.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/container\">Container<span>A container is a virtualized environment whose contents are an application and all of the files, libraries, binaries and dependencies needed to execute that application.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cdn\">Content delivery network (CDN)<span>A content delivery network (CDN) is an important tool for optimizing the performance of heavily-trafficked websites and applications that are deployed in cloud environments.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/continuous-delivery\">Continuous delivery<span>Continuous delivery is an ongoing DevOps practice of building, testing, and delivering improvements to software code and user environments with the help of automated tools.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/continuous-deployment\">Continuous deployment<span>Continuous deployment (CD) is a strategy where any new code change is deployed directly into the live production environment where it will be visible to customers.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/continuous-integration\">Continuous integration<span>Continuous integration is a software engineering practice where all developers merge their working copies into a shared mainline several times a day.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/continuous-intelligence\">Continuous intelligence<span>Continuous intelligence (CI) is real-time analytics and insights delivered from a single, cloud-native platform across multiple use cases to speed decision-making and drive world-class customer experiences.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/continuous-monitoring\">Continuous monitoring<span>Continuous monitoring is a technology and process that IT organizations may implement to enable rapid detection of compliance issues and security risks within the IT infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/crud\">CRUD<span>CRUD is an acronym that refers to the four functions that are considered necessary to implement a persistent storage application: create, read, update and delete.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-3\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/cyber-security\">Cybersecurity<span>Cybersecurity refers to the set of processes, policies and techniques that work together to secure and organization against digital attacks.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-4\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">D<\/h2><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/data-security\">Data security<span>Data security can be described as the set of policies, processes, procedures, and tools that IT organizations implement to prevent unauthorized access to their networks, servers, data storage and any other on-premise or cloud-based\u00a0IT infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/data-sovereignty\">Data sovereignty<span>Data sovereignty is the principle that data is subject to the laws of the country or region where it\u2019s collected, stored, or processed.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/database-management\">Database management<span>Database management is the process of defining, manipulating, retrieving and otherwise managing data that exists in a database.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/denial-of-service\">Denial of service (DoS)<span>Denial of service (DoS) attacks are threats that directly shut down a machine or network, making it impossible for its intended users to access their devices\/servers.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/devops\">DevOps<span>DevOps is a collection of best practices for the software development process to shorten the development life cycle such as continuous integration, delivery and deployment.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/devops-as-a-service\">DevOps-as-a-Service<span>DevOps as a Service is an emerging philosophy in application development.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/devsecops\">DevSecOps<span>DevSecOps is the philosophy of integrating security practices within the DevOps process.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/digital-customer-experience\">Digital customer experience<span>Digital experiences are where your customers meet your business. The majority of consumers find a positive experience with a brand to be more influential than great advertising. Learn why.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/directory-traversal\">Directory traversal<span>A directory traversal is an HTTP attack that allows attackers to gain access to restricted files. Directory traversal attacks, also known as path traversal, are some of the most common and dangerous attacks that businesses will see.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/distributed-tracing\">Distributed tracing<span>With the popularity of microservice architectures, or simply microservices, the demand to understand control flow and monitor distributed systems is becoming more and more of a necessity.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/docker\">Docker<span>Docker is an open-source containerization platform for virtualization.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/docker-log-management\">Docker log management<span>Docker log management includes logging drivers in the platform to give you access to performance data.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/docker-swarm\">Docker Swarm<span>Docker Swarm is a container orchestration tool, meaning that it allows the user to manage multiple containers deployed across multiple host machines.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-4\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/dora-metrics\">DORA metrics<span>Learn what DORA metrics are. Explore how to measure them, why they matter, and how they help engineering and DevOps teams maximize performance.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-5\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">E<\/h2><p data-glossary=\"section-nav-5\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/encapsulation\">Encapsulation<span>Encapsulation is way to restrict direct access to some components of an object, so users cannot access state values for all of the variables of a particular object.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-5\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/endpoint-security\">Endpoint security<span>Endpoint security is an organizations\u2019 strategy and approach to maintaining the security of network endpoints and external devices that are directly connected to the IT infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-5\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/enterprise-application-integration\">Enterprise application integration\u00a0(EAI)<span>Enterprise application integration (EAI) is the implementation of technologies that facilitate communication between enterprise applications.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-5\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/enterprise-security\">Enterprise security<span>There are several challenges and considerations related to security that apply in a special way to enterprises, which are typically defined as organizations with at least one thousand employees.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-5\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/error-budget\">Error budget<span>An error budget is how much downtime a system can afford without upsetting customers, or, in other words, the margin of error permitted by a service level objective (SLO).<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-5\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/error-tracking\">Error tracking<span>Error tracking is the proactive process of monitoring web applications or\u00a0microservices\u00a0to identify problems and fix them before they become serious issues. Usually, error tracking reports will monitor your applications for any deviation from benchmark activity levels.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-6\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">F<\/h2><p data-glossary=\"section-nav-6\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/file-inclusion\">File inclusion<span>Businesses rely on their web applications. They\u2019re the essential building blocks that provide organizations with the tools they need to execute their tasks, automate tedious processes, manage and store data, and so much more.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-6\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/function-as-a-service\">Function-as-a-Service\u00a0(FaaS)<span>Functions-as-a-Service (FaaS) is a cloud computing model on serverless technologies and architectures that allow software developers to easily deploy applications in the cloud.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-7\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">G<\/h2><p data-glossary=\"section-nav-7\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/gain-privileges\">Gain privileges<span>Gaining privileges (also known as privilege escalation) is the act of exploiting a vulnerability or configuration issue in a software\/operating system that gives attackers more administrative privileges.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-8\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">H<\/h2><p data-glossary=\"section-nav-8\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/hadoop-architecture\">Hadoop architecture<span>Hadoop architecture was designed to allow many data storage devices to work in parallel instead of one large one, making it one of the most popular data processing platforms.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-8\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/hipaa\">HIPAA<span>HIPAA is a comprehensive U.S. federal law enacted in 1996 to ensure the privacy, security and standardization of electronic health information.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-8\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/hybrid-cloud\">Hybrid cloud<span>Hybrid cloud describes a specific deployment model or architecture for cloud service delivery that combines private, on-premises cloud infrastructure and services with public cloud services and permits some orchestration and interactions between them.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-9\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">I<\/h2><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/iis-log-viewer\">IIS Log Viewer<span>An IIS Log Viewer is a software application whose function is to streamline the process of viewing log files from an IIS web server. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/iis-server\">IIS server<span>The Windows Internet Information Services (IIS) Server is an extensible web server that was created by Microsoft to be used on Windows operating systems.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/incident-response\">Incident response<span>Incident response is a documented, formalized set of policies and procedures for managing cyber attacks, security breaches and other types of IT or security incidents.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/indicators-of-compromise\">Indicators of compromise\u00a0(IoC)<span>Indicators of compromise (IoC) are pieces of evidence that suggest that a data breach may have occurred and that further investigation and engagement of the CSIRT incident response plan is necessary.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/information-security-management\">Information security management<span>Information security management describes the set of policies and procedural controls that IT and business organizations implement to secure their informational assets against threats and vulnerabilities.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-management\">Infrastructure management\u00a0(IM)<span>In the context of an IT organization, infrastructure refers to the hardware, software and other systems that are necessary for delivering IT services in accordance with\u00a0service-level agreements\u00a0(SLAs).<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-metrics\">Infrastructure metrics<span>Metrics are numeric samples of data collected over time. Infrastructure metrics can measure the performance of various\u00a0IT infrastructure\u00a0components, such as the operating system, disk activity, servers or virtual machines.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-monitoring\">Infrastructure monitoring<span>Infrastructure monitoring software tools capture\u00a0log files\u00a0from throughout the network and aggregate them into a single database where they can be sorted, queried and analyzed by either humans or machine algorithms.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-as-a-service\">Infrastructure-as-a-Service<span>Infrastructure-as-a-Service (IaaS), also called Hardware-as-a-Service (HaaS), describes a standard delivery model for cloud services where customers purchase access to managed\u00a0IT infrastructure\u00a0from a third-party cloud service provider.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/infrastructure-as-code\">Infrastructure-as-code<span>Infrastructure-as-Code (IaC) refers to the increasingly common practice of provisioning and managing IT infrastructure using coding.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/it-infrastructure\">IT Infrastructure<span>An organization\u2019s IT infrastructure (also known as information technology infrastructure) includes all of the hardware, software, and network resources that are necessary to deliver IT services within the organization. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/it-operations\">IT operations<span>IT operations (ITOps) refer to the set of processes and services that are administered by an IT department within a larger organization or business. ITOps is one of the four defined functions in the ITIL best practices framework for IT service management, along with technical management, application management and the service desk.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/itom\">IT operations management (ITOM)<span>IT operations management (ITOM) refers to the administration of all technology components and application requirements within an organization.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-9\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/itsi\">ITSI<span>Information Technology Service Intelligence (ITSI) is a new type of software tool that uses artificial intelligence and machine learning to help IT managers monitor increasingly complex computing environments.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-11\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">K<\/h2><p data-glossary=\"section-nav-11\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/kubernetes-monitoring\">Kubernetes monitoring<span>Kubernetes monitoring helps\u00a0DevOps\u00a0practitioners manage complex app modernization and scale-up containerization in human-readable environments.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-12\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">L<\/h2><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/load-balancer\">Load balancer<span>When an organization allocates more than one server to handle requests for a website or business application, a\u00a0load balancer\u00a0is used to distribute requests between them.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-aggregation\">Log aggregation<span>Log aggregation is a software function that consolidates log data from throughout the IT infrastructure, including microservices, into a single centralized platform where it can be reviewed and analyzed.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-analysis\">Log analysis<span>Log analysis is the process of reviewing, interpreting and understanding computer-generated records called logs.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-file\">Log file<span>Log files are the primary data source for network\u00a0observability. A log file is a computer-generated data file that contains information about usage patterns, activities and operations within an operating system, application, server or another device. Log files show whether resources are performing properly and optimally.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-levels\">Log levels<span>Log levels describe the type and severity of a logged event based on the severity of the impact on users and the urgency of response required by the IT organization.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-management\">Log management<span>Log management is facilitating, transmitting, analyzing, storing, and archiving large sets of log data.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-management-policy\">Log management policy<span>A log management policy provides guidelines and procedures for: collecting log data; organizing and storing log data; analyzing log data; reporting on log data; transmitting log data; and accessing log data.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log-management-process\">Log management process<span>The log management process involves facilitating, transmitting, analyzing, storing and archiving large sets of log data. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-12\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/log4shell-vulnerability\">Log4Shell vulnerability<span>Log4Shell is a zero-day vulnerability (CVE-2021-44228) with Apache\u2019s Log4j. The vulnerability can be exploited by allowing hackers to execute authenticated code execution.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-13\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">M<\/h2><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/machine-data\">Machine data<span>Machine data, sometimes called machine-generated data, is the digital information that is automatically created by the activities and operations of networked devices, including computers, mobile phones, embedded systems, and connected wearable products.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/machine-learning\">Machine learning<span>Machine learning is a cutting-edge programming technique used to automate the construction of analytical models and enable applications to perform specified tasks more efficiently without being explicitly programmed.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/managed-detection-and-response\">Managed detection and response<span>Managed detection and response (MDR) is an outsourced security service that helps organizations detect malicious network activity (network intrusions, malware attacks, attempted data theft, etc.) and quickly respond to eliminate the threat.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/managed-siem\">Managed SIEM<span>Managed\u00a0SIEM\u00a0is an alternative to on-premise deployment, setup and monitoring of a\u00a0SIEM\u00a0software solution where an organization contracts with a third-party service provider to host a SIEM application on their servers and monitor the organization&#039;s network for potential security threats. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/mttr\">Mean time to resolution (MTTR)<span>MTTR stands for mean time to resolve. It refers to the average amount of time it takes for an organization to detect and then fully resolve a security incident or breach. MTTR is a key performance indicator and reliability metric that helps measure the effectiveness and efficiency of an organization&#039;s\u00a0incident response\u00a0and resolution processes.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/microservices\">Microservices<span>Microservices are a specific example of a service-oriented software architecture, where application components are used to supply specific services to other applications over a network using an agreed or specified communication protocol or APIs.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/microsoft-azure\">Microsoft Azure<span>Azure is Microsoft\u2019s platform for both hybrid and fully cloud-based IT architectures.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/mitre-attack\">MITRE ATT&amp;CK<span>The MITRE ATT&amp;CK framework is primarily designed to help cybersecurity professionals understand, categorize and respond to cyber threats and attacks.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/mlops\">MLOps<span>MLOps, short for Machine Learning Operations, is a practice that aims to streamline the process of developing, deploying and maintaining machine learning models at scale.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/model-context-protocol-mcp\">Model Context Protocol (MCP)<span>The Model Context Protocol (MCP) is a standardized orchestration and governance layer for connecting an AI application to external systems and external data sources.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/mtti-definition-overview\">MTTI<span>Mean time to identify (MTTI) is calculated by taking the sum of the time intervals between the occurrence of each security incident and its identification and then dividing that sum by the total number of incidents.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-13\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/mutable-and-immutable-infrastructure\">Mutable and immutable infrastructure<span>Mutable server infrastructure means the server infrastructure will be continually updated, tweaked, and tuned to meet the ongoing needs of its purpose. It extends to every server and switch that is unique.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-14\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">N<\/h2><p data-glossary=\"section-nav-14\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/nist-siem-requirements-and-standards\">NIST SIEM requirements and standards<span>The National Institute of Standards and Technology (NIST) produces guidance on security information and event management (SIEM).<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-14\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/node-logging\">Node logging<span>Node logging helps debug by saving information about an application and giving developers the insight to identify the causes of various incidents and errors.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-15\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">O<\/h2><p data-glossary=\"section-nav-15\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/observability\">Observability<span>Observability is monitoring all of the behaviors and activities of a system that can be evaluated based on its outputs.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-15\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/open-integration-framework-oif\">Open Integration Framework (OIF)<span>Open Integration Framework (OIF) is an integration framework created to make the process of integration within a platform run as smoothly as possible.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-15\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/opentelemetry\">OpenTelemetry<span>OpenTelemetry (OTel) is a set of tools, APIs, and open standards for collecting, processing, and exporting telemetry data from distributed systems.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-15\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/operational-intelligence\">Operational Intelligence<span>Operational Intelligence is the application of data analysis techniques to data that is generated or collected in real-time through an organization\u2019s IT infrastructure. <\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-16\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">P<\/h2><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/paas\">PaaS (Platform-as-a-Service)<span>Platform-as-a-service (PaaS) is a cloud service delivery model where a third-party cloud service provider delivers some hardware and software tools, often those needed for application hosting or development, to customers over the internet.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/pci-dss\">PCI DSS<span>PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure the secure handling, processing and storage of credit card information to prevent data breaches and protect cardholder data.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/pen-testing\">Pen testing<span>Penetration testing, commonly called pen testing, is a critical component of a comprehensive cybersecurity strategy to assess the security posture of an organization&#039;s digital assets.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/pcf\">Pivotal Cloud Foundry (PCF)<span>Pivotal Cloud Foundry, also known as PCF, is a distribution of the open-source Cloud Foundry platform that includes additional features and services that expand the capabilities of Cloud Foundry and make it easier to use.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/polymorphism\">Polymorphism<span>Polymorphism is a feature of object-oriented programming languages that allows a specific routine to use variables of different types at different times.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/predictive-analytics\">Predictive analytics<span>Predictive analytics is a set of methods and technologies that can be used to analyze current and historical data to make predictions about future events.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-16\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/private-cloud\">Private cloud<span>A private cloud is defined as a deployment model for cloud services where the cloud environment and infrastructure are dedicated to providing services for a single organization.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-18\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">R<\/h2><p data-glossary=\"section-nav-18\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/real-time-big-data-analytics\">Real time big data analytics<span>Real-time big data analytics is a software feature or tool capable of analyzing large volumes of incoming data at the moment that it is stored or created with the IT infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-18\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/real-time-dashboard\">Real time dashboard<span>A real-time dashboard is a type of graphical user interface that provides simplified, easy-to-review visualizations of key metrics or performance indicators concerning a business objective, function or process in real time.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-18\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/real-user-monitoring\">Real user monitoring (RUM)<span>Real user monitoring (RUM) is an important aspect of application performance management that helps capture and analyze every event that your users make within your application or website.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-18\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/role-based-access-control\">Role based access control<span>Role-based access control (RBAC) is a critical capability for organizations that deploy applications into the cloud.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-18\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/root-cause-analysis\">Root cause analysis<span>Root cause analysis (RCA) is a method of problem-solving used to investigate known problems and identify their antecedent and underlying causes.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-19\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">S<\/h2><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/scrum\">Scrum<span>Scrum is a project management framework or methodology that is used to efficiently produce quality work while adapting quickly to change.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/secops\">SecOps<span>SecOps, a combination of the terms security and operations, is a methodology that IT managers implement to enhance the connection, collaboration and communication between IT security and IT operations teams, helping to ensure that the IT organization as a whole can meet its application and network security objectives without compromising on application performance.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/security-analytics\">Security analytics<span>Security analytics uses data analytics and machine learning techniques to identify and respond to cybersecurity threats in real time.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/siem\">Security information and event management (SIEM)<span>SIEM is a combination of security event management (SEM) and security information management (SIM).\n\n<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/security-intelligence\">Security intelligence<span>Security intelligence refers to the practice of collecting, standardizing and analyzing data that is generated by networks, applications, and other IT infrastructure in real-time, and the use of that information to assess and improve an organization\u2019s security posture.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/soar\">Security orchestration, automation and response (SOAR)<span>SOAR stands for security orchestration, automation and response, helps security professionals identify repeatable patterns and behaviors and use the knowledge of historically accumulated data to accurately detect false positives.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/security-remediation\">Security remediation<span>Security remediation is the process of identifying threats and taking the proper steps to resolve them.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/server-monitoring\">Server monitoring<span>Server monitoring helps maintain the security of cloud servers while tracking their performance and availability.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/serverless\">Serverless<span>Serverless computing is an execution model for cloud computing services that is very similar to the PaaS model. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/service-level-agreement\">Service Level Agreement (SLA)<span>A Service Level Agreement (SLA) is a legal obligation or set of obligations made between a service provider and a client or customer, which guarantees certain quality assurances for availability, responsibility and other key metrics.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/service-level-indicator\">Service Level Indicator (SLI)<span>A service level indicator (SLI) is a specific metric that helps companies measure some aspect of the level of services to their customers. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/service-level-objective\">Service Level Objective (SLO)<span>Service Level Objectives make it easier for DevOps and site reliability engineering (SRE) teams to evaluate and assess how well their services are being maintained and how well their SLA is being upheld.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/service-reliability\">Service reliability<span>Service reliability is a method for measuring the probability that a system, product, or service will maintain performance standards for a specific period of time.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/siem-environment\">SIEM environment<span>A Security Information and Event Management (SIEM) environment is a virtual space in which log data is collected, interpreted and represented visually. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/siem-logging\">SIEM logging<span>A SIEM log refers to the log data generated by Security Information and Event Management (SIEM) systems. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/siem-tools\">SIEM tools<span>Security Information and Event Management (SIEM) tools are typically external software solutions that aggregate and analyze log data with the hopes of improving security and security response for IT teams. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/soc2\">SOC2<span>The SOC 2 (Service Organization Control 2) framework is a set of auditing standards and guidelines developed by the American Institute of CPAs (AICPA) to assess the security, availability, processing integrity, confidentiality and privacy of information processed by service organizations. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/saas\">Software as a Service (SaaS)<span>Software as a service (SaaS) is a model of software distribution where customers pay a monthly subscription or licensing fee and a third-party, typically the software vendor makes, the application available over the internet.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/software-development\">Software deployment<span>Software deployment includes all of the steps, processes, and activities that are required to make a software system or update available to its intended users.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/software-development-lifecycle\">Software development lifecycle<span>The software development lifecycle (SDLC) is the set of steps, tasks, activities, and processes required to develop a new application.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/software-stack\">Software stack<span>A software stack refers to the set of components that work together to support the execution of the application.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/standard-operating-procedures\">Standard operating procedures (SOPs)<span>Standard operating procedures (SOPs) are processes that include a set of written instructions that help security practitioners follow a straightforward and well-laid-out framework to achieve optimum efficiency in task completion.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/structured-logging\">Structured logging<span>Structured logging is the practice of implementing a consistent, predetermined message format for application logs that allows them to be treated as data sets that can be more easily searched and analyzed than text.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-19\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/syslog\">Syslog<span>Syslog is a protocol that computer systems use to send event data logs to a central location for storage.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-20\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">T<\/h2><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/tactics-techniques-procedures\">Tactics techniques and procedures (TTPs)<span>Tactics techniques and procedures (TTPs) are fundamental components used in the field of cybersecurity, threat intelligence and incident response, and they describe how cyber adversaries operate and execute attacks. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/technology-stack\">Technology stack<span>A technology stack includes all of the hardware and software systems that are needed to develop and run a single website, web integration or mobile application.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/telemetry\">Telemetry<span>Telemetry automatically collects, transmits and measures data from remote sources, using sensors and other devices to collect data.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/testing-as-a-service\">Testing as a service<span>Testing-as-a-Service (TaaS) allows a third-party service provider to provide testing services in connection with the organization\u2019s key business activities. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/threat-detection-response\">Threat detection and response (TDR)<span>Threat detection and response allows a security team to identify and respond to potential threats to networks, applications or other assets within the network. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/threat-hunting\">Threat hunting<span>Threat hunting, cyber threat hunting or proactive threat hunting, is the seeking out unknown cybersecurity threats to a network. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/threat-intelligence\">Threat intelligence<span>The term threat intelligence refers to collecting data, information and knowledge that keep an organization informed about past, present, or potential cyber-attacks. <\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-20\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/tool-sprawl\">Tool sprawl<span>Tool sprawl happens when a company accesses an unnecessarily high number of IT tools that individually address different use cases.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-21\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">U<\/h2><p data-glossary=\"section-nav-21\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/unstructured-logs\">Unstructured logs<span>Unstructured logs are machine-generated records of events, activities, or messages that don\u2019t follow a predefined format or structure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-21\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/ueba\">User entity behavior analytics (UEBA)<span>UEBA is a security technology that uses advanced analytics,\u00a0machine learning\u00a0and artificial intelligence (AI) to identify a potential security threat based on user and entity behavior.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-22\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">V<\/h2><p data-glossary=\"section-nav-22\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/virtual-private-cloud\">Virtual private cloud<span>A virtual private cloud (VPC) is a unique delivery model for\u00a0private cloud services\u00a0that allows an IT organization to provide an isolated section of public\u00a0cloud infrastructure.<\/span>\n                <\/a>\n                <\/p><p data-glossary=\"section-nav-22\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/vpc-flow-logging\">VPC flow logging<span>Virtual Private Cloud (VPC) Flow logging provides built-in power to monitor information about how your network resources are operating in Amazon Web Services.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-23\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">W<\/h2><p data-glossary=\"section-nav-23\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/web-application-development\">Web application development<span>Web application development describes the process of designing, building, testing and deploying web-based applications that will be installed on remote servers and delivered to users or customers via the internet. Once a web application has been deployed on an application server, users can access the application and its functions and services using any web browser (Google Chrome, Mozilla Firefox, Microsoft Edge, etc.)<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style><section id=\"section-24\" class=\"e-stn e-stn--glossary-section\"><div class=\"container\"><div class=\"wp-block-b3rg-row e-row row\"><div class=\"wp-block-b3rg-column e-col col-sm-12\"><h2 class=\"wp-block-heading\">X<\/h2><p data-glossary=\"section-nav-24\">\n                <a href=\"https:\/\/www.sumologic.com\/glossary\/xdr\">XDR<span>Extended Detection and Response (XDR) is a\u00a0cyber security\u00a0tool promoted by endpoint detection and response (EDR) vendors to aggregate and analyze disparate data and security sources, with the goal to improve threat detection and remediation operations. XDR works to improve threat detection and mitigate cyberattacks by automatically finding, analyzing, and responding to threat data.<\/span>\n                <\/a>\n                <\/p><\/div><\/div><\/div><\/section>\n            <style>\n            .e-stn--glossary-section p a span {\n                font-weight: 400;\n                margin-top: 10px !important;\n                display: block;\n            }\n            <\/style>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-1284","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/1284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/comments?post=1284"}],"version-history":[{"count":14,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/1284\/revisions"}],"predecessor-version":[{"id":67986,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/1284\/revisions\/67986"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=1284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}