{"id":22,"date":"2024-10-14T12:13:57","date_gmt":"2024-10-14T12:13:57","guid":{"rendered":"http:\/\/www.sumologic.com\/?page_id=22"},"modified":"2026-03-16T09:46:34","modified_gmt":"2026-03-16T17:46:34","slug":"cloud-siem","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/solutions\/cloud-siem","title":{"rendered":"Cloud SIEM"},"content":{"rendered":"\n<section class=\"e-stn e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 e-stn--main-banner\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<p class=\"eyebrow has-chinese-silver-color has-text-color has-link-color wp-elements-b58ae86f5bb2acc03dc052a89a77f936\">Cloud SIEM<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-966b764f677bc0a71cc73932008569a9\" id=\"real-time-threat-detection-ai-guided-investigation\">Real-time threat detection. AI-guided investigation.<\/h1>\n\n\n\n<p class=\"description has-chinese-silver-color has-text-color has-link-color wp-elements-ce5e57c883188c8b23dabe45d09b7959\">Sumo Logic Cloud SIEM helps your team detect, investigate, and respond to threats with faster behavioral analytics and automation\u2014powered by real-time data and logs-first intelligence.&nbsp;<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/contact\" target=\"_self\">\n<p class=\"title\">Contact sales<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-chinese-silver-color has-text-color has-link-color wp-elements-4b90f0127de76c36d07d37f468863a23\">Ready to see the platform?<a href=\"https:\/\/www.sumologic.com\/demo\/complete-threat-detection-investigation-and-response-demo\" data-type=\"demo\" data-id=\"1463\">Click here<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"e-div e-div-c798c7a4466427637118b74d5226a20455577ae2 e-div--media-wrapper\"><div class=\"e-img e-img--section-bg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/main-banner-bg-blur.svg\" alt=\"\" class=\"wp-image-1076\" title=\"\"><\/figure>\n<\/div>\n\n\n<div id=\"wistia-block_c1411a24dc00f5d9c80f9cc90c094d7d\" class=\"wistia-video-block\" data-wistia-video=\"wistia_471zkno1sb\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/471zkno1sb.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='471zkno1sb']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/471zkno1sb\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"471zkno1sb\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_471zkno1sb\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/471zkno1sb\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_471zkno1sb\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-bca39d0678b768d2f453e1f198650d89ee6f9557 e-stn--navigation-tabs e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-bca39d0678b768d2f453e1f198650d89ee6f9557 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #ffffffe0; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a8a430092d6301ca0b738e2949102462319d06f7  col-sm-12\">\n<div class=\"e-div e-div-06cdc3be1138087fcdd84f8d2519217157acd654 e-div--navigation-tabs-wrapper\">\n<p id=\"section-nav-1\">MITRE ATT&amp;CK<\/p>\n\n\n\n<p id=\"section-nav-2\">Reduce noise<\/p>\n\n\n\n<p id=\"section-nav-3\">Signals and Insights<\/p>\n\n\n\n<p id=\"section-nav-4\">UEBA<\/p>\n\n\n\n<p id=\"section-nav-5\">Investigations<\/p>\n\n\n\n<p id=\"section-nav-6\">Automation<\/p>\n\n\n\n<p id=\"section-nav-7\">TDIR<\/p>\n\n\n\n<p id=\"section-nav-why\">Why Sumo Logic?<\/p>\n\n\n\n<p id=\"section-nav-faq\">FAQ<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-77f1624c7196818de2b4f0495e13867392b869bb e-stn--dlt e-mt-0 e-pt-50 e-mb-0 e-pb-0  e-pb-sm-10\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-77f1624c7196818de2b4f0495e13867392b869bb { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #fff; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-f5ce374d0251b1eeaae539dd91079af48af6ab5c  col-sm-9\">\n<p class=\"has-text-align-center eyebrow has-delft-blue-color has-text-color has-link-color wp-elements-767bc5400fde3ec980bbe09069756f0d\" style=\"font-size:14px;font-style:normal;font-weight:500;text-transform:uppercase\">Sumo Logic cloud-native SIEM<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-de15c8ed4f488ada60d24540648fa125\" id=\"build-a-resilient-and-intelligent-soc-with-a-siem-that-actually-works\">Build a resilient and intelligent SOC with a SIEM that actually works.<\/h2>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-text-align-center has-delft-blue-color has-text-color has-link-color wp-elements-12b0725ac885142062f15f7217eeca0d\">Sumo Logic Cloud SIEM provides security analysts and SOC managers with enhanced visibility across the enterprise to thoroughly understand the scope and context of an attack. Streamlined workflows automatically triage alerts to detect known and unknown threats faster.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-1\" class=\"e-stn e-stn-d07be7f7b48904846d173e0e494aa29fc4f94834 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-90566512aad642367407cef928d3ef7c\" id=\"secure-saas-and-cloud-based-applications\">MITRE ATT&amp;CK coverage explorer<\/h2>\n\n\n\n<p>The MITRE ATT&amp;CK\u2122 <a href=\"https:\/\/sumo-logic.wistia.com\/medias\/hcn9yjtf5t\" target=\"_blank\" rel=\"noreferrer noopener\">Coverage Explorer by Sumo Logic<\/a> is a strategic <a href=\"\/glossary\/cyber-security\">cybersecurity<\/a> Sumo Logic Cloud SIEM tool providing a comprehensive view of adversary tactics, techniques and procedures (TTPs) covered by rules in the Cloud SIEM. By mapping your detection capabilities to this matrix, you can identify areas of strength, uncover gaps in your defenses and prioritize enhancements based on the evolving threat landscape.<\/p>\n\n\n\n<div class=\"wp-block-group gap--l is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div>\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/demo\/mitre-attack-coverage-explorer\" target=\"_blank\">\n<p class=\"title\">View demo<\/p>\n<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_1d9aecff76fc998744224fcb22e99729\" class=\"wistia-video-block\" data-wistia-video=\"wistia_hcn9yjtf5t\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/hcn9yjtf5t.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='hcn9yjtf5t']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/hcn9yjtf5t\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"hcn9yjtf5t\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_hcn9yjtf5t\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/hcn9yjtf5t\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_hcn9yjtf5t\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-2\" class=\"e-stn e-stn-c283737d522fe85a630debd574f46357ccedbb47 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"browser-ui dark\">\n<figure class=\"browser-ui__wrap\">\n<img decoding=\"async\" class=\"browser-ui__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/sl-usrolwq6czz7.gif\" alt=\"Sumo Logic\" width=\"1366\" height=\"768\" loading=\"lazy\" title=\"\">\n\n\n<div id=\"storylane-block_ae839e5764678cc584f5425f75a55c33\" class=\"storylane-block\"><button onclick=\"Storylane.Play({type:'popup', demo_type:'image', width:1920, height:1080, scale:'0.95', demo_url:'https:\/\/app.storylane.io\/demo\/usrolwq6czz7?embed=popup', padding_bottom:'calc(56.25% + 25px)'})\"\n                class=\"btn-left-icon__blue\">\n                Take a tour\n            <\/button><\/div><\/figure>\n<\/div>\n\n\n\n<style>\n.e-stn-c283737d522fe85a630debd574f46357ccedbb47 .browser-ui img {\nposition: relative;\nz-index: -1;\ntransform: scale(1.01);\n}\n<\/style>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-deb2e092b447318361cc8102cb96ccdc\" id=\"secure-saas-and-cloud-based-applications\">Reduce the noise<\/h2>\n\n\n\n<p>Does your security team need to align when it comes to critical threats? Sumo Logic Cloud SIEM combines event management with an interactive heads-up display to deliver threat intelligence and analytics to prioritize alerts.<\/p>\n\n\n\n<p>Cloud SIEM parses, maps and creates normalized records from your structured and unstructured data and correlates detected threats to reduce log events.<\/p>\n\n\n\n<p>The unified UI across SIEM, Logs, and Automation reduces alert fatigue through streamlined workflows and enriched, actionable alerts powered by real-time threat intelligence aggregated from multiple trusted sources\u2014including custom-curated feeds.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_blank\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-3\" class=\"e-stn e-stn-4cd211a7e0b3adb239fc271f986840012f2bc68d e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-c54df4969843bc9a13e08b0bf02b1dd6\" id=\"secure-saas-and-cloud-based-applications\">Signals and Insights<\/h2>\n\n\n\n<p>Reduce alert fatigue with our Insight Engine, which aligns with the MITRE ATT&amp;CK framework. Its adaptive Signal clustering algorithm automatically groups related Signals, accelerating alert triage. Once the aggregated risk surpasses a threshold, it automatically generates an Insight to help you focus on the threats that matter most.<\/p>\n\n\n\n<p>The Summary Agent creates AI-generated summaries of signals within an Insight, reducing noise and highlighting key context. Analysts get a clear explanation of how an Insight was triggered, making it easier to assess scope, prioritize response, and share a consistent narrative without reviewing raw logs or events<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/help.sumologic.com\/docs\/cse\/records-signals-entities-insights\/\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Browse insight generation docs<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_3edf0e36f15f6938e55a2ec97fcbf340\" class=\"wistia-video-block\" data-wistia-video=\"wistia_4x04ldz5w7\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/4x04ldz5w7.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='4x04ldz5w7']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/4x04ldz5w7\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"4x04ldz5w7\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_4x04ldz5w7\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/4x04ldz5w7\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_4x04ldz5w7\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-4\" class=\"e-stn e-stn-96d0c63b6b6cb5c683e62eb0e0e66df2e5ac91bb e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"631\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA-1024x631.png\" alt=\"User and entity behavior analytics\" class=\"wp-image-4059\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA-1024x631.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA-300x185.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA-768x473.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA-1536x946.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA-575x354.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-UEBA.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-c76a82535049910a0bc1909ab1983d2d\" id=\"secure-saas-and-cloud-based-applications\">User and Entity Behavior Analytics (UEBA)<\/h2>\n\n\n\n<p>Detect insider threats, compromised accounts, and policy violations faster. Sumo Logic <a href=\"https:\/\/www.sumologic.com\/glossary\/ueba\">UEBA baselines<\/a> user and entity behavior in minutes\u2014training models on historical data to reduce false positives and surface high-risk anomalies with precision.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/trx416x3jm\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Watch video<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-5\" class=\"e-stn e-stn-4d60b5325e83ae3c5ae0e17346cb1373e723065a e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-fb2e876a640e8d899c2969cc84e37a9e\" id=\"secure-saas-and-cloud-based-applications\">Intuitive investigation<\/h2>\n\n\n\n<p>Investigations become faster and more intuitive with Mobot, the Query Agent, and Sumo Logic\u2019s entity-centric relationship graph working together. Analysts ask questions in natural language, the Query Agent translates them into precise queries, and the entity model connects users, devices, and behaviors to reveal context. Together, they simplify complex analysis, helping teams move from alert to understanding with clarity and speed.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Request demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_545abd6896c206f8e64c9d01e761a213\" class=\"wistia-video-block\" data-wistia-video=\"wistia_jq0zuj302u\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/jq0zuj302u.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='jq0zuj302u']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/jq0zuj302u\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"jq0zuj302u\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_jq0zuj302u\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/jq0zuj302u\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_jq0zuj302u\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-6\" class=\"e-stn e-stn-6a728229c7c4a13eb4e3092bcc82f185aa5c5fac e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"631\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks-1024x631.png\" alt=\"\" class=\"wp-image-8373\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks-1024x631.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks-300x185.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks-768x473.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks-1536x946.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks-575x354.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Playbooks.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-bf234c89ed63b4e9ce4150dc3cc89336\" id=\"secure-saas-and-cloud-based-applications\">Built-in automation and playbooks<\/h2>\n\n\n\n<p>Automatically add context to alerts through enrichment and notification actions, <a href=\"https:\/\/www.sumologic.com\/blog\/quickest-response-not-best-cybersecurity\">using playbooks to quickly prioritize<\/a>, investigate and better understand potential security threats.<\/p>\n\n\n\n<p>Choose from hundreds of out-of-the-box integrations and playbooks \u2014 or write your own. Sumo Logic Cloud SIEM Automation Service allows you to execute playbooks manually or automatically when an insight is created or closed.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-7\" class=\"e-stn e-stn-c281a22ffb53dad68f8eef780ed1e0c19b432887 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-8e55bd400f5e07ce45c86bd5474c36bc\" id=\"secure-saas-and-cloud-based-applications\">Threat detection, investigation, and response<\/h2>\n\n\n\n<p>Cloud SIEM empowers security teams to swiftly detect, investigate, and neutralize cyber threats using real-time data and automated responses.&nbsp;<\/p>\n\n\n\n<p>Detection-as-Code support helps security teams version and manage SIEM rules in GitHub\u2014bringing DevSecOps rigor to detection pipelines and significantly reducing rule drift.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/solutions\/threat-detection\" target=\"_self\">\n<p class=\"title\">Explore TDIR solution<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"browser-ui dark\">\n<figure class=\"browser-ui__wrap\">\n<img decoding=\"async\" class=\"browser-ui__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/sl-ftwbdyzzzfix.webp\" alt=\"\" width=\"1920\" height=\"1080\" loading=\"lazy\" title=\"\">\n\n\n<div id=\"storylane-block_629e848ad6dde968e1b93e6b42b0ac3a\" class=\"storylane-block\"><button onclick=\"Storylane.Play({type:'popup', demo_type:'image', width:1920, height:1080, scale:'0.95', demo_url:'https:\/\/app.storylane.io\/demo\/ftwbdyzzzfix?embed=popup', padding_bottom:'calc(56.25% + 25px)'})\"\n                class=\"btn-left-icon__blue\">\n                Take a tour\n            <\/button><\/div><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-why\" class=\"e-stn e-stn-f7aaa87e735272c3b7d124d264e9c4d3d91d96af e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-f7aaa87e735272c3b7d124d264e9c4d3d91d96af { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}@media only screen and (max-width: 1200px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-f7aaa87e735272c3b7d124d264e9c4d3d91d96af { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}@media only screen and (max-width: 576px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-f7aaa87e735272c3b7d124d264e9c4d3d91d96af { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<p class=\"has-text-align-center eyebrow\">Why Sumo Logic<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center mb-3 has-eigengrau-color has-text-color has-link-color wp-elements-d31c64a146aa4d49096ead2b98d66b42\" id=\"the-advantage-of-sumo-logic-s-cloud-siem-technology\">The advantage of Sumo Logic\u2019s Cloud SIEM technology<\/h2>\n\n\n\n<p class=\"text-center\">Build your security operation center (SOC). <a href=\"https:\/\/www.sumologic.com\/briefs\/total-economic-impact-cloud-siem\" data-type=\"resource\" data-id=\"11317\">Save four hours per security threat investigation while reducing false positives by 90%<\/a>.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Automated_Insights.svg\" alt=\"\" class=\"wp-image-20964\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-ef61fb41acfe08212f36371e2dc51565\" id=\"automated-insights\">Automated Insights<\/h3>\n\n\n\n<p>Go beyond prioritized alerts. Accelerate threat hunting with actionable Insights enriched with user and network context.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Cloud-native-architecture.svg\" alt=\"\" class=\"wp-image-20965\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-f6cc02018fe77bb4bd97fab48415b87f\" id=\"cloud-native-architecture\">Cloud-native architecture<\/h3>\n\n\n\n<p>Scale as needed. Our SIEM provides multi-tenant scaling and elasticity to deliver SOC efficiency for security teams.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/UebaBaseline.svg\" alt=\"\" class=\"wp-image-20969\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-1dd9fbb31ba1cb9bd90c8ae10508c73b\" id=\"single-collaborative-siem-platform\">UEBA baselining<\/h3>\n\n\n\n<p>Learn user behaviors faster for smarter anomaly detection with fewer false positives.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/ThreatIntelligenceEnrichment.svg\" alt=\"\" class=\"wp-image-20968\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-4a6e9222cd5dda3e1443934f647cb827\" id=\"automated-insights\">Threat intelligence enrichment<\/h3>\n\n\n\n<p>Threat intel from multiple trusted sources\u2014including your own curated feeds\u2014contextualizes every alert to accelerate investigation and response.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Detection-as-code.svg\" alt=\"\" class=\"wp-image-20966\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-f163897889a4cb6061d7bcbfbca5ca16\" id=\"cloud-native-architecture\">Detection-as-code<\/h3>\n\n\n\n<p>Manage detection rules like software, synced directly with GitHub.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Smarter-Analyst-experience.svg\" alt=\"\" class=\"wp-image-20967\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-27c5654d1a974b27148c4a8a3a205c7d\" id=\"single-collaborative-siem-platform\">Smarter analyst experience<\/h3>\n\n\n\n<p>Work across logs, detections, and automation with one consistent experience.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"page-section resource-card-section gsbp-585e707 alignfull\" id=\"section-6\">\n<div>\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Additional resources<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper mt-3 grid--3\">\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/gartner-siem-critical-capabilities\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/meta-gartner-critical-capabilities-1200x628-fig3.webp\" alt=\"\" width=\"1200\" height=\"628\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">REport<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Gartner Critical Capabilities report<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download report<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/idc-sumo-logic-roi\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-IDC_ROI_Meta_1200x628_TINY-v2.jpg\" alt=\"\" width=\"1114\" height=\"625\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Report<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">IDC\u2019s ROI report: The business value of Sumo Logic<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download report<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/videos\/cloud-siem-highlights\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Cloud-SIEM-quick-overview.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">video<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Sumo Logic Cloud SIEM overview<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Watch video<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/bugcrowd\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Bugcrowd_Hero_Logo-1_652x366px.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\"><strong>Bugcrowd cuts costs with unified security platform<\/strong><\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/truelayer\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/truelayer-full-color-logo.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\"><strong><strong>How TrueLayer saved >1,000 hours per year in troubleshooting<\/strong><\/strong><\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/guides\/siem-evaluation\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Header_Art-1_2024-01-03-225420_dnbu-copy-2.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Guide<\/div>\n\n\n\n<h3 class=\"resource-block__heading\"><strong>How to evaluate SIEM solutions<\/strong><\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read guide<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section id=\"section-faq\" class=\"e-stn e-stn-b804fec4852b1b767a153fcbcbf7af7f43a839e5 e-stn--faq-accordion\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-029c01502d78b7cff6900cd3b2a145337ca3a946  col-sm-12 col-md-4\">\n<h2 class=\"wp-block-heading has-delft-blue-color has-text-color has-link-color wp-elements-152c54c72ad88816c8399a2df60d129e\" id=\"faqstill-have-questions\">FAQ<br>Still have questions?<\/h2>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-1535be63930f7ed2ef76cc949c67e8736d5f40d3  col-sm-12 col-md-8\">\n<div class=\"faq-accordion\"><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is Security Information and Event Management (SIEM)?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p><a href=\"https:\/\/www.sumologic.com\/glossary\/siem\" data-type=\"glossary\" data-id=\"10803\">SIEM<\/a>&nbsp;software combines the capabilities of security information management (SIM) and security event management (SEM) tools.<\/p>\n\n\n\n<p>SIM technology collects information from a log consisting of various data types. In contrast, SEM looks more closely at specific types of events.<\/p>\n\n\n\n<p>Together, you can collect, monitor and analyze security-related data from automatically generated computer logs while centralizing computer log data from multiple sources. This comprehensive security solution enables a formalized incident response process.<\/p>\n\n\n\n<p>Typical functions of a SIEM software tool include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collecting, analyzing and presenting security-related data<\/li>\n\n\n\n<li>Real-time analysis of security alerts<\/li>\n\n\n\n<li>Logging security data and generating reports<\/li>\n\n\n\n<li>Identity and access management<\/li>\n\n\n\n<li>Log auditing and review<\/li>\n\n\n\n<li>Incident response and security operations<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.sumologic.com\/glossary\/siem\" data-type=\"glossary\" data-id=\"10803\">Learn more<\/a><\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">How do SIEM tools work?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>SIEM delivers superior incident response and enterprise security outcomes through several key capabilities, including:<\/p>\n\n\n\n<p><strong>Data collection<\/strong> &#8211; SIEM tools aggregate event and system logs and security data from various sources and applications in one place.<\/p>\n\n\n\n<p><strong>Correlation<\/strong> &#8211; SIEM tools use various correlation techniques to link bits of data with common attributes and help turn that data into actionable information for SecOps teams.<\/p>\n\n\n\n<p><strong>Alerting<\/strong> &#8211; SIEM tools can be configured to automatically alert SecOps or IT teams when predefined signals or patterns are detected that might indicate a security event.<\/p>\n\n\n\n<p><strong>Data retention<\/strong> &#8211; SIEM tools are designed to store large volumes of log data, ensuring that security teams can correlate data over time and enabling forensic investigations into threats or cyber-attacks that may have initially gone undetected.<\/p>\n\n\n\n<p><strong>Parsing, log normalization and categorization<\/strong> &#8211; SIEM tools make it easier for organizations to parse through logs that might have been created weeks or even months ago. Parsing, log normalization and categorization are additional features of SIEM tools that make logs more searchable and help to enable forensic analysis, even with millions of log entries to sift through.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are some example use cases for SIEM?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Popular SIEM use cases include:<\/p>\n\n\n\n<p><strong>Compliance<\/strong>&nbsp;&#8211; Streamline the compliance process to meet data security and privacy compliance regulations. For example, to comply with the PCI DSS, data security standards for merchants that collect credit card information from their customers, SIEM monitors network access and transaction logs within the database to verify that there has been no unauthorized access to customer data.<\/p>\n\n\n\n<p><strong>Incident response<\/strong>&nbsp;&#8211; Increase the efficiency and timeliness of incident response activities. When a breach is detected, SecOps teams can use SIEM software to quickly identify how the attack breached enterprise security systems and what hosts or applications were affected by the breach. SIEM tools can even respond to these attacks through automated mechanisms.<\/p>\n\n\n\n<p><strong>Vulnerability management<\/strong>&nbsp;&#8211; Proactively test your network and IT infrastructure to detect and address possible entry points for cyber attacks. SIEM software tools are an important data source for discovering new vulnerabilities, along with network vulnerability testing, staff reports and vendor announcements.<\/p>\n\n\n\n<p><strong>Threat intelligence<\/strong>&nbsp;&#8211; Collaborate closely to reduce your vulnerability to advanced persistent threats (APTs) and zero-day threats. SIEM software tools provide a framework for collecting and analyzing log data that is generated within your application stack. With UEBA, you can proactively discover insider threats.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">Why do security teams choose Sumo Logic for Cloud SIEM?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Sumo Logic Cloud SIEM is part of the\u00a0<a href=\"https:\/\/www.sumologic.com\/platform\" data-type=\"page\" data-id=\"24\">Sumo Logic security platform<\/a>, a cloud-native multi-use solution powered by logs. In addition to Cloud SIEM, Sumo Logic\u2019s robust log analytics platform supports Infrastructure Monitoring, Application Observability and Logs for Security for monitoring, troubleshooting and securing your apps.<\/p>\n\n\n\n<p>Customers choose Sumo Logic SIEM for these differentiated features:<\/p>\n\n\n\n<p><strong>One integrated log analytics platform<\/strong>&nbsp;&#8211; a single integrated solution for developers, security, operations and LOB teams.<\/p>\n\n\n\n<p><strong>Cloud-native, distributed architecture<\/strong>&nbsp;&#8211; scalable, multi-tenant platform powered by logs that never drop your data.<\/p>\n\n\n\n<p><strong>Tiered analytics and credit licensing<\/strong>&nbsp;&#8211; enjoy flexible subscriptions that scale as your data grows faster than your budget.<\/p>\n\n\n\n<p><strong>Machine learning and advanced analytics<\/strong>&nbsp;&#8211; identify, investigate and resolve issues faster with machine learning.<\/p>\n\n\n\n<p><strong>Out-of-the-box audit and compliance<\/strong>&nbsp;&#8211; you can easily demonstrate compliance with the broadest certifications and attestations.<\/p>\n\n\n\n<p><strong>Secure by design<\/strong>&nbsp;&#8211; We invest millions each year on certifications, attestations, pen testing, code review and paid bug bounty programs.<\/p>\n<\/div>\n                    <\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color has-large-font-size wp-elements-d53843c11097e3b6633dd1af8e876a78\" id=\"ready-to-build-an-intelligent-security-operation\">Ready to build an intelligent security operation?<\/h2>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-bc1ba312de6f6436afaf6a7c35207335\" style=\"color:#ffffff\">Experience the SIEM that connects the dots\u2014from detection to automation.<\/p>\n\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Schedule a demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-1151\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":24837,"parent":11298,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"4","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-585e707{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":136,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":70910,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/22\/revisions\/70910"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/11298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/24837"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}