{"id":3294,"date":"2025-01-15T00:07:54","date_gmt":"2025-01-15T00:07:54","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=integration&#038;p=3294"},"modified":"2026-01-09T15:42:38","modified_gmt":"2026-01-09T23:42:38","slug":"alphamountain","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/app-catalog\/alphamountain","title":{"rendered":"alphaMountain"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-2e98baf782d68706a32bb0229a40a9fd\" id=\"domain-and-ip-intelligence-with-alphamountain-and-sumo-logic\">Domain and IP Intelligence with alphaMountain and Sumo Logic<\/h2>\n\n\n\n<p class=\"has-text-align-center\">See how alphaMountain\u2019s threat response integration for Sumo Logic enables users to conduct investigations informed by reputation scores of the hosts, domains, and IP addresses of the target. Our artificial intelligence platform utilizes the latest machine learning techniques to provide broad coverage for the Internet\u2019s malicious actors.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icons-investigate-1.svg\" alt=\"\" class=\"wp-image-23680\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"investigate-unknown-hosts-domains-and-ip-addresses\">Investigate unknown hosts, domains, and IP addresses<\/h3>\n\n\n\n<p>The Sumo Logic alphaMountain threat response integration enables users to conduct investigations informed by reputation scores on hosts, domains, and IPs.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-detect-insider-threats-2.svg\" alt=\"\" class=\"wp-image-23668\" style=\"aspect-ratio:1;object-fit:cover;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"identify-hidden-and-emerging-threats\">Identify hidden and emerging threats<\/h3>\n\n\n\n<p>Identify hidden and emerging threats with the assistance of the advanced AI models powering alphaMountain\u2019s web reputation scoring displaying indicators with a risk score and a relevant content classification comprised of 83 categories.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icons-incidents-2.png\" alt=\"\" class=\"wp-image-3297\" style=\"width:63px;height:auto\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"reduce-incident-response-times-with-informed-threat-intelligence-data\">Reduce Incident response times with informed threat intelligence data<\/h3>\n\n\n\n<p>Accelerate resolution times with informed real-time threat intelligence data with the latest artificial intelligence technology to provide our customers with the most up-to-date cybersecurity data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1526\" height=\"844\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard1-1.png\" alt=\"\" class=\"wp-image-66326\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard1-1.png 1526w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard1-1-300x166.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard1-1-1024x566.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard1-1-768x425.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard1-1-575x318.png 575w\" sizes=\"auto, (max-width: 1526px) 100vw, 1526px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"annotate-alphamountain-riskscore-and-category\">Annotate alphaMountain riskScore and Category<\/h2>\n\n\n\n<p>Enrich any host, domain, IP address or URL with alphaMountain\u2019s threat riskScore and categorization.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"threat-hunting\">Threat Hunting<\/h2>\n\n\n\n<p>alphaMountain\u2019s riskScore scale can identify risky threat traffic based on 1000s of malicious risk factors before they are verified as known verdicts.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard2.png\" alt=\"\" class=\"wp-image-3299\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboards-alpha-mountain-dashboard3.png\" alt=\"\" class=\"wp-image-3300\" title=\"\"><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"threat-intelligence\">Threat Intelligence<\/h2>\n\n\n\n<p>alphaMountain\u2019s leading threat intelligence data immediately identifies malicious, suspicious, phishing, and other security risks that threaten an organization.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":3295,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[72],"translation_priority":[]},"selected_primary_terms":{"integration-use-case":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"11371,11363,11266","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[72],"class_list":["post-3294","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":7,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3294\/revisions"}],"predecessor-version":[{"id":66330,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3294\/revisions\/66330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/3295"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=3294"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-cloud-provider?post=3294"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-use-case?post=3294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}