{"id":3468,"date":"2025-01-17T01:31:11","date_gmt":"2025-01-17T01:31:11","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=integration&#038;p=3468"},"modified":"2025-05-08T19:34:12","modified_gmt":"2025-05-09T03:34:12","slug":"aria-packet-intelligence","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/app-catalog\/aria-packet-intelligence","title":{"rendered":"ARIA Packet Intelligence App for Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-77788eed68a4a71c125946e5caaa4747\" id=\"gain-insights-into-your-internal-network-traffic-to-accelerate-incident-detection-and-response\">Gain insights into your internal network traffic to accelerate incident detection and response<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-valuable-security-insights-2.svg\" alt=\"\" class=\"wp-image-23679\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"detect-network-cyber-attacks\">Detect network cyber-attacks<\/h3>\n\n\n\n<p>The ARIA PI application creates unsampled NetFlow or IPFIX metadata for every network packet. This allows for the detection of network-borne attacks, including ransomware, malware, APTs and intrusions early in the kill chain before significant harm occurs.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-in-depth-security-3.svg\" alt=\"\" class=\"wp-image-23672\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"stop-attacks-immediately\">Stop attacks immediately<\/h3>\n\n\n\n<p>SOC teams using the ARIA SDS interface, or a SOAR application, can instruct the in-line ARIA SDS instances, to stop the specific threat conversations based on the packet SRC\/DST or 5 tuple. All the while leaving critical devices and production VMs online.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-logs.svg\" alt=\"\" class=\"wp-image-3934\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"classify-network-threats\">Classify network threats<\/h3>\n\n\n\n<p>ARIA SDS classifies and generates metadata for all network traffic. As threats are detected, via this metadata SOAR applications, can automatically drive the ARIA PI application to redirect data conversations, as set on filters like Packet SRC\/DST, for further inspection, by detection tools like an IPS\/IPS and DLP.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3199\" height=\"1404\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-threat-new.png\" alt=\"\" class=\"wp-image-3472\" title=\"\"><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"aria-sds-pi-threat-summary\">ARIA SDS PI Threat Summary<\/h2>\n\n\n\n<p>An at-a-glance view, generated by data from ARIA SDS Packet Intelligence, to provide insight into network security posture. This provides a drill down summary of critical threats and attacks<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"aria-sds-pi-network-traffic-visibility\">ARIA SDS PI Network Traffic Visibility<\/h2>\n\n\n\n<p>Provides a drill down view as to what is communicating within your organization.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3199\" height=\"1404\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-traffic-new.png\" alt=\"\" class=\"wp-image-3474\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":3470,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[71]},"selected_primary_terms":{"integration-use-case":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"11371,11363,11266","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[71],"class_list":["post-3468","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":7,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3468\/revisions"}],"predecessor-version":[{"id":23733,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3468\/revisions\/23733"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/3470"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=3468"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-cloud-provider?post=3468"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-use-case?post=3468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}