{"id":3603,"date":"2025-01-21T18:51:30","date_gmt":"2025-01-21T18:51:30","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=integration&#038;p=3603"},"modified":"2025-05-08T19:34:14","modified_gmt":"2025-05-09T03:34:14","slug":"aws-network-firewall","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/app-catalog\/aws-network-firewall","title":{"rendered":"AWS Network Firewall App for Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-ff06c92a72e98034d97bcb646bfc94ca\" id=\"automated-threat-detection-and-correlation-for-aws-network-firewall\">Automated threat detection and correlation for AWS Network Firewall<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-optimize.svg\" alt=\"\" class=\"wp-image-3488\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"automated-security-operations\">Automated security operations<\/h3>\n\n\n\n<p>Automatically generate actionable Insights\u2013not just prioritized alerts\u2013enriched with user, device and network context across all of your AWS and any hybrid on-premises and cloud data sources.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-detect-insider-threats.svg\" alt=\"\" class=\"wp-image-3881\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"threat-insights\">Threat insights<\/h3>\n\n\n\n<p>Correlate threats and events automatically from AWS Network Firewall with events across your infrastructure, application, and security vendors to investigate root causes.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-performance-1.svg\" alt=\"\" class=\"wp-image-23149\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"rapid-response\">Rapid response<\/h3>\n\n\n\n<p>Reduce time to detect, investigate, and remediate security issues surfaced from your AWS Network Firewall rule events and alerts.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4.png\" alt=\"\" class=\"wp-image-3605\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-575x323.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"rapid-threat-detection\">Rapid threat detection<\/h2>\n\n\n\n<p>Sumo Logic\u2019s Cloud SIEM solution performs automated threat detection, analysis, and correlation using threat intelligence, historical searches, and out-of-the-box security rules for AWS services \u2013including AWS Network Firewall\u2013 and any hybrid on-premises and cloud data sources. By correlating security alerts from AWS Network Firewall, other AWS services and all your security tools, Sumo Logic provides you with granular visibility for investigating threats along with context automatically enriched from user, device, and network activity.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"threat-intelligence\">Threat intelligence<\/h2>\n\n\n\n<p>Sumo Logic&#8217;s Threat Intelligence functionality\u2013powered by CrowdStrike\u2013works out-of-the-box with our AWS Network Firewall app, allowing you to quickly identify potential threats and indicators of compromise. This intelligence also helps you understand the security posture of sources connecting to your AWS and hybrid environments.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2.png\" alt=\"\" class=\"wp-image-3606\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-575x323.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2.png\" alt=\"\" class=\"wp-image-3607\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-575x323.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"the-sumo-logic-advantage\">Granular visibility<\/h2>\n\n\n\n<p>Delivers a unified view of all security events for managing alerts, running analytics for rapid detection of threats, deep forensic investigation, and quick incident response.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"threat-intelligence\">Built with security-first principle<\/h2>\n\n\n\n<p>Our strong commitment to data security is validated by the platform\u2019s third-party compliance attestations and certifications, including PCI DSS 3.2.1 Service Provider Level 1 attestation of compliance, SOC 2 Type 2 Audit Report, HIPAA Security Rule Attestation of Compliance, ISO 27001 Certification, and CSA STAR Level 2 Certification.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"678\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle.png\" alt=\"\" class=\"wp-image-3608\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-300x127.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-1024x434.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-768x325.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-1536x651.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-575x244.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"506\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search.png\" alt=\"\" class=\"wp-image-3609\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-300x95.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-1024x324.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-768x243.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-1536x486.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-575x182.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"the-sumo-logic-advantage\">Scalable SaaS delivery model<\/h2>\n\n\n\n<p>Sumo Logic is built natively in AWS to provide flexibility, scalability, and agility as the types, quantities, and sources of your organization\u2019s data continues to grow. Sumo Logic\u2019s dynamic scaling can ingest petabytes of data a day giving you end-to-end visibility of your security posture at all times.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":3604,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[99],"integration-use-case":[71]},"selected_primary_terms":{"integration-cloud-provider":[],"integration-use-case":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"11371,11363,11266","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[99],"integration-use-case":[71],"class_list":["post-3603","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-cloud-provider-amazon-web-services","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3603\/revisions"}],"predecessor-version":[{"id":23180,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/3603\/revisions\/23180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/3604"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=3603"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-cloud-provider?post=3603"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-use-case?post=3603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}