{"id":5299,"date":"2022-06-29T20:40:00","date_gmt":"2022-06-29T20:40:00","guid":{"rendered":"http:\/\/www.sumologic.com\/blog\/soar-vs-siem"},"modified":"2025-06-17T08:40:02","modified_gmt":"2025-06-17T16:40:02","slug":"soar-vs-siem","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/blog\/soar-vs-siem","title":{"rendered":"SIEM vs SOAR : Evaluating security tools for the modern SOC"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-a1b32f66e1749758df41d5aea14f647cd10e362c e-div--card-btn-link\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"914\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Exploring-the-differences-between-SIEM-and-SOAR.jpg\" alt=\"Exploring the differences between SIEM and SOAR\" class=\"wp-image-5298\" title=\"\"><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-df4b4d5a253d2d28a42f82667aacb72f\" id=\"exploring_the_differences_between_siem_and_soar\">Exploring the differences between SIEM and SOAR<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f008934c359814ee90264f628caa7499\">A common question we receive is: should security orchestration, automation and response (<a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-soar\" data-type=\"page\" data-id=\"112\">SOAR<\/a>) replace security information and event management (<a href=\"https:\/\/www.sumologic.com\/guides\/siem\" data-type=\"resource\" data-id=\"3026\">SIEM<\/a>)? While the two technologies share some common components, they serve different purposes. As security teams look to modernize their security operations center (SOC) to meet the demands of cloud environments, automation is the key priority. To that end, it\u2019s vital to understand the roles of both SIEM and SOAR.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-c259080b4190e0bb5cce2590b63fc9c3\" id=\"the_function_and_use_cases_for_a_siem_tool\">The function and use cases for a SIEM tool<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-cabcca83f0c17e8a67053d488c9c4ad3\">SIEM software tools and products combine the capabilities of security information management (SIM) and security event management (SEM) tools into a comprehensive solution for cybersecurity. Typical functions of a SIEM software tool include:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-341f245168505d7d2f1692705b6a42c1\">Collecting, analyzing, and presenting security-related data<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-93f2ce2b2ac819bcae29b3fc91073a84\">Real-time analysis of security alerts<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1809e86d24152aa1c965126fdaf82c0c\">Logging security data and generating reports<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-12aa558ded250ea270eda05122bc1fcf\">Identity and access management<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3ef55b5dd362ddaaeaf12cffaef89382\">Log auditing and review<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-8801307d289bc545d3361965c2051ff1\">Incident response and security operations<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f6e4cb0efc84a5e6b2fe6ea7a7e206cf\"><br>Principle SIEM use cases are:<br><br><strong>Compliance<\/strong> &#8211; SIEM software tools can streamline the compliance process for organizations affected by data security and privacy compliance regulations. With SIEM tools, organizations can monitor network access and transaction logs within their database to verify that there has been no unauthorized access to customer data.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a3e3e75a976c3de530bade2b8c6ab325\"><strong>Incident investigation<\/strong> &#8211; When a breach is detected, SecOps teams can use SIEM software to quickly identify how the attack breached enterprise security systems and what hosts or applications were affected by the breach. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9303f7ed2a6fc7f1ac3bcd29e42c7981\"><strong>Vulnerability management<\/strong> &#8211; an ongoing process of proactively testing your network and IT infrastructure to detect and address possible entry points for cyber attacks. SIEM software tools are an important data source for discovering new vulnerabilities, along with network vulnerability testing, staff reports and vendor announcements.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f4637fe37dc9e96ee04894bf721d304f\"><strong>Threat intelligence<\/strong> &#8211; The analysis of internal and external cyber threats that could affect your business. SIEM software tools provide a framework for collecting and analyzing log data generated within your application stack for threat detection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-a41c51cdf1e27fd9d893ef6e01a32e59\" id=\"the_function_and_use_cases_for_soar\">The function and use cases for SOAR<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d27f88ae3230efa5905c91104f81da69\">SOAR optimizes processes and allows orchestration of different technologies into standardized response procedures for each type of attack, called Standard Operating Procedures (SOPs). It also automates repetitive tasks within these processes and ensures that all analysts follow the same procedures.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1d8db9adbf36f9d205b62048570cc685\">SOAR leverages the power of playbooks, machine learning, and progressive automation to enhance threat intelligence and speed up security&nbsp;processes.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-eb646fbacffbb97acf17cfaac815b0d2\">SOAR relies on machine learning to predict repeatable patterns to help SOC teams distinguish between false positives and negatives and intercept and approach cyber attacks proactively, rather than reactively. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1afb1eac72ae3cfcb79a6798795e7295\">Recently SOAR use cases have evolved to include:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c1db96315cf38bd0a8f9746f5b83e2b0\">SOC process optimization<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a634e4251e398e74c065022cdf81493c\">Incident response<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-342d778123c2a9bce0b431ab899f95e5\">Security threat investigation and hunting<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-865287d28aac701653167e86aa5dfc7b\">Threat intelligence management<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c6459db6707df9c9aa2632f04a6acfb3\">Security analysts recognize the necessity for cloud-based SOAR, with YoY adoption growing 85%\u00b9. Cloud SOAR addresses critical customer requirements:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c278c8135fecc61f374d1f4e9a3833e7\">Reduces false positives and duplicate events<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-4054354ece751cb510d52f3db3085778\">ML enables workflow-based automation (by recommending the right playbooks to respond to the incidents)<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1a61c92376595773b5c397a33033dcd2\">Supports both MSSP and complex corporate environments<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-4d43b02a0cbbe00fe9548dc39e889b8f\">Allows customers and partners to easily integrate tools and proprietary solutions with little coding experience (it also supports \u2018\u2019non-cyber\u2019\u2019 use cases)<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5b3f442cc2d6e680db084bd1f3181c93\">Leverages automated playbooks to provide rapid data enrichment and correlation<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e46df23fdfdf069ce45c61250904964b\">Manages all aspects of the incident case management, from identification through remediation<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-fd01b2cc28d37a80eb08b43e989c4de5\" id=\"siem_vs._soar\">SIEM vs. SOAR<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-0aad72c53e77af39aec47c797ef39cba\">Both SIEM technology and SOAR aggregate security data from various sources, but the locations and quantity of information sourced are different. While SIEM ingests various log and event data from traditional infrastructure component sources, a SOAR pulls in information from external emerging threat intelligence feeds, endpoint security software and other third-party sources to get a better overall picture of the security landscape inside the network and out.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-03a3c30283a04a55b93423091c2d4e7b\">After a SIEM alert, it&#8217;s up to the administrator to determine the path of an investigation. In contrast, a SOAR automates investigation path workflows to begin triaging and subsequently apply remediation processes. In other words, a SOAR starts from where a SIEM platform&#8217;s capabilities end. In practice, the two are complementary and work best in tandem. <\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7381c2209146c32d3aa344b58c234b9f\"><br>Combining SIEM and SOAR answers these three key questions for SecOps teams to optimize their incident response:<\/p>\n\n\n\n<ol>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-6f73ac1f18879c67ca9f7e94064f8cde\">How can I make our SIEM and threat intelligence data actionable and more effectively investigate alerts and incidents? <\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f5a8972678f84fbefb95011cd06ff035\">Given the increase in volume and scale across a growing attack surface, how can I prioritize my response to security incidents?<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3cfbf97cdc2c6ef312cb62488659f987\">How can I rapidly respond to security incidents confident that analysts are following defined SOPs?<\/p>\n\n\n\n<\/li>\n<\/ol>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-84e6ba263d4a3150e96b7cabf21efb3a\">Statistics show that the<a href=\"https:\/\/www.extrahop.com\/company\/blog\/2017\/dwell-time-new-security-metric\/\" target=\"_blank\" rel=\"noopener\"> <\/a>dwell time of security incidents can be well over <a href=\"https:\/\/www.secureworld.io\/industry-news\/cost-of-a-data-breach#:~:text=Ponemon%20report%3A%20breach%20to%20detection%20and%20remediation%20times&amp;text=It%20is%20the%20lifecycle%20of,additional%2075%20days%20to%20contain.\" target=\"_blank\" rel=\"noopener\">200 days<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-63c79240ce05b690d84c1be5aa5baa4a\" id=\"legacy_siems,_vs_cloud_siem_and_cloud_soar\">Legacy SIEMs, vs Cloud SIEM and Cloud SOAR<\/h3>\n\n\n\n<table>\n<tbody>\n<tr>\n<td>\n<p dir=\"ltr\" class=\"tablehead\"><strong>Capability<\/strong><\/p>\n<\/td>\n<td>\n<p dir=\"ltr\" class=\"tablehead\"><strong>Legacy SIEM<\/strong><\/p>\n<\/td>\n<td>\n<p dir=\"ltr\" class=\"tablehead\"><strong>Cloud SIEM<\/strong><\/p>\n<\/td>\n<td>\n<p dir=\"ltr\" class=\"tablehead\"><strong>Cloud SOAR<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9f7dee15f173a05471134de9a433ca3f\">Security monitoring<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-dc35f5ebf3ccc7cf04d45275c630e4b3\">Lack monitoring functionality. When something stops working, logs aren\u2019t generated, and thus the SIEM can\u2019t aggregate nor generate alerts.<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e51209bf18d083758913d5585c7442c1\">Provides visualization through dashboards and embedded workflows of applications, workloads, and the complete security stack.<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-06e9d2afa062e5aa49ebd7a9c90d9289\">Receives malfunction alerts and activates appropriate investigation and response processes.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-075ae153861bb693ac08f6b79bb27fad\">Alert generation<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7861d1183a0984bede003cdc6c058d63\">Creates a large number of alerts.<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-195272c870cfa97eaba68e75bd524861\">Automatically triages and converts security signals into actionable, high-fidelity alerts called Insights.<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5a7a2b558d647f0c16c95641ce569aa3\">Receives alerts and Insights from Cloud SIEM, or searches specific alerts automatically using Cloud SOAR daemons.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3eb18cabe952915de677e4521fd735a5\">Alert analysis<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-41ac1ec97f2d1a59d1a2600169fe87ad\">and triage of<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-dbb17561d65fde7fca00b1a8d1a7048c\">false positives<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1fae839005ea0b9088707860eb8aca01\">Lacks automated alert triage, and often contributes to an increase in false-positive alerts.<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-66333320131d51ad8aa9bf231dfbf804\">Automated threat correlation and enrichments with predictive Confidence Scores, helping reduce false positives using crowd-sourced Global Intelligence ML model.<\/p>\n\n\n\n<\/td>\n<td>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b3f46da00a7f1609953e07c89c378f1a\">Completely automated workflow from alert validation to playbook activation and creates incidents only when real threats are detected. <\/p>\n\n\n\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-deab1562e8987482251b22165ec11874\" id=\"how_to_choose_the_right_soar_platform_to_pair_with_siem\"><br>How to choose the right SOAR platform to pair with SIEM<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-6175af13b22a2631dec8faa507d220b1\">Industry standards dictate that all aspects of the incidents should be managed from a singular platform. Being able to work through each phase of that incident response life cycle inside of your SOAR platform. Here are seven factors that constitute a quality SOAR platform:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-83cc57de7427f55f216b912d268ae298\">Open integration framework and lateral use cases<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7abb08cae3b6bd9c8015f744bcd69495\">Progressive automation<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5cdab917cdbd58f3612d804b97825f6c\">Comprehensive incident case management<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ae9411221083a6a65b821f41c7d91cc1\">SecOps dashboard and War Room<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b6f1b066a7c6c58a2c4965e89b5b4043\">Role-based KPI dashboards &amp; comprehensive Reporting Library<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-05481c5fa01fa45f8616b25df205ae63\">Incident detailed reports are automatically created<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-4707b5b76cadbe2d2349abb5ec886753\" id=\"modernizing_the_soc_with_cloud_soar_and_cloud_siem\">Modernizing the SOC with Cloud SOAR and Cloud SIEM<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-045b77e8e6d099f31b8947885ce98ae9\">The foundation of the modern SOC revolves around automating all time-consuming processes that slow SOC performance. With the amount of data waiting to be ingested by SOCs growing by the day, traditional SOCs can\u2019t rely on manual labor to get the job done efficiently. <br><br>Both SIEM and SOAR connect disparate tools and use the aggregated data to provide insightful information to the security team, easing their job in incident detection, investigation, and remediation. Every business, organization, staff, tool and response process is different. That&#8217;s why flexibility is key. Sumo Logic Cloud SOAR relies on its <a href=\"https:\/\/www.sumologic.com\/glossary\/open-integration-framework-oif\" data-type=\"glossary\" data-id=\"11066\">Open Integration Framework<\/a> to easily blend within the deployed environment and integrate with different security technologies seamlessly, including SIEM. This allows the cyber team to build and maintain their incident response processes and harmoniously utilize <a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-soar\" data-type=\"page\" data-id=\"112\">Cloud SOAR<\/a> and <a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-siem\" data-type=\"page\" data-id=\"22\">Cloud SIEM<\/a>.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-560b334f4004d50a22e4be206f2aee8a\">\u00b9 A SANS 2021 Survey: Security Operations Center (SOC)<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":121,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"4","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[133],"blog-tag":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4668,71369,71176","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[133],"blog-tag":[],"class_list":["post-5299","blog","type-blog","status-publish","hentry","blog-category-cloud-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/121"}],"version-history":[{"count":6,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5299\/revisions"}],"predecessor-version":[{"id":26832,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5299\/revisions\/26832"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=5299"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-category?post=5299"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-tag?post=5299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}