{"id":5956,"date":"2021-01-11T09:19:00","date_gmt":"2021-01-11T09:19:00","guid":{"rendered":"http:\/\/www.sumologic.com\/blog\/improve-security-posture-velocity-visibility-vectors"},"modified":"2025-06-17T11:40:04","modified_gmt":"2025-06-17T19:40:04","slug":"improve-security-posture-velocity-visibility-vectors","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/blog\/improve-security-posture-velocity-visibility-vectors","title":{"rendered":"Improve your security posture by focusing on velocity, visibility, and vectors"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-a1b32f66e1749758df41d5aea14f647cd10e362c e-div--card-btn-link\">\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-eb613efb9bb1e68176fc526a3ac04fd6\">In the wake of the widely publicized <a href=\"https:\/\/www.fireeye.com\/blog\/products-and-services\/2020\/12\/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html\" target=\"_blank\" rel=\"noopener\">FireEye breach<\/a> and the alarming <a href=\"https:\/\/www.solarwinds.com\/securityadvisory\" target=\"_blank\" rel=\"noopener\">SolarWinds supply chain attack<\/a>, this presents an ideal opportunity for reflection on the broader shift taking place across the world\u2014the transition from legacy on-prem infrastructures to the cloud. When a sophisticated nation-state obtains utilities intended for Red Team activities&#8211; all but assuring nefarious intent&#8211; it should give our community pause as to the collective state of security readiness should an attacker leverage such tools.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b09727d0fda3a7dce055f611b39eb2ff\"><em>So what does a modern security analytics platform provide that can help defend critical assets in this continuously evolving threat landscape?<\/em> As it relates to your <a href=\"https:\/\/www.sumologic.com\/guides\/siem\" data-type=\"resource\" data-id=\"3026\">SIEM<\/a> platform, improving your organization\u2019s security posture is a complex issue that can be deconstructed into a few different focus areas we\u2019ll call: <strong>Velocity, Visibility, and Vector<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-bb03b4f3e0625457986b623079a2339a\" id=\"velocity\">Velocity<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-68a06d53354b1445523aebe4213ae7ab\">The reality on the frontlines is, SecOps and security analysts simply do not have time to track all of the evolving threats to an organization&#8217;s critical assets. Technology stacks being deployed are expanding with more niche and cross-vendor solutions that it becomes difficult to know which vulnerabilities in the latest headlines are relevant and what priority they should take. Further, deploying patches and content packs with new detection rules, signatures require many operational man-hours. Fortunately, cloud-native SaaS solutions are providing much-needed relief. Solutions like Sumo Logic\u2019s Cloud SIEM Enterprise release new actionable content in the form of correlation rules to the customer environment several times a week on average. That means, as we discover new threats, we can globally deploy content to all customer environments equipping them to automatically detect the threats. Additionally, writing SIEM correlation rules requires specialized skill, because Sumo Logic supports community standards like Sigma and <a href=\"https:\/\/www.sumologic.com\/blog\/siem-yara-rules\/\" target=\"_blank\">YARA rules<\/a>, customers can also find and import rules already developed by industry experts. As defenders, it is critical we share intelligence and content freely because if we don\u2019t, the adversary will always be one step ahead. In short, evaluate your current solution and consider: <\/p>\n\n\n\n<ol>\n<li>How updates are actively applied? <\/li>\n<li>At what regular cadence?<\/li>\n<li>What support the solution has for community-contributed content?<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-d8a3e29a7208c22aeea9a05e5f6652ac\" id=\"visibility\">Visibility<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-77141ece996f8ccc32e63f1590eb11b2\">Professor Patrick Wolf accurately stated \u201cthe rate at which we&#8217;re generating data is rapidly outpacing our ability to analyze it. The trick is to turn these massive data streams from a liability into a strength.\u201d Now that log analytics and security solutions have shifted to the cloud, organizations can finally keep pace with the rapid growth of machine data being generated. Furthermore, they\u2019re now able to scale elastically\u2013not only with collection\u2013but with the compute power required to make sense of the data. For example (as of October 2020) Sumo Logic analyzes <strong>1.6 quadrillion events<\/strong> and built a cloud-scale analytics platform that scans an average of <strong>873 petabytes<\/strong> of data &#8212; <em>every day<\/em>. All of this is accomplished without the deployment of any legacy on-prem hardware or infrastructure. The ability to search and visualize across such massive amounts of data has been a game changer for organizations. Taken to the next level, we can provide additional global intelligence insights across all our customers&#8217; data, allowing them to compare security attacks against their enterprise with the cyber landscape at large. This invaluable perspective would not be possible without a modern microservices-based, cloud-native architecture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-c5614b563a88d4cb78f85d414c05f7fd\" id=\"attack_vector\">Attack Vector<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-8049d97952222e5acaf1e38c08d570ea\">The last area to consider is the attack vectors being leveraged, and are signals being collected sufficiently to identify cyber events across all areas of IT infrastructure? Specifically, as organizations move from on-prem to hybrid cloud and then to multi-cloud, is the security team able to defend all of these beachheads? For example, does the solution provide out-of-the-box content for traditional Windows infrastructure, as well as Azure, AWS, and GCP? Does it allow for deeper inspection of both North-South and East-West traffic flowing between systems with open-source network analytics solutions like Bro\/Zeek? Solely relying on firewall logs for network visibility can leave critical blind spots. At a bare minimum, support for newer data sources like Zeek, Kubernetes+Falco, AWS VPC flow logs, and AWS Network Firewall are a must-have. Combined, these also bring new observability that helps modern security practitioners find the needle in the needles stack before a breach occurs.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-602a75225143dc270fa38e014abfe77f\">If you&#8217;re looking to modernize your security stack for greater visibility and reduce your time to detection and response, we\u2019d love to share with you how Sumo can help with your security team\u2019s digital transformation.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":78,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"3","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[127],"blog-tag":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4668,71369,71176","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[127],"blog-tag":[],"class_list":["post-5956","blog","type-blog","status-publish","hentry","blog-category-secops-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/78"}],"version-history":[{"count":4,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5956\/revisions"}],"predecessor-version":[{"id":26936,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5956\/revisions\/26936"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=5956"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-category?post=5956"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-tag?post=5956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}