{"id":8396,"date":"2025-01-31T05:54:17","date_gmt":"2025-01-31T05:54:17","guid":{"rendered":"http:\/\/www.sumologic.com\/?page_id=8396"},"modified":"2026-02-17T15:04:48","modified_gmt":"2026-02-17T23:04:48","slug":"logs-for-security","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/solutions\/logs-for-security","title":{"rendered":"Logs for Security"},"content":{"rendered":"\n<section class=\"e-stn e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 e-stn--main-banner\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<p class=\"eyebrow has-chinese-silver-color has-text-color has-link-color wp-elements-a77759c6faa7d5bb79797d29dae10783\">Logs for Security<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-5e9a8f9135b9bd5aed7825f61fffac43\" id=\"secure-comply-and-respond\">Secure, comply, and respond<\/h1>\n\n\n\n<p class=\"description has-chinese-silver-color has-text-color has-link-color wp-elements-1f8efb33b581715e9ef84425da0371b9\">Sumo Logic\u2019s integrated cloud security platform provides AWS protection, PCI compliance, and AI-driven guided search to help you resolve incidents faster, meet compliance demands, and strengthen your cloud infrastructure.<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\"href=\"\/sign-up\" target=\"_self\">\n<p class=\"title\">Start free trial<\/p>\n<\/a><\/div>\n\n\n\n\n<p class=\"btn-label has-chinese-silver-color has-text-color has-link-color wp-elements-dc452da88a21a6926721b2012dc05c4e\">30 day trial.&nbsp;<br>No credit card.<\/p>\n<\/div>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-chinese-silver-color has-text-color has-link-color wp-elements-0f23907f54262a3e83257ea985cd5054\">Ready to see the platform? <a href=\"https:\/\/www.sumologic.com\/request-demo\" data-type=\"page\" data-id=\"163\">Book a demo<\/a> or<a href=\"https:\/\/www.sumologic.com\/demo\/securing-aws-infrastructure\" data-type=\"demo\" data-id=\"1442\">see it for yourself<\/a>.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"e-div e-div-c798c7a4466427637118b74d5226a20455577ae2 e-div--media-wrapper\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"458\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/LogsForSecurity_Hero_651x458_NoBlueGlow.png\" alt=\"\" class=\"wp-image-8397\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/LogsForSecurity_Hero_651x458_NoBlueGlow.png 651w, https:\/\/www.sumologic.com\/wp-content\/uploads\/LogsForSecurity_Hero_651x458_NoBlueGlow-300x211.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/LogsForSecurity_Hero_651x458_NoBlueGlow-575x405.png 575w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n<\/div>\n\n<div class=\"e-img e-img--section-bg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/main-banner-bg-blur.svg\" alt=\"Logs for Security\" class=\"wp-image-1076\" title=\"\"><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"e-div e-div-b811dc700533949fc5121627184bac0481bd5190 e-div--card-wrapper\">\n\n<div class=\"e-img \"><a href=\"https:\/\/www.sumologic.com\/case-studies\/standard-chartered\" target=\"_blank\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"652\" height=\"150\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/LOGS-standard-charter-2.svg\" alt=\"\" class=\"wp-image-8398\" title=\"\"><\/figure>\n<\/a><\/div>\n\n\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-bca39d0678b768d2f453e1f198650d89ee6f9557 e-stn--navigation-tabs e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-bca39d0678b768d2f453e1f198650d89ee6f9557 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #ffffffe0; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-a8a430092d6301ca0b738e2949102462319d06f7  col-sm-12\">\n<div class=\"e-div e-div-06cdc3be1138087fcdd84f8d2519217157acd654 e-div--navigation-tabs-wrapper\">\n<p id=\"section-nav-1\">Unified visibility<\/p>\n\n\n\n<p id=\"section-nav-2\">PCI compliance<\/p>\n\n\n\n<p id=\"section-nav-3\">Dojo AI<\/p>\n\n\n\n<p id=\"section-nav-why\">Why Sumo Logic?<\/p>\n\n\n\n<p id=\"section-nav-faq\">FAQ<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-f6654d6872a382a5c6290a22ce4e031fa39db1ea e-stn--dlt e-mt-0 e-pt-50 e-mb-0 e-pb-0  e-pb-sm-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-f6654d6872a382a5c6290a22ce4e031fa39db1ea { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-f5ce374d0251b1eeaae539dd91079af48af6ab5c  col-sm-9\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-a8a647dc502bd6753e9ac7ee1dcd2dd9\" id=\"extended-visibility-with-logs-1\">Extended visibility with logs<\/h2>\n\n\n\n<div class=\"e-div e-div-4811722787c96388d2dddea15778413c93d7cdc1 e-div--content-wrapper\">\n<p class=\"has-text-align-center has-delft-blue-color has-text-color has-link-color wp-elements-300cb472190a03dbc1e556598800a9e1\">Logs for Security, collecting and analyzing critical, often overlooked cloud-specific logs. Integrating logs from AWS, Google Cloud, and Azure delivers comprehensive monitoring to detect risks unique to cloud infrastructure. This expanded coverage empowers security teams to catch threats that standard tools may miss while automated dashboards streamline compliance with frameworks like PCI, eliminating manual work.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-1\" class=\"e-stn e-stn-882ea8d4f6335bfbc25115eff8c5a9b78952f832 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-882ea8d4f6335bfbc25115eff8c5a9b78952f832 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-7528da3328c31abd80736fd0fddae35c\" id=\"secure-saas-and-cloud-based-applications\">Complete visibility and control over your AWS environments<\/h2>\n\n\n\n<p>Our unified interface streamlines investigations across cloud providers. With built-in threat intelligence from multiple trusted sources, you can enrich detections instantly with global context\u2014no manual effort is required. Monitor, detect, and respond to threats swiftly, reducing the chance of vulnerabilities going unnoticed and strengthening your overall security posture.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/solutions\/cloud-infrastructure-security\" target=\"_self\">\n<p class=\"title\">Learn more<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \"><a href=\"data:text\/html, &lt;div class=&quot;wistia_responsive_padding&quot; style=&quot;padding:56.25% 0 0 0;position:relative;&quot;&gt;&lt;div class=&quot;wistia_responsive_wrapper&quot; style=&quot;height:100%;left:0;position:absolute;top:0;width:100%;&quot;&gt;&lt;iframe src=&quot;https:\/\/fast.wistia.net\/embed\/iframe\/hcn9yjtf5t?web_component=true&amp;seo=true&quot; title=&quot;Micro Lesson: Cloud SIEM MITRE ATT&amp;amp;CK&reg; Threat Coverage Explorer Video&quot; allow=&quot;autoplay; fullscreen&quot; allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot; class=&quot;wistia_embed&quot; name=&quot;wistia_embed&quot; width=&quot;100%&quot; height=&quot;100%&quot;&gt;&lt;\/iframe&gt;&lt;\/div&gt;&lt;\/div&gt;\n&lt;script src=&quot;https:\/\/fast.wistia.net\/player.js&quot; async&gt;&lt;\/script&gt;\" data-type=\"iframe\" data-fancybox=\"1\" data-click=\"\" data-click-slide=\"\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny-1024x574.png\" alt=\"\" class=\"wp-image-8401\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny-1024x574.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny-300x168.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny-768x431.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny-1536x861.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny-575x322.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS_tiny.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-2\" class=\"e-stn e-stn-c283737d522fe85a630debd574f46357ccedbb47 e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \"><a href=\"http:\/\/www.youtube.com\/watch?v=T4WAZz8-r54\" data-fancybox=\"1\" data-type=\"iframe\" target=\"_blank\" rel=\"noopener\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"659\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny-1024x659.png\" alt=\"\" class=\"wp-image-8402\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny-1024x659.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny-300x193.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny-768x495.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny-1536x989.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny-575x370.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-PCI_tiny.png 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-55bee9a4d3757c356d98ecaac7887ff3\" id=\"secure-saas-and-cloud-based-applications\">Effortless PCI compliance with real-time monitoring<\/h2>\n\n\n\n<p>Cut the challenges of time-consuming audits, manual compliance tracking, and balancing regulatory demands with pre-built PCI compliance dashboards. Our automation and dashboards continuously monitor for compliance violations, accelerating audits and eliminating hours of manual work. With real-time detection of non-compliance and flexible reporting, Sumo Logic helps security teams shift left on compliance.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/solutions\/audit-compliance\" target=\"_self\">\n<p class=\"title\">Learn more<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section id=\"section-3\" class=\"e-stn e-stn-08aa197930f45d32ca87b1d0b6d6534d09dbc6ee e-mt-0 e-pt-80 e-mb-0 e-pb-80\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-08aa197930f45d32ca87b1d0b6d6534d09dbc6ee { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-10a0378d286a7667d2fce16224d13c72fc37ce62 e-col--content-wrapper  col-sm-12 col-lg-6 align-content-center\">\n<h2 class=\"wp-block-heading has-gunmetal-color has-text-color has-link-color has-large-font-size wp-elements-9aa7f0c863115f8fcaf1993acba85010\" id=\"secure-saas-and-cloud-based-applications\">AI-driven investigation and response<\/h2>\n\n\n\n<p>Investigate incidents in seconds\u2014not hours. Sumo Logic Dojo AI uses AI-driven summaries and natural language queries to surface likely root causes, prioritize key events, and guide analysts through resolution. Whether junior or expert, your team investigates smarter with fewer clicks.<\/p>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/guides\/agentic-ai-log-analytics\" target=\"_self\">\n<p class=\"title\">Read guide<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny-1024x506.png\" alt=\"\" class=\"wp-image-8403\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny-1024x506.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny-300x148.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny-768x379.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny-1536x759.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny-575x284.png 575w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AI-Driven_Investigation_Tiny.png 1680w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section id=\"section-why\" class=\"e-stn e-stn-2138729c79c2e8bf37e5f1ab42fd97cfc182ea67 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-2138729c79c2e8bf37e5f1ab42fd97cfc182ea67 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center mb-3 has-eigengrau-color has-text-color has-link-color wp-elements-5103969d1fbe4da88893f5a9bdac6bfa\" id=\"know-your-cloud-attack-surface\">Know your cloud attack surface<\/h2>\n\n\n\n<p class=\"has-text-align-center mb-5 has-delft-blue-color has-text-color has-link-color wp-elements-f43cf418c597886eed65142a5b232d0c\">Manage your attack surface, even in complex cloud environments with Sumo Logic\u2019s cloud-scale collection, storage and security analytics.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-CombatComplexity.svg\" alt=\"\" class=\"wp-image-8412\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-fa12f82181e9d0793564d334dff33ed7\" id=\"automated-insights\">Combat complexity<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-bfb25a9d2efcfb104d2ca10e05def5b2\">Distill insights from across your entire microservices architecture and enable teams to collaborate and resolve the hardest questions facing digital companies.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-IncreaseVisibility.svg\" alt=\"\" class=\"wp-image-8413\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-acfe2367a9bc732607a6930862a3c896\" id=\"cloud-native-architecture\">Increase visibility<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d515fd8da843d6793473135978241ec9\">Accelerate security and reliability management workflows across development and operations, maintaining security visibility and managing your risk and cloud attack surface.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"41\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-MaximizeEfficency.svg\" alt=\"\" class=\"wp-image-8414\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-2562ae58f1f19318fdd86763cb2dbe08\" id=\"single-collaborative-siem-platform\">Maximize efficiency<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e826c47552f43db41e7daa678cab1060\">Enable practitioners of all skill levels to easily manage their cloud attack surface with curated, out-of-the-box AI-driven security content. Security personnel can share dashboards and jointly resolve security issues as they arise from anywhere.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-OptimizeCosts.svg\" alt=\"\" class=\"wp-image-8415\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-604ca1e0374a0a0d350176e2b7c6f435\" id=\"automated-insights\">Optimize costs<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d5af5f9e419d743dc824c04a95cd1624\">Flex pricing lets you optimize your data analytics and pay for insights, not ingest. All data are stored compliantly, consistent with an extensive list of regulatory frameworks, without data rehydration or sacrificing on performance.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-UnifedInterface.svg\" alt=\"\" class=\"wp-image-8417\" style=\"width:auto;height:40px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-7323cf069ae766e0e334a1c6c414c8b6\" id=\"cloud-native-architecture\">Unified interface<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-0e99399105d1d50f7294b8daa2c49a74\">All teams share visibility, with a single source of truth fueled by logs. Unlimited users and a unified interface powers true DevSecOps.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized mb-3\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-detect-insider-threats-2.svg\" alt=\"\" class=\"wp-image-23668\" style=\"width:40px;height:auto\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading mb-2 fs-4 has-eigengrau-color has-text-color has-link-color wp-elements-6d025e87ae66f3603e2111b4f87a6d44\" id=\"cloud-native-architecture\">Anomaly detection<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f1986988e228d917a89435e1fb26319d\">Spot anomalies with precision. AI-driven alerts analyze 60 days of patterns, factoring in seasonality, to detect what\u2019s truly unusual against baselines or expected values.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"page-section resource-card-section gsbp-585e707 alignfull\" id=\"section-6\">\n<div>\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Additional resources<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper mt-3 grid--3\">\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/idc-sumo-logic-roi\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-IDC_ROI_Meta_1200x628_TINY-v2-1.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">brief<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">IDC ROI report<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download brief<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/standard-chartered\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-StandardCharter_326x183_Resources-1.svg\" alt=\"\" width=\"326\" height=\"183\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Standard Chartered nexus case study<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/briefs\/accelerate-your-sdlc-with-devsecops\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Accelerate-and-secure-your-SDLC-v2-2.jpg\" alt=\"\" width=\"652\" height=\"367\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">ebook<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Accelerate and secure your SDLC with DevSecOps ebook<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Download ebook<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/hashicorp\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Hashicorp_326x183_Resources-1.png\" alt=\"\" width=\"326\" height=\"183\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">case study<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">HashiCorp case study<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Read case study<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/demo\/securing-aws-infrastructure\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Security-AWS-infrastructure-storylane_326x183.png\" alt=\"\" width=\"326\" height=\"183\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">demo<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Security AWS infrastructure product tour<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">View demo<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/sumo-logic.wistia.com\/medias\/teoeeglf22\" target=\"_blank\" rel=\"noopener\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Microlesson_CISforAWS_326x183-v2.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">video<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Microlesson: CIS for AWS<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Watch video<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section id=\"section-faq\" class=\"e-stn e-stn-b804fec4852b1b767a153fcbcbf7af7f43a839e5 e-stn--faq-accordion\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-029c01502d78b7cff6900cd3b2a145337ca3a946  col-sm-12 col-md-4\">\n<h2 class=\"wp-block-heading has-delft-blue-color has-text-color has-link-color wp-elements-152c54c72ad88816c8399a2df60d129e\" id=\"faqstill-have-questions\">FAQ<br>Still have questions?<\/h2>\n\n\n<div class=\"e-btn e-btn--underline-black-common-link-with-arrow\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/request-demo\" target=\"_self\">\n<p class=\"title\">Get a demo<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-1535be63930f7ed2ef76cc949c67e8736d5f40d3  col-sm-12 col-md-8\">\n<div class=\"faq-accordion\"><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is the cloud attack surface?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>The cloud attack surface refers to all the potentially exposed applications, networked devices and infrastructure components that threat actors could exploit within a cloud infrastructure or environment. Issues such as unpatched vulnerabilities in microservices architecture and misconfigurations can compromise the security of cloud-based systems, applications and data. The attack surface in a cloud environment is dynamic and can change as the cloud infrastructure evolves and new services, applications and configurations are introduced.<\/p>\n\n\n\n<p>Common components of the cloud attack surface include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User accounts and credentials<\/li>\n\n\n\n<li>Application Programming Interfaces (APIs)<\/li>\n\n\n\n<li>Cloud databases or object storage<\/li>\n\n\n\n<li>Network connections, including virtual private clouds (VPCs) and public internet connections<\/li>\n\n\n\n<li>Virtual machines (VMs) and containers (Kubernetes)<\/li>\n\n\n\n<li>Data in transit (sent over a network)<\/li>\n\n\n\n<li>Data at rest (in cloud storage)<\/li>\n<\/ul>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is infrastructure security in cloud computing?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Infrastructure security in cloud computing refers to the practices, tools and measures to protect the underlying\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/it-infrastructure\" data-type=\"glossary\" data-id=\"11008\">IT infrastructure<\/a>\u00a0and resources that make up a\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/cloud-computing\" data-type=\"glossary\" data-id=\"10905\">cloud computing<\/a> environment. This includes safeguarding the physical data centers, servers, networking components and other hardware and the virtualization and management software enabling cloud services. Infrastructure security is a critical aspect of overall cloud security, as the integrity of these components is essential for the secure operation of cloud services.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is the difference between cloud security and cybersecurity?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p><a href=\"https:\/\/www.sumologic.com\/glossary\/cyber-security\" data-type=\"glossary\" data-id=\"10935\">Cybersecurity<\/a>\u00a0refers to the set of processes, policies and techniques that work together to secure an organization against digital attacks. Cloud security is a collection of procedures and technology designed to address external and internal security threats targeting virtual servers or cloud services and apps.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">How does Sumo Logic encrypt its data for cloud security?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>All data at rest within the Sumo Logic system is encrypted using strong AES 256-bit encryption. All spinning disks are encrypted at the OS level and all long-term data storage is encrypted using per-customer keys which are rotated every twenty-four hours.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is the purpose of a security compliance audit?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>The purpose of a security compliance audit is to assess and evaluate an organization&#8217;s adherence to specific security standards, regulations, or frameworks. Essentially, it answers the question,&nbsp;<em>how are your current security controls meeting the security and privacy requirements of the protected assets?<\/em><\/p>\n\n\n\n<p>In addition to assessing compliance, the cybersecurity audit helps identify potential security vulnerabilities, weaknesses, and risks, assesses the effectiveness of a company\u2019s security controls and measures, verifies the existence and adequacy of security-related policies, procedures, and documentation, and ensures organizations meet legal and regulatory requirements of their industry.<\/p>\n\n\n\n<p>In so doing, a cybersecurity compliance audit helps organizations improve their overall security posture and is evidence of an organization&#8217;s commitment to protecting its assets from potential threats and risks<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What is compliance risk management?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Compliance risk management refers to identifying, assessing, and mitigating risks associated with non-compliance with laws, regulations, industry standards, and internal security policy within an organization. It is an ongoing process that requires commitment, resources, and a proactive approach to ensure that an organization operates in a compliant manner. And it involves establishing systematic approaches and controls to ensure that the organization operates within the boundaries of legal and regulatory requirements.<\/p>\n\n\n\n<p>By effectively managing compliance risks, organizations can reduce legal and financial liabilities, protect their reputation, build trust with stakeholders, and create a more sustainable and ethical business environment.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What are compliance auditors looking for?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>An external audit by a compliance auditor (also known as an external auditor or compliance officer) will conduct an audit process to assess the internal policies of a company&#8217;s compliance program and determine if its fulfilling its compliance obligations.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">What rules must compliance audits follow?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>Specific rules may vary depending on the audit framework or standard being used, but there are some general rules that apply universally.<\/p>\n\n\n\n<p>Auditors must maintain independence and objectivity throughout the audit process, thoroughly document the process with a completed report, and adhere to a recognized compliance framework or standard, such as ISO 27001, NIST Cybersecurity Framework, PCI DSS, or industry-specific regulations.<\/p>\n\n\n\n<p>The audit scope should be clearly defined, including the systems, processes and areas of the organization that will be assessed. Audits should take a risk-based approach, identifying and prioritizing higher-risk areas for detailed security assessment. Subsequently, they select a representative sample of systems, processes, or transactions for examination rather than auditing every item.<\/p>\n<\/div>\n                    <\/div><div class=\"faq-item\">\n                        <button class=\"faq-question\">How do companies save time, demonstrate compliance and avoid risk with Sumo Logic?<span class=\"faq-icon\">+<\/span><\/button>\n                        <div class=\"faq-answer\">\n<p>When it\u2019s time for an audit, the Sumo Logic platform increases understanding, streamlines the auditing process and ensures ongoing compliance with various security regulations and frameworks in the following ways:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Centralize data collection, capturing a wide range of organizational data from wherever it originates, empowering organizations to monitor and learn from it.<\/li>\n\n\n\n<li>Make various data types available with 100% visibility and visualize them in compelling, configurable dashboards for real-time monitoring and insights.<\/li>\n\n\n\n<li>Find any data at any time using query language to create filters and search parameters \u2014 whether it relates to regulatory compliance or internal security controls.<\/li>\n\n\n\n<li>Leverage machine learning analytics to improve and streamline audit processes and expedite compliance using tools like our\u00a0<a href=\"https:\/\/www.sumologic.com\/solutions\/pci-compliance\/\">PCI Dashboard<\/a>.<\/li>\n\n\n\n<li>Cost-effective data storage that maintains attestations, such as SOC2 Type II, HIPAA, PCI Service Level 1 Provider, and a\u00a0<a href=\"https:\/\/www.sumologic.com\/fedramp\/\">FedRAMP<\/a>\u00a0moderate authorized offering.<\/li>\n\n\n\n<li>Real-time monitoring of incoming data and security controls to identify anomalies that could signal a security risk, cyber threats, vulnerability, security threat or non-compliance.<\/li>\n<\/ul>\n\n\n\n<p>Numerous data integrations and&nbsp;<a href=\"https:\/\/www.sumologic.com\/applications\/\">out-of-the-box applications<\/a>&nbsp;that properly collect and catalog all data.<\/p>\n<\/div>\n                    <\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-4668da39ad46aa2b701a3b7677d1a416\" id=\"need-to-understand-your-user-experience-better\">Need to understand your user experience better?<\/h2>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-1c86f77486f1488f486c204bac747d5b\" style=\"color:#ffffff\">Centralize your logs. Enrich with threat intelligence. Investigate with AI.<\/p>\n\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/pricing\" target=\"_self\">\n<p class=\"title\">See pricing<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-1151\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":24857,"parent":11298,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"4","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-585e707{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-8396","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/8396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/comments?post=8396"}],"version-history":[{"count":46,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/8396\/revisions"}],"predecessor-version":[{"id":70044,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/8396\/revisions\/70044"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/pages\/11298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/24857"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=8396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}