{"id":9174,"date":"2025-02-05T17:02:41","date_gmt":"2025-02-05T17:02:41","guid":{"rendered":"http:\/\/www.sumologic.com\/?post_type=integration&#038;p=9174"},"modified":"2026-01-29T19:31:17","modified_gmt":"2026-01-30T03:31:17","slug":"integrated-threat-intelligence","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/app-catalog\/integrated-threat-intelligence","title":{"rendered":"CrowdStrike Integrated Threat Intelligence Integration for Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-8794f7eda397437f953195da0c1da855\" id=\"real-time-monitoring-for-proactive-security\">Real-time monitoring for proactive security<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/in-depth-security.svg\" alt=\"\" class=\"wp-image-9175\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"enhance-your-threat-defenses\">Enhance your threat defenses<\/h3>\n\n\n\n<p>Consume threat intelligence directly into your hybrid-cloud environment&nbsp;in real time to increase velocity &amp; accuracy of threat detection.<br><br><br><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/valuable-security-insights-1.svg\" alt=\"\" class=\"wp-image-9176\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"be-informed-not-overwhelmed\">Be informed, not overwhelmed<\/h3>\n\n\n\n<p>Near real-time visualizations of IOCs in your cloud and on-prem environments, with searchable queries via an intuitive web interface.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/secure-intellectual-property-3.svg\" alt=\"\" class=\"wp-image-9177\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"achieve-proactive-security\">Achieve proactive security<\/h3>\n\n\n\n<p>Know which adversaries may be targeting your assets and organization, thanks to strategic, operational and technical reporting and alerts.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"675\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1.png\" alt=\"\" class=\"wp-image-9178\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1-300x198.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1-768x506.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1-575x379.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"know-and-outsmart-your-adversary\">Know and Outsmart Your Adversary<\/h2>\n\n\n\n<p>Moving to the cloud does not mean sacrificing visibility or an understanding of the adversaries that are out there trying to penetrate your organization and compromise your critical applications and data.<\/p>\n\n\n\n<p>Integrated threat intelligence, powered by <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noopener\">CrowdStrike<\/a> , puts control back in your hands, providing near real-time security intelligence against sophisticated and persistent attacks, whether by cyber criminals, corporate spies, spammers, nation states or hacktivists.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">Actionable Security Intelligence<\/h2>\n\n\n\n<p>New applications architectures require <a href=\"https:\/\/www.sumologic.com\/resources\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/resources\">new application monitoring approaches<\/a>. Companies need new real-time <a href=\"https:\/\/www.sumologic.com\/solutions\/log-analytics\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/solutions\/log-analytics\">troubleshooting and security monitoring tools<\/a> across cloud and hybrid-cloud that can scale to analyze large volumes of machine data and correlate that with known indicators of compromise (IOCs) in the wild.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-time alerting and visualizations.<\/li>\n\n\n\n<li>Quick identification of threats across your hybrid cloud environment.<\/li>\n\n\n\n<li>Develop insights into the tactics of global adversary groups.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"629\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1.png\" alt=\"\" class=\"wp-image-9179\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1-300x184.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1-768x472.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1-575x353.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1.png\" alt=\"\" class=\"wp-image-9180\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1-300x150.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1-768x384.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1-575x288.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"docker-analysis-and-troubleshooting-simplified\">The Sumo Logic Threat Intel Integration for AWS<\/h2>\n\n\n\n<p>Implement effective countermeasures against emerging threats with real time dashboards and searchable queries with the Sumo Logic Threat Intel Integration for AWS.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate emerging threat intelligence throughout your AWS infrastructure for automated defenses.<\/li>\n\n\n\n<li>Map your AWS services like AWS CloudTrail, ELB and VPC Flow Logs to known IOCs.<\/li>\n\n\n\n<li>Optimize your resources, saving time and focusing response efforts on critical threats.<\/li>\n\n\n\n<li>Proven expertise, leveraging CrowdStrike&#8217;s world-class threat intelligence.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">Sumo Logic Threat Intel Quick Analysis Integration<\/h2>\n\n\n\n<p>Implement effective countermeasures against emerging threats with real time dashboards and searchable queries for your on-premise workloads with the Sumo Logic Threat Intel Quick Analysis Integration.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Correlate Sumo Logic log data with threat intelligence data to identify and visualize malicious IP addresses, domain names, email addresses, URLs, MD5 Hashes and more.<\/li>\n\n\n\n<li>Integrate emerging threat intelligence throughout your infrastructure for automated detection and response.<\/li>\n\n\n\n<li>Optimize your resources, saving time and focusing response efforts on critical threats.<\/li>\n\n\n\n<li>Proven expertise, leveraging CrowdStrike&#8217;s world-class threat intelligence.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"525\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1.png\" alt=\"\" class=\"wp-image-9181\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1-300x154.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1-768x394.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1-575x295.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":328,"featured_media":9182,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[99],"integration-use-case":[71,72],"translation_priority":[221]},"selected_primary_terms":{"integration-cloud-provider":[],"integration-use-case":[]},"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"11371,11363,11266","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[99],"integration-use-case":[71,72],"class_list":["post-9174","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-cloud-provider-amazon-web-services","integration-use-case-security","integration-use-case-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/9174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/328"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/9174\/revisions"}],"predecessor-version":[{"id":68515,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration\/9174\/revisions\/68515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/9182"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=9174"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-cloud-provider?post=9174"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/integration-use-case?post=9174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}