Pricing Login Free trial Support
All an engineer has to do is click a link, and they have everything they need in one place. That level of integration and simplicity helps us respond faster and more effectively.
Sajeeb Lohani
Global Technical Information Security Officer (TISO), Bugcrowd
Read case study

Blog

Mark Bloom

Filter resources

Disrupting the Economics of Machine Data Analytics

Jun 6, 2017 / 3 min read

The Importance of Logs

May 4, 2017 / 4 min read

What does it take to implement & maintain a DevSecOps approach in the Cloud

Apr 20, 2017 / 7 min read

OneLogin Integrates with Sumo Logic for Enhanced Visibility and Threat Detection

Feb 17, 2017 / 3 min read

Sumo Logic Delivers Industry’s First Multi-Tenant SaaS Security Analytics Solution with Integrated Threat Intelligence

Feb 6, 2017 / 2 min read

Using Sumo Logic and Trend Micro Deep Security SNS for Event Management

Feb 6, 2017 / 3 min read

CISO Manifesto: 10 Rules for Vendors

Jan 17, 2017 / 3 min read

Evident.io: Visualize, Analyze and Report on Security Data From AWS

Nov 30, 2016 / 3 min read

Starting Fresh in AWS

Nov 21, 2016 / 4 min read

Getting Started Under Legacy Constraints in AWS

Nov 21, 2016 / 4 min read

Sumo Logic Launches Ultimate Log Bible Project

Oct 13, 2016 / 0 min read

Integrated Container Security Monitoring with Twistlock

Sep 27, 2016 / 0 min read

Data Analytics and Microsoft Azure

Sep 19, 2016 / 6 min read

Improving your Security Posture with Trend Micro Deep Security Integration

Aug 10, 2016 / 5 min read

Visualize and Analyze Your Auth0 Users with Sumo Logic – A Tutorial

Aug 9, 2016 / 6 min read

DevSecOps in the AWS Cloud

Aug 3, 2016 / 2 min read

CIS AWS Foundations Benchmark Monitoring with Sumo Logic

Jul 27, 2016 / 10 min read

SIEM vs. Security Analytics Checklist

May 17, 2016 / 4 min read

Three reasons to deploy security analytics software in the enterprise

Mar 21, 2016 / 6 min read

How Companies Can Minimize Their Cloud Security Risk

Mar 20, 2016 / 2 min read

Are Users the Achilles’ Heel of Security?

Feb 23, 2016 / 3 min read