Skip to main content

SaaS and Cloud Apps

Learn about the Sumo Logic apps for SaaS and Cloud applications.

1Password icon

1Password

1Password helps you monitor your 1Password account’s sign-in and item usage events.

Abnormal Security icon

Abnormal Security

Gain robust monitoring of email security threats.

Acquia icon

Acquia

Gain visibility into your key Acquia platform components.

Airtable icon

Airtable

Monitor and analyze your Airtable audit logs.

Akamai icon

Akamai Cloud Monitor

Analyze and correlate Akamai data with origin data.

Akamai icon

Akamai CPC

Monitor threats and enforce compliance for client-side web applications using rich dashboards and Akamai CPC data.

Akamai icon

Akamai DataStream

Monitor and analyze the performance of Akamai Edge server

Armis icon

Armis

Monitor and manage your device security.

Asana icon

Asana

Monitor and analyze the Asana data to detect potential security threats related to user activity.

Atlassian icon

Atlassian

Monitor and analyze the critical events of Atlassian data.

Automox icon

Automox

Gain insights into Automox events and audit data to enhance security monitoring, streamline endpoint management, and boost operational resilience.

aws-iam-users-logo

AWS IAM Users

Gain insights into AWS IAM Users events to enhance user activity and security within your AWS environment.

Bitwarden icon

Bitwarden

Gain insights into user activity, security events, and administrative changes within your Bitwarden environment.

Box icon

Box

Gain insight into user behavior patterns and resources.

Carbon Black icon

Carbon Black Inventory

Gain insight into endpoint assets and their security status in your environment.

Cato icon

Cato Networks

Gain insight into the events and identify potential security threats with admin activities.

ChatGPT Compliance icon

ChatGPT Compliance

Monitor how ChatGPT is used across your organization to ensure adherence to corporate governance and data protection standards.

Cisco AMP icon

Cisco AMP

Monitor and analyze the host activity status and file types implicated in cybersecurity incidents.

Cisco Meraki icon

Cisco Meraki - C2C

Gain insights into the events and identify potential network events along with admin activities.

Cisco icon

Cisco Umbrella

View analytics on DNS, Proxy, and Audit admin activities.

Cisco AMP icon

Cisco Vulnerability Management

Monitor and manage your organizations software vulnerabilities.

citrix-cloud-icon

Citrix

Track configuration modifications impacting your environment and admins.

Cloudflare icon

Cloudflare

Analyze logs, events, and trends from your websites and apps on the Cloudflare network.

Code42 Incydr icon

Code42 Incydr

Monitor, detect, and respond to potential data threats on your Code42 Incydr platform.

Confluent Cloud icon

Confluent Cloud

Monitor and analyze streaming activity in Confluent Cloud to ensure secure, reliable, and high-performance data pipelines.

CrowdStrike icon

CrowdStrike Falcon FileVantage

Monitor and analyze file integrity.

CrowdStrike icon

CrowdStrike FDR Host Inventory

Monitor and manage your device security.

CrowdStrike icon

CrowdStrike Spotlight

Gather real-time visibility into the vulnerabilities.

CyberArk icon

CyberArk Audit

Gather information about your organization's cybersecurity practices to strengthen security.

Databricks icon

Databricks Audit

Analyze your organization's security practices to identify emerging threats and compliance risks.

Datadog icon

Datadog

Use the Sumo Logic Integration for Datadog to start sending data from Datadog to your Sumo Logic account.

Digital Guardian icon

Digital Guardian ARC

Monitor, detect, and respond to critical events.

DocuSign icon

DocuSign

Monitor and secure your DocuSign account.

Dragos icon

Dragos

Monitor and analyze your Dragos account.

Dropbox icon

Dropbox

Monitor and analyze your Dropbox usage data.

Dropbox icon

Druva Cyber Resilience

Enhance your cybersecurity posture by providing real-time insights.

Fastly icon

Fastly

Control how and where you serve content, and view performance analytics.

GitHub Copilot icon

GitHub Copilot

Optimize Copilot adoption, improve developer productivity, and ensure secure, data-driven use of AI-assisted coding.

Gmail icon

Gmail Trace Logs

Monitor spam, malware threats, and dropped or rejected messages.

Istio icon

Istio

Gain visibility into your Istio and control plane component performance.

Jamf icon

Jamf

Get critical insights into your organization's Jamf environment.

JumpCloud Directory Insights icon

JumpCloud Directory Insights

Get critical insights into your organization's JumpCloud Directory Insights environment.

Kaltura icon

Kaltura

Get critical insights into your content management ecosystem, including total entries, user activity trends, and event distributions.

Kandji icon

Kandji

Identify security threats by analyzing threat events and device events.

KnowBe4 icon

KnowBe4

Monitor and analyze KnowBe4 Phishing Security logs.

LastPass icon

LastPass

Identify security threats by analyzing audit events.

Active Directory icon

Microsoft Azure AD Inventory

Identify security threats by analyzing users and devices logs.

Microsoft Exchange Trace Logs icon

Microsoft Exchange Trace Logs

Monitor Delivered, Failed, Quarantined, Pending, and Spam messages.

MS Graph icon

Microsoft Graph Security V1

Identify security threats by analyzing alert logs.

MS Graph icon

Microsoft Graph Security V2

Identify security threats by analyzing alert logs.

Mimecast icon

Mimecast

Monitor and analyze Mimecast email data to identify potential threats and improve email security posture.

Miro icon

Miro

Monitoring and investigate Miro potential security threats.

MS Graph icon

MS Graph Azure AD Reporting

Monitor and analyze user activity, sign-in patterns and provisioning activities.

Netskope icon

Netskope WebTx

Monitor, analyze, and secure your web traffic.

Opsgenie icon

Opsgenie

Gain insight into your incidents and event handling operations.

PagerDuty icon

PagerDuty V2

Monitor PagerDuty V2 incident data.

PagerDuty icon

PagerDuty V3

Monitor PagerDuty V3 incident data.

Palo Alto icon

Palo Alto Cortex XDR

Monitor and analyze alerts and incidents from Palo Alto Networks Cortex XDR platform.

Proofpoint icon

Proofpoint on Demand

Analyze message logs and improve your security posture.

Proofpoint icon

Proofpoint TAP

Analyze messages and clicks of malicious URLs to improve your security posture.

Qualys icon

Qualys VMDR

Track errors, health, start-up progress, and cloud security.

Rapid7 icon

Rapid7

Monitor asset and vulnerability management activities.

Salesforce icon

Salesforce

Analyze event logs generated by your Salesforce instance and apps.

Sentinelone icon

SentinelOne

Monitor your organization's SentinelOne Threats and Agents logs.

Slack icon

Slack

Monitor analytics for your Slack users, channels, and access logs for workspaces.

Snowflake icon

Snowflake Logs

Monitor the key metrics, query performance, and overall health of Snowflake environments to optimize Snowflake's potential.

Sophos icon

Sophos

Identify security threats by analyzing alerts and events logs.

Sumo Logic icon

Sumo Collection

Identify, manage, and monitor collectors and sources within Sumo Logic.

Symantec icon

Symantec Endpoint Security Service

Gain insights into the log data and identify potential security threats.

Symantec icon

Symantec Web Security Service

Gain insights into the web traffic and identify potential security threats.

Sysdig icon

Sysdig Secure

Gain insights into container security to protect Kubernetes and containerized environments.

Tenable icon

Tenable

Gain comprehensive visibility and actionable insights into your organization's security posture.

Trellix icon

Trellix mVision ePO

Detect, analyze, and respond faster to threats with Trellix mVision ePO for Sumo Logic.

Trend Micro Vision One icon

Trend Micro Vision One

Analyze alert logs to detect potential security risks.

Trust Login icon

Trust Login

Analyze authentication events, user activities, and potential security threats.

Varonis icon

Varonis

Identify and evaluate security threats and behaviors across your Varonis platform.

Vectra icon

Vectra

Gain visibility into security threats detected across networks, cloud environments, and endpoints.

VMware Workspace One icon

VMware Workspace ONE

Analyze device compliance, encryption, and security status to spot risks and keep devices secure.

Webex icon

Webex

Monitor and analyse Webex security events, user activities, and system health.

Workday icon

Workday

Monitor Workday login activity, user activity, and admin activity.

Zendesk icon

Zendesk

Identify security threats by analyzing audit logs.

Zero Networks icon

Zero Networks Segment

Gain deep visibility into network activity, assess risk, and validate zero‑trust segmentation controls.

Zimperium icon

Zimperium

Identify security threats and incidents on mobile devices.

Zoom icon

Zoom

Monitor your organization's Zoom performance, security, and user activity.

Status
Legal
Privacy Statement
Terms of Use
CA Privacy Notice

Copyright © 2026 by Sumo Logic, Inc.