{"id":52928,"date":"2025-01-31T18:04:48","date_gmt":"2025-02-01T02:04:48","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/dataminr-pulse-fuer-sumo-logic-cloud-security-analytics"},"modified":"2026-01-07T07:22:58","modified_gmt":"2026-01-07T15:22:58","slug":"dataminr-pulse","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/dataminr-pulse","title":{"rendered":"Dataminr Pulse f\u00fcr Sumo Logic Cloud Security Analytics"},"content":{"rendered":"\n<section class=\"e-stn e-stn-ee06701ac08df9e58d46a1932b4fcb4acf5d6e5c e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-b01d04f6169f7bf9a374085cc627e629ca551e7b  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-06c6ff441db891dd51a9821252bc00d6\" id=\"protect-your-physical-and-digital-assets-with-real-time-detection-investigation-and-risk-management\">Sch\u00fctzen Sie Ihre physischen und digitalen Assets mit Echtzeit-Erkennung, -Untersuchung und -Risikomanagement.<\/h2>\n\n\n\n<p>Dataminr Pulse for Cyber Risk f\u00fcgt sich problemlos in Ihre Sumo Logic Cloud Security Analytics-Workflows ein und erm\u00f6glicht eine schnelle Identifizierung und Eind\u00e4mmung aufkommender Bedrohungen, damit Sie schneller erkennen und reagieren k\u00f6nnen. Dataminr Pulse ist seit 2009 weltweit f\u00fchrend auf dem Gebiet der KI-Risikoerkennung. Zwei Drittel der Fortune-100-Unternehmen vertrauen auf Dataminr Pulse, um ihre physischen, Cyber- und konvergenten Sicherheitsma\u00dfnahmen zu optimieren.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-2952f58eb6a720e8ab101d58beb072b46925b3b8  col-sm-4\">\n<div class=\"e-div e-div-6841109552d930ff12dec80ba3e941f5a8bd455f\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/CloudSecurityAnalytics.svg\" alt=\"\" class=\"wp-image-8424\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"accelerate-your-sumo-logic-cloud-security-analytics-workflows\">Beschleunigen Sie Ihre Workflows in Sumo Logic Cloud Security Analytics<\/h3>\n\n\n\n<p>Beschleunigen Sie die Triage, unterst\u00fctzen Sie Analyse und Threat Hunting, erstellen Sie Warnmeldungen zu aktuellen Bedrohungen und Schwachstellen, bestimmen Sie die Bewertung und Klassifizierung von Bedrohungen und weisen Sie Analysten und Teams Bedrohungen zu.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-2952f58eb6a720e8ab101d58beb072b46925b3b8  col-sm-4\">\n<div class=\"e-div e-div-6841109552d930ff12dec80ba3e941f5a8bd455f\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"65\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/detect-insider-threats-faster-2-color-icon.svg\" alt=\"\" class=\"wp-image-8425\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"broad-global-threat-coverage-at-unmatched-speed\">Breite globale Bedrohungsabdeckung in un\u00fcbertroffenem Tempo<\/h3>\n\n\n\n<p>Verschaffen Sie sich in Echtzeit Einblick in Deep- und Dark-Web-Quellen, erfahren Sie als Erster von neu auftretenden Angriffen auf Ihr Netzwerk und von Dritten, die Ihr Unternehmen beeintr\u00e4chtigen, erkennen Sie Risiken auf globaler Ebene und identifizieren Sie neue Ransomware-Gruppen und Angriffe.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-2952f58eb6a720e8ab101d58beb072b46925b3b8  col-sm-4\">\n<div class=\"e-div e-div-6841109552d930ff12dec80ba3e941f5a8bd455f\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-scale-and-elastic-2-color.svg\" alt=\"\" class=\"wp-image-8426\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"enable-key-use-cases-at-scale\">Skalieren Sie wichtige Anwendungsf\u00e4lle effektiv.<\/h3>\n\n\n\n<p>Unsere KI-gest\u00fctzte Echtzeit-Threat Intelligence bringt Geschwindigkeit, Umfang und Relevanz f\u00fcr die wichtigsten Anwendungsf\u00e4lle: Cyber-Physical Convergence, Vulnerability Prioritization, External Attack Intelligence und Digital Risk Detection.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9965dba07bb784c1d27b8f649778cdd68c42f5e3 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-9965dba07bb784c1d27b8f649778cdd68c42f5e3 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-acd5eeff7c4c28fed24a98ce9859a7d7a755db20 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1120\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1.png\" alt=\"\" class=\"wp-image-8428\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1.png 2000w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1-300x168.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1-1024x573.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1-768x430.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1-1536x860.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image1-575x322.png 575w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-acd5eeff7c4c28fed24a98ce9859a7d7a755db20 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"understand-the-impact-of-cyber-and-physical-threats\"><strong>Verstehen Sie die Auswirkungen von physischen und Cyber-Bedrohungen<\/strong><\/h2>\n\n\n\n<p>Das Alert Overview Dashboard bietet eine Aufschl\u00fcsselung der Dataminr Pulse Alerts nach betroffenem Unternehmen, Standort, Thema und Unterthema.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-1eb7e7617d1862854e566e0febb88ee8e06dcee5 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-4f3b8bd05953cab2a0dc217c27300f72a364dec1 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\"><strong>Erhalten Sie Trends zu Cyber-Bedrohungen und detaillierte Warnungen<\/strong><\/h2>\n\n\n\n<p>Das Cyber Threat Landscape-Dashboard hilft Ihnen, die Trends, die Aufschl\u00fcsselung und die Details der Cyber-Bedrohungen nach\u00a0<strong>Bedrohungsakteuren, Angriffsmethoden, Arten von Datenschutzverletzungen und Schwachstellenbereichen zu verstehen.<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-acd5eeff7c4c28fed24a98ce9859a7d7a755db20 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1120\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2.png\" alt=\"\" class=\"wp-image-8430\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2.png 2000w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2-300x168.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2-1024x573.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2-768x430.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2-1536x860.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image2-575x322.png 575w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9965dba07bb784c1d27b8f649778cdd68c42f5e3 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-9965dba07bb784c1d27b8f649778cdd68c42f5e3 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-acd5eeff7c4c28fed24a98ce9859a7d7a755db20 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1120\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3.png\" alt=\"\" class=\"wp-image-8433\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3.png 2000w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3-300x168.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3-1024x573.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3-768x430.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3-1536x860.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/DataminrPulse-image3-575x322.png 575w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-acd5eeff7c4c28fed24a98ce9859a7d7a755db20 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"docker-analysis-and-troubleshooting-simplified\">Analysieren Sie spezifische Bedrohungen und entdecken Sie die wichtigsten IOCs<\/h2>\n\n\n\n<p>Mit dem Dataminr Alerts Drilldown Dashboard k\u00f6nnen Sie multidimensionale Analysen von Bedrohungen durchf\u00fchren und Trends bei b\u00f6sartigen IPs, ausgenutzten IOCs und beliebten offenen Ports erkennen.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":328,"featured_media":35553,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267],"class_list":["post-52928","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/328"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52928\/revisions"}],"predecessor-version":[{"id":65929,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52928\/revisions\/65929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/35553"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=52928"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=52928"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=52928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}