{"id":52930,"date":"2025-02-05T17:02:41","date_gmt":"2025-02-06T01:02:41","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/crowdstrike-integrated-threat-intelligence-integration-fuer-sumo-logic"},"modified":"2026-02-10T11:55:49","modified_gmt":"2026-02-10T19:55:49","slug":"integrated-threat-intelligence","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/integrated-threat-intelligence","title":{"rendered":"CrowdStrike Integrated Threat Intelligence-Integration f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-033b81aa8630d050cd85ce22805e680b\" id=\"real-time-monitoring-for-proactive-security\">Echtzeit-Monitoring f\u00fcr proaktive Sicherheit<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/in-depth-security.svg\" alt=\"\" class=\"wp-image-9175\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"enhance-your-threat-defenses\">Verbessern Sie Ihren Schutz vor Bedrohungen<\/h3>\n\n\n\n<p>Nutzen Sie Bedrohungsdaten direkt in Ihrer Hybrid-Cloud-Umgebung\u00a0 in Echtzeit, um die Geschwindigkeit und Genauigkeit der Bedrohungserkennung zu erh\u00f6hen.<br\/><br\/><br\/><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/valuable-security-insights-1.svg\" alt=\"\" class=\"wp-image-9176\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"be-informed-not-overwhelmed\">Seien Sie informiert, nicht \u00fcberfordert<\/h3>\n\n\n\n<p>Visualisierungen von IOCs nahezu in Echtzeit in Ihren Cloud- und On-Prem-Umgebungen, mit durchsuchbaren Abfragen \u00fcber eine intuitive Weboberfl\u00e4che.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/secure-intellectual-property-3.svg\" alt=\"\" class=\"wp-image-9177\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"achieve-proactive-security\">Erzielen Sie proaktive Sicherheit<\/h3>\n\n\n\n<p>Dank strategischer, operativer und technischer Berichte und Warnungen wissen Sie, welche Gegner es auf Ihre Assets und Ihr Unternehmen abgesehen haben k\u00f6nnten.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"675\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1.png\" alt=\"\" class=\"wp-image-9178\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1-300x198.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1-768x506.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/crowdstrike_detection_summary-1024x675-1-575x379.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"know-and-outsmart-your-adversary\">Kennen und \u00fcberlisten Sie Ihre Gegner<\/h2>\n\n\n\n<p>Der Wechsel in die Cloud bedeutet nicht, dass Sie auf Transparenz verzichten m\u00fcssen oder das Verst\u00e4ndnis f\u00fcr die Angreifer verlieren, die versuchen, in Ihr Unternehmen einzudringen und Ihre kritischen Anwendungen und Daten zu gef\u00e4hrden.<\/p>\n\n\n\n<p>Integrated Threat Intelligence, unterst\u00fctzt von <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noopener\">CrowdStrike<\/a>, gibt Ihnen die Kontrolle zur\u00fcck und bietet nahezu in Echtzeit Sicherheitsdaten gegen ausgekl\u00fcgelte und hartn\u00e4ckige Angriffe, sei es durch Cyber-Kriminelle, Unternehmensspione, Spammer, Regierungen oder Hacktivisten.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">Umsetzbare Bedrohungsdaten<\/h2>\n\n\n\n<p>Neue Anwendungsarchitekturen erfordern<a href=\"https:\/\/www.sumologic.com\/de\/resources\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/resources\"> neue Ans\u00e4tze zur Anwendungs\u00fcberwachung<\/a>. Unternehmen ben\u00f6tigen neue Echtzeit-Tools zur <a href=\"https:\/\/www.sumologic.com\/de\/solutions\/log-analytics\" data-type=\"link\" data-id=\"https:\/\/www.sumologic.com\/solutions\/log-analytics\">Fehlerbehebung und Sicherheits\u00fcberwachung<\/a> in Cloud- und Hybrid-Cloud-Umgebungen, die skalierbar genug sind, um gro\u00dfe Mengen an Maschinendaten zu analysieren und diese mit bekannten Indicators of Compromise (IOCs) in freier Wildbahn zu korrelieren.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Alarmierung und Visualisierung in Echtzeit.<\/li>\n\n\n\n<li>Schnelle Identifizierung von Bedrohungen in Ihrer Hybrid-Cloud-Umgebung.<\/li>\n\n\n\n<li>Entwickeln Sie Einblicke in die Taktiken globaler Akteure.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"629\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1.png\" alt=\"\" class=\"wp-image-9179\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1-300x184.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1-768x472.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Overview-1-1024x629-1-575x353.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1.png\" alt=\"\" class=\"wp-image-9180\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1-300x150.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1-768x384.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-for-AWS-VPC-1024x512-1-575x288.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"docker-analysis-and-troubleshooting-simplified\">Die Sumo Logic ThreatIntel-Integration f\u00fcr AWS<\/h2>\n\n\n\n<p>Implementieren Sie effektive Gegenma\u00dfnahmen gegen aufkommende Bedrohungen mit Echtzeit-Dashboards und durchsuchbaren Abfragen mit der Sumo Logic ThreatIntel-Integration f\u00fcr AWS.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrieren Sie neue Bedrohungsdaten in Ihre AWS-Infrastruktur f\u00fcr eine automatisierte Verteidigung.<\/li>\n\n\n\n<li>Weisen Sie Ihre AWS-Services wie AWS CloudTrail, ELB und VPC Flow Logs bekannten IOCs zu.<\/li>\n\n\n\n<li>Optimieren Sie Ihre Ressourcen, sparen Sie Zeit und konzentrieren Sie sich auf kritische Bedrohungen.<\/li>\n\n\n\n<li>Bew\u00e4hrtes Fachwissen, das die erstklassigen Bedrohungsdaten von CrowdStrike nutzt.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralized-container-aware-log-management\">Sumo Logic Threat Intel Schnellanalyse-Integration<\/h2>\n\n\n\n<p>Implementieren Sie mit der Sumo Logic Threat Intel Quick Analysis-Integration wirksame Gegenma\u00dfnahmen gegen aufkommende Bedrohungen mit Echtzeit-Dashboards und durchsuchbaren Abfragen f\u00fcr Ihre lokalen Workloads.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Korrelieren Sie Sumo Logic-Protokolldaten mit Threat-Intelligence-Daten, um b\u00f6sartige IP-Adressen, Domainnamen, E-Mail-Adressen, URLs, MD5-Hashes und mehr zu identifizieren und zu visualisieren.<\/li>\n\n\n\n<li>Integrieren Sie neue Bedrohungsdaten in Ihre gesamte Infrastruktur f\u00fcr eine automatische Erkennung und Reaktion.<\/li>\n\n\n\n<li>Optimieren Sie Ihre Ressourcen, sparen Sie Zeit und konzentrieren Sie sich auf kritische Bedrohungen.<\/li>\n\n\n\n<li>Bew\u00e4hrtes Fachwissen, das die erstklassigen Bedrohungsdaten von CrowdStrike nutzt.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"525\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1.png\" alt=\"\" class=\"wp-image-9181\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1-300x154.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1-768x394.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Threat-Intel-Quick-Analysis-Overview-Screen-1024x525-1-575x295.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":328,"featured_media":36446,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[272],"integration-use-case":[267,269],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[272],"integration-use-case":[267,269],"class_list":["post-52930","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-cloud-provider-amazon-web-services","integration-use-case-security","integration-use-case-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/328"}],"version-history":[{"count":7,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52930\/revisions"}],"predecessor-version":[{"id":69320,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52930\/revisions\/69320"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/36446"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=52930"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=52930"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=52930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}