{"id":52943,"date":"2025-02-05T18:18:58","date_gmt":"2025-02-06T02:18:58","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/jfrog-xray-app-fuer-sumo-logic"},"modified":"2026-01-02T18:01:43","modified_gmt":"2026-01-03T02:01:43","slug":"jfrog-xray","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/jfrog-xray","title":{"rendered":"JFrog Xray-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-13e5ec56a93c6e9ff696022a277c755930439ace e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-6d13f63c1c4bb04cc134dcdc330878d4c6329f11  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-f6063ee4d0d3f5b3b115bc12c80920c1\" id=\"detect-investigate-and-remediate-vulnerabilities-in-your-artifacts-and-container-images\">Erkennen, untersuchen und beheben Sie Schwachstellen in Ihren Artefakten und Container-Images<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/detect-3.svg\" alt=\"\" class=\"wp-image-9233\" style=\"width:63px;height:auto\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Erkennen und priorisieren Sie anf\u00e4llige Artefakte, bevor sie in Produktionsumgebungen gelangen<\/h3>\n\n\n\n<p>Dashboards, die Ihnen detaillierte Einblicke in Xray-Probleme, anf\u00e4llige Artefakte und Komponenten bieten.<br\/><br\/><br\/><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-collect-and-centralize-2-color-3.svg\" alt=\"\" class=\"wp-image-9234\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"detect-sources-and-use-of-vulnerable-artifacts\">Erkennen Sie Quellen und Verwendung von anf\u00e4lligen Artefakten<\/h3>\n\n\n\n<p>Erhalten Sie Einblicke in Benutzer und Client-IP-Adressen, die sowohl anf\u00e4llige Artefakte in Artifactory hochgeladen als auch von dort heruntergeladen haben. Dies erfolgt durch die Korrelation von Xray-Warnmeldungen mit Artifactory-Protokollen. Zudem k\u00f6nnen Sie Echtzeit-Visualisierungen von Indicators of Compromise (IOCs) in Ihrer Umgebung erhalten, basierend auf integrierten Korrelationen mit Sumo Logic Threat Intel.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/monitor-and-visualize-4.svg\" alt=\"\" class=\"wp-image-9235\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"identify-vulnerable-running-containers-in-real-time\">Identifizieren Sie anf\u00e4llige laufende Container in Echtzeit<\/h3>\n\n\n\n<p>Identifizieren Sie anf\u00e4llige Container sowie die mit ihnen verbundenen Hosts und Namespaces, die in Kubernetes-Produktionsumgebungen laufen<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1999\" height=\"1757\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234.png\" alt=\"\" class=\"wp-image-9236\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234.png 1999w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234-300x264.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234-1024x900.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234-768x675.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234-1536x1350.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image1_190910_160234-575x505.png 575w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">JFrog Xray \u2013 Vulnerability Overview<\/h2>\n\n\n\n<p>Verschaffen Sie sich einen \u00dcberblick \u00fcber die in Ihren Softwarekomponenten in Artifactory entdeckten Probleme, einschlie\u00dflich anf\u00e4lliger Container, Artefakte und Komponenten sowie der wichtigsten entdeckten CVEs (Common Vulnerabilities and Exposures).<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-efb28fde36310d8cb28353ad15e7e9c1df09193a e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-6e23960f93026a69260a54a644f2a4dbab6a8b2e e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"uploads-and-downloads-of-vulnerable-artifacts\">Uploads und Downloads von anf\u00e4lligen Artefakten<\/h2>\n\n\n\n<p>Identifizieren Sie Benutzer und Client-IP-Adressen, die anf\u00e4llige Artefakte in Artifactory hoch- und heruntergeladen haben<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1999\" height=\"1249\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237.png\" alt=\"\" class=\"wp-image-9237\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237.png 1999w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237-300x187.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237-1024x640.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237-768x480.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237-1536x960.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image3_190910_160237-575x359.png 575w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1999\" height=\"1125\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235.png\" alt=\"\" class=\"wp-image-9238\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235.png 1999w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/image2_190910_160235-575x324.png 575w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"detect-runtime-vulnerabilities-in-kubernetes-environments\">Erkennen von Laufzeit-Schwachstellen in Kubernetes-Umgebungen<\/h2>\n\n\n\n<p>Verschaffen Sie sich einen \u00dcberblick \u00fcber anf\u00e4llige Container sowie die mit ihnen verbundenen Hosts und Namespaces.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":328,"featured_media":36569,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,270],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,270],"class_list":["post-52943","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-development"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/328"}],"version-history":[{"count":3,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52943\/revisions"}],"predecessor-version":[{"id":64760,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52943\/revisions\/64760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/36569"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=52943"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=52943"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=52943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}