{"id":52957,"date":"2025-01-25T00:38:47","date_gmt":"2025-01-25T08:38:47","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/cybereason-app-fuer-sumo-logic"},"modified":"2026-01-07T07:22:42","modified_gmt":"2026-01-07T15:22:42","slug":"cybereason","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/cybereason","title":{"rendered":"Cybereason-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-13e5ec56a93c6e9ff696022a277c755930439ace e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-6d13f63c1c4bb04cc134dcdc330878d4c6329f11  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-e01483befa54de3f2a90bae32844269d\" id=\"the-champion-for-today-s-cyber-defenders\">Der Champion f\u00fcr die Cyber-Verteidiger von heute<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Cybereason bietet zukunftssicheren Schutz vor Angriffen durch eine vereinheitlichte Sicherheitsl\u00f6sung, die es Verteidigern erm\u00f6glicht, Bedrohungsaktivit\u00e4ten \u00fcber das gesamte Netzwerk hinweg zu korrelieren, um jeden Endpunkt \u2013 ob station\u00e4r oder mobil \u2013 zu sch\u00fctzen. Die Cybereason Defense Platform kombiniert die branchenweit bestbewertete Erkennung und Reaktion (EDR und XDR), Antivirensoftware der n\u00e4chsten Generation (NGAV) sowie proaktive Bedrohungssuche, um eine kontextreiche Analyse jedes Elements einer Malop (malicious operation\/b\u00f6swillige Operation) zu liefern. Mit Sumo Logic k\u00f6nnen Security Operations diesen kontextreichen Einblick in die Endpunkte mit anderen Sicherheitsdaten kombinieren, um die \u201eAttack Story\u201c zu erweitern. Dies versetzt Sicherheitsteams in die Lage, das Ausma\u00df von Bedrohungen schnell zu erfassen und effektiv darauf zu reagieren.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-monitor-and-visualize.svg\" alt=\"\" class=\"wp-image-3862\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-visibility-to-outthink\">Die Sichtbarkeit, um weiterzudenken<\/h3>\n\n\n\n<p>Verfolgen, visualisieren und beenden Sie b\u00f6swillige Operationen mit dem vollst\u00e4ndigen Angriffsverlauf vom Ursprung her \u00fcber jeden betroffenen Endpunkt und Benutzer hinweg. Mit Cybereason und Sumo Logic kann ein einzelner Analyst 200.000 Endpunkte effektiv verteidigen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-detect-insider-threats.svg\" alt=\"\" class=\"wp-image-3881\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-speed-to-outpace\">Das Tempo, um zu \u00fcberholen<\/h3>\n\n\n\n<p>Analysieren Sie, nehmen Sie Anpassungen vor und agieren Sie schneller als Angreifer, und beseitigen Sie aufkommende Bedrohungen in Minuten statt nach Tagen. Mit Cybereason und Sumo Logic k\u00f6nnen Sicherheitsteams die Effizienz bei der Erkennung und Reaktion auf Bedrohungen um 93 % steigern (Forrester Total Economic Impact Report 2020).<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-result.svg\" alt=\"\" class=\"wp-image-3625\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-precision-to-end-attacks\">Die Pr\u00e4zision zur Beendigung von Angriffen<\/h3>\n\n\n\n<p>Nutzen Sie automatisierte Abhilfema\u00dfnahmen mit nur einem Klick im gesamten Netzwerk, um Angriffe zu beenden und den Bedarf an langwierigen Untersuchungen durch Analysten drastisch zu reduzieren. Mit Cybereason und Sumo Logic sind die SOC-Analysten produktiver.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"228\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_inbox.png\" alt=\"\" class=\"wp-image-3919\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_inbox.png 936w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_inbox-300x73.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_inbox-768x187.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_inbox-575x140.png 575w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"optimize-your-amazon-rds-experience\">Malop-Inbox<\/h2>\n\n\n\n<p>Inbox f\u00fcr Malicious Operations (Malop\u2122)-Vorf\u00e4lle, die einen aktuellen \u00dcberblick \u00fcber aktuelle Bedrohungen f\u00fcr das Unternehmen bietet.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-efb28fde36310d8cb28353ad15e7e9c1df09193a e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-6e23960f93026a69260a54a644f2a4dbab6a8b2e e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"sample-metrics\">Am h\u00e4ufigsten angegriffene Hosts<\/h2>\n\n\n\n<p>Eine \u00dcbersicht der am h\u00e4ufigsten angegriffenen Unternehmensendpunkte.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"480\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_most_targeted_hosts.png\" alt=\"\" class=\"wp-image-3920\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_most_targeted_hosts.png 936w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_most_targeted_hosts-300x154.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_most_targeted_hosts-768x394.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_most_targeted_hosts-575x295.png 575w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"472\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_statuses.png\" alt=\"\" class=\"wp-image-3921\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_statuses.png 936w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_statuses-300x151.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_statuses-768x387.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_statuses-575x290.png 575w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"malop-statuses\">Malop-Status<\/h2>\n\n\n\n<p>Aufschl\u00fcsselung der Malop-Vorf\u00e4lle nach Managementstatus.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-efb28fde36310d8cb28353ad15e7e9c1df09193a e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-6e23960f93026a69260a54a644f2a4dbab6a8b2e e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"sample-metrics\">Malop-Trend nach Zeit<\/h2>\n\n\n\n<p>Zeitreihen von Malop-Vorf\u00e4llen, die es Analysten erm\u00f6glichen, das Volumen der entdeckten b\u00f6sartigen Aktivit\u00e4ten zu verstehen.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"478\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_trend_by_time.png\" alt=\"\" class=\"wp-image-3922\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_trend_by_time.png 936w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_trend_by_time-300x153.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_trend_by_time-768x392.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_malop_trend_by_time-575x294.png 575w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"474\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_detected_malicious_activity.png\" alt=\"\" class=\"wp-image-3923\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_detected_malicious_activity.png 936w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_detected_malicious_activity-300x152.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_detected_malicious_activity-768x389.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-cybereason_detected_malicious_activity-575x291.png 575w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"optimize-your-amazon-rds-experience\">Erkannte b\u00f6sartige Aktivit\u00e4t<\/h2>\n\n\n\n<p>Aufschl\u00fcsselung der h\u00e4ufigsten Angriffsmethoden, die von der Cybereason Defense Platform erkannt wurden.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":29670,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,269],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,269],"class_list":["post-52957","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52957\/revisions"}],"predecessor-version":[{"id":65887,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/52957\/revisions\/65887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/29670"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=52957"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=52957"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=52957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}