{"id":53242,"date":"2025-01-24T20:42:28","date_gmt":"2025-01-25T04:42:28","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/crowdstrike-falcon-platform-app-fuer-sumo-logic"},"modified":"2026-01-07T07:22:19","modified_gmt":"2026-01-07T15:22:19","slug":"crowdstrike-falcon-host","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/crowdstrike-falcon-host","title":{"rendered":"CrowdStrike Falcon Platform-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-8e09fb1c42fe7319480e3492519dc678\" id=\"gain-insight-into-falcon-platform-endpoint-security-events\">Erhalten Sie Einblicke in Sicherheitsereignisse der Falcon-Platform-Endpoints<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-deeper-insights.svg\" alt=\"\" class=\"wp-image-3818\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"deep-visibility\">Umfassende Transparenz<\/h3>\n\n\n\n<p>Erreichen\u00a0Sie ein noch nie dagewesenes Ma\u00df an Transparenz, indem Sie CrowdStrike-Sicherheitsereignisse zentral nach Typ, Status und Erkennungsmethode analysieren<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-monitor-and-visualize.svg\" alt=\"\" class=\"wp-image-3862\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"enhanced-attack-visualizations\">Verbesserte Angriffsvisualisierungen<\/h3>\n\n\n\n<p>Sofort einsatzbereite Dashboards und gespeicherte Suchergebnisse verk\u00fcrzen die Zeit f\u00fcr die Identifizierung und L\u00f6sung von Endpunkt-Sicherheitsproblemen und erm\u00f6glichen eine proaktivere Sicherheitshaltung<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-in-depth-security.svg\" alt=\"\" class=\"wp-image-3640\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"improved-security\">Verbesserte Sicherheit<\/h3>\n\n\n\n<p>Korrelieren Sie CrowdStrike-Logdaten mit anderen Infrastrukturdaten, um Muster auf dem Endpunkt und im Netzwerk effektiv zu analysieren und Anomalien und Sicherheitssl\u00fccken zu identifizieren<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Logo_CrowdStrike_1600x1000-1024x640-1.png\" alt=\"\" class=\"wp-image-3906\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Logo_CrowdStrike_1600x1000-1024x640-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Logo_CrowdStrike_1600x1000-1024x640-1-300x188.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Logo_CrowdStrike_1600x1000-1024x640-1-768x480.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/Logo_CrowdStrike_1600x1000-1024x640-1-575x359.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"what-is-crowdstrike-falcon-platform\">Was ist CrowdStrike Falcon Platform?<\/h2>\n\n\n\n<p><strong>Endpunktschutz der n\u00e4chsten Generation<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.crowdstrike.com\/products\/falcon-host\/\" target=\"_blank\" rel=\"noopener\">Falcon Platform<\/a>\u00a0vereint drei Technologien \u2013 Virenschutz, Endpunkt-Erkennung und -Reaktion sowie Rund-um-die-Uhr-Threat Hunting \u2013 und bietet so kontinuierlichen Schutz vor Sicherheitsverletzungen.<\/p>\n\n\n\n<p>Falcon Platform bietet umfassenden Schutz \u2013 Pr\u00e4vention und Erkennung \u2013 sowohl gegen Malware als auch gegen malwarefreie Bedrohungen, ob bekannte oder unbekannte, ob externe oder interne. Es nutzt einen revolution\u00e4ren Ansatz, der von Grund auf entwickelt wurde, um den menschlichen und technischen Herausforderungen bestehender und zuk\u00fcnftiger Bedrohungen zu begegnen.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"turn-real-time-data-into-continuous-intelligence\">Verwandeln Sie Echtzeitdaten in Continuous Intelligence<\/h2>\n\n\n\n<p>F\u00fchren Sie blitzschnelle Log-Analysen durch, die modernste Technologien nutzen und schnell Antworten auf kritische Fragen zu Ihrer CrowdStrike Falcon-Umgebung finden.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u00dcberwachen<\/strong>\u00a0Sie Sicherheitsereignisse und f\u00fchren Sie Bedrohungsanalysen mithilfe von Suchen und Dashboard-Visualisierungen durch, um Ihr Unternehmen proaktiv zu sch\u00fctzen.<\/li>\n\n\n\n<li><strong>Untersuchen<\/strong>\u00a0Sie Schwachstellen mithilfe fortschrittlicher Analysen und sch\u00fctzen Sie sich so besser vor den Aktivit\u00e4ten von Angreifern.<\/li>\n\n\n\n<li><strong>Korrelieren<\/strong>\u00a0Sie Falcon Platform-Ereignisse mit denen anderer Sicherheitssysteme, um ein vollst\u00e4ndiges Bild all Ihrer Sicherheitsdaten zu erhalten<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CrowdStrike-Overview-1024x535-1.png\" alt=\"\" class=\"wp-image-3907\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CrowdStrike-Overview-1024x535-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CrowdStrike-Overview-1024x535-1-300x157.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CrowdStrike-Overview-1024x535-1-768x401.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CrowdStrike-Overview-1024x535-1-575x300.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"675\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-crowdstrike_detection_summary-1024x675-1.png\" alt=\"\" class=\"wp-image-3908\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-crowdstrike_detection_summary-1024x675-1.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-crowdstrike_detection_summary-1024x675-1-300x198.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-crowdstrike_detection_summary-1024x675-1-768x506.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-crowdstrike_detection_summary-1024x675-1-575x379.png 575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"dive-deeper-into-falcon-platform-with-data-analytics\">Tauchen Sie mit Datenanalyse tiefer in Falcon Platform ein<\/h2>\n\n\n\n<p>Gewinnen Sie einzigartige Einblicke in Ihre Schwachstellen, Authentifizierungsdienste, AV-Scans, DNS-Anfragen und Dokumentenzugriffe durch die Integration der Sumo Logic-App, die Echtzeit-Maschinendaten f\u00fcr eine umfassende Analyse Ihrer Falcon Platform-Umgebung nutzt.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ereignishistorie<\/strong>\u00a0und Trendanalysen \u00fcber verschiedene Falcon-Sicherheitsereignisse hinweg<\/li>\n\n\n\n<li><strong>Proaktiver Schutz<\/strong>\u00a0von Unternehmensanwendungen und -daten vor Verst\u00f6\u00dfen und Gesch\u00e4ftsunterbrechungen<\/li>\n\n\n\n<li><strong>Vereinfachung<\/strong>\u00a0von Sicherheitsabl\u00e4ufe bei gleichzeitiger Compliance-Einhaltung.<\/li>\n\n\n\n<li><strong>Beschleunigung\u00a0<\/strong>des ROI von digitalen Initiativen und Cloud-Projekten<\/li>\n<\/ul>\n\n\n\n<p>Erfahren Sie mehr dar\u00fcber, wie die Sumo Logic Log-Analyse-App f\u00fcr CrowdStrike Falcon Ihr Unternehmen effizienter, effektiver und sicherer machen kann.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"next-generation-log-management-analytics\">Log-Management und -Analysen der n\u00e4chsten Generation<\/h2>\n\n\n\n<p>Sehen Sie sich unser Demo-Video an und erfahren Sie, wie Sumo Logic Log-Management und -Analyse auf die n\u00e4chste Stufe hebt.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_14e5f5d341c3bd31f6343fe704755a77\" class=\"wistia-video-block\" data-wistia-video=\"wistia_1zm73riqds\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/1zm73riqds.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='1zm73riqds']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/1zm73riqds\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"1zm73riqds\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_1zm73riqds\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/1zm73riqds\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_1zm73riqds\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_3a28eeac6ff404489dbea1341b91d061\" class=\"wistia-video-block\" data-wistia-video=\"wistia_myvccjhg2d\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/myvccjhg2d.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='myvccjhg2d']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/myvccjhg2d\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"myvccjhg2d\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_myvccjhg2d\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/myvccjhg2d\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_myvccjhg2d\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"modernise-your-security-operations-and-achieve-greater-resilience\">Sicherheitsabl\u00e4ufe modernisieren und Resilienz st\u00e4rken<\/h2>\n\n\n\n<p>Erfahren Sie von Sicherheitsexperten, welche H\u00fcrden Unternehmen daran hindern, ihre Cyber-Resilienz zu verbessern. H\u00f6ren Sie, wie Duncan Brown von IDC, Rob Hale von AWS, Girish Bhat von Sumo Logic und Chris Kachigian von Crowdstrike Best Practices zum Aufbau einer ausgereiften, resilienten Sicherheitspraxis vorstellen.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"next-generation-log-management-analytics\">Homeoffice-L\u00f6sung: CrowdStrike Falcon<\/h2>\n\n\n\n<p>Dieses Video zeigt Ihnen, wie die Dashboards der Sumo Logic -App einen Einblick in die Sicherheitslage Ihrer Endpunkte geben, die von der in Ihrem Netzwerk installierten CrowdStrike Falcon Platform analysiert wird.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_a9cae49e180cb18c13dfe315e705ace2\" class=\"wistia-video-block\" data-wistia-video=\"wistia_hjeai140at\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/hjeai140at.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='hjeai140at']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/hjeai140at\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"hjeai140at\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_hjeai140at\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/hjeai140at\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_hjeai140at\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_c909971e6459e1335cb1a2e148b30297\" class=\"wistia-video-block\" data-wistia-video=\"wistia_ym0slbqcmv\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/ym0slbqcmv.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='ym0slbqcmv']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/ym0slbqcmv\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"ym0slbqcmv\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_ym0slbqcmv\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/ym0slbqcmv\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_ym0slbqcmv\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"modernise-your-security-operations-and-achieve-greater-resilience\">Sichern Sie Ihre Daten mit der Threat Intel Quick Analysis-App<\/h2>\n\n\n\n<p>Sichern Sie Ihre Daten mit vorgefertigten Dashboards und Abfragen der Threat Intel Quick Analysis-App, die die Bedrohungsdatenbank von CrowdStrike nutzt.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":29658,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,269],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,269],"class_list":["post-53242","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-soar"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":7,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53242\/revisions"}],"predecessor-version":[{"id":65859,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53242\/revisions\/65859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/29658"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=53242"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=53242"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=53242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}