{"id":53249,"date":"2025-01-24T20:31:48","date_gmt":"2025-01-25T04:31:48","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/criminal-ip-app-fuer-sumo-logic"},"modified":"2026-01-07T07:22:20","modified_gmt":"2026-01-07T15:22:20","slug":"criminal-ip","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/criminal-ip","title":{"rendered":"Criminal IP-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-13e5ec56a93c6e9ff696022a277c755930439ace e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-6d13f63c1c4bb04cc134dcdc330878d4c6329f11  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-15657fd270ca2a6fb2fb175b181e375c\" id=\"enrich-your-sumologic-cloud-siem-with-criminal-ip-s-threat-intelligence\">Erg\u00e4nzen Sie Ihr Sumo Logic Cloud-SIEM mit Bedrohungsdaten von Criminal IP<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Verbessern Sie Ihre Risikoerkennung bei identifizierten Assets durch den Einsatz der umfassenden Bedrohungsdaten von Criminal IP. Dieser proaktive Ansatz zielt darauf ab, potenziellen Risiken wirksam vorzubeugen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-detect-insider-threats.svg\" alt=\"\" class=\"wp-image-3881\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"enhanced-threat-detection\">Verbesserte Threat Detection<\/h3>\n\n\n\n<p>\u00dcberlassen Sie nichts dem Zufall \u2013 mit der M\u00f6glichkeit, potenzielle Sicherheitsbedrohungen in Echtzeit zu erkennen und zu bek\u00e4mpfen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-microservices.svg\" alt=\"\" class=\"wp-image-3901\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"proactive-risk-mitigation\">Proaktive Risikominderung<\/h3>\n\n\n\n<p>Erm\u00f6glicht es dem SecOps-Team, potenzielle Bedrohungen proaktiv zu erkennen und zu bek\u00e4mpfen, bevor sie eskalieren \u2013 durch umfassende Threat Intelligence von Criminal IP.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-ee45c60426ca36375d91427eee6c079461041108  col-sm-4\">\n<div class=\"e-div e-div-3065aa63441b8fcc971ce24285003437e5014388\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-advanced-analytics.svg\" alt=\"\" class=\"wp-image-3874\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"in-depth-forensic-analysis\">Tiefgehende forensische Analyse<\/h3>\n\n\n\n<p>Erm\u00f6glicht es Teams, fundiertere Entscheidungen zu treffen, indem Sicherheitsvorf\u00e4lle auf einer tieferen Ebene identifiziert und analysiert werden.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e991ab2267c941cd7e542d0c6858bc76fdadb860 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1089\" height=\"809\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Criminal-IPs-asset-analysis.png\" alt=\"\" class=\"wp-image-3902\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Criminal-IPs-asset-analysis.png 1089w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Criminal-IPs-asset-analysis-300x223.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Criminal-IPs-asset-analysis-1024x761.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Criminal-IPs-asset-analysis-768x571.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Criminal-IPs-asset-analysis-575x427.png 575w\" sizes=\"auto, (max-width: 1089px) 100vw, 1089px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-57c18431eb2dd6d034c16281bbbb90b27babb5e6 e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"gain-insights-from-criminal-ip-s-asset-analysis\">Gewinnen Sie Erkenntnisse aus der Asset-Analyse von Criminal IP<\/h2>\n\n\n\n<p>Criminal IP bietet eine umfassende Analyse von IP-Adressen innerhalb Ihrer Sumo Logic Cloud-SIEM-Plattform. Diese tiefgreifende Untersuchung liefert Ihnen wertvolle Erkenntnisse, um die mit spezifischen IP-Adressen verbundenen Risiken pr\u00e4zise zu identifizieren und zu bewerten.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":29649,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267],"class_list":["post-53249","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53249\/revisions"}],"predecessor-version":[{"id":65871,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53249\/revisions\/65871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/29649"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=53249"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=53249"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=53249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}