{"id":53309,"date":"2025-01-21T18:51:30","date_gmt":"2025-01-22T02:51:30","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/aws-network-firewall-app-fuer-sumo-logic"},"modified":"2026-01-07T07:15:49","modified_gmt":"2026-01-07T15:15:49","slug":"aws-network-firewall","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/aws-network-firewall","title":{"rendered":"AWS Network Firewall-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-ed1fdbb4d3274f889374a8644babd837\" id=\"automated-threat-detection-and-correlation-for-aws-network-firewall\">Automatisierte Bedrohungserkennung und -korrelation f\u00fcr AWS Network Firewall<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-optimize.svg\" alt=\"\" class=\"wp-image-3488\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"automated-security-operations\">Automated security operations<\/h3>\n\n\n\n<p>Generieren Sie automatisch umsetzbare Insights \u2013 nicht nur priorisierte Alarme \u2013 angereichert mit Benutzer-, Ger\u00e4te- und Netzwerkkontext aus all Ihren AWS- sowie hybriden, On-Prem- und Cloud-Datenquellen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-detect-insider-threats.svg\" alt=\"\" class=\"wp-image-3881\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"threat-insights\">Bedrohungsanalysen<\/h3>\n\n\n\n<p>Korrelieren Sie Bedrohungen und Ereignisse automatisch aus AWS Network Firewall mit Ereignissen aus Infrastruktur, Anwendungen und Sicherheitsanbietern, um die Ursachen zu erforschen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-performance-1.svg\" alt=\"\" class=\"wp-image-23149\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"rapid-response\">Schnelle Reaktion<\/h3>\n\n\n\n<p>Reduzieren Sie die Zeit f\u00fcr die Erkennung, Untersuchung und Behebung von Sicherheitsproblemen, die durch Ereignisse und Warnungen Ihrer AWS Network Firewall-Regeln aufgedeckt werden.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4.png\" alt=\"\" class=\"wp-image-3605\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Rapid-Threat-Detection-v4-575x323.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"rapid-threat-detection\">Rasche Bedrohungserkennung<\/h2>\n\n\n\n<p>Die Cloud-SIEM-L\u00f6sung von Sumo Logic f\u00fchrt automatisierte Bedrohungserkennung, Analysen und Korrelationen durch. Dabei nutzt sie Threat Intelligence, historische Suchen und vordefinierte Sicherheitsregeln f\u00fcr AWS-Dienste \u2013 einschlie\u00dflich der AWS Network Firewall \u2013 sowie f\u00fcr alle hybriden On-Premises- und Cloud-Datenquellen. Durch die Korrelation von Sicherheitswarnungen der AWS Network Firewall, anderer AWS-Dienste und all Ihrer Sicherheitstools bietet Sumo Logic Ihnen eine detaillierte Sichtbarkeit f\u00fcr die Untersuchung von Bedrohungen, erg\u00e4nzt um Kontextinformationen, die automatisch aus Benutzer-, Ger\u00e4te- und Netzwerkaktivit\u00e4ten angereichert werden.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"threat-intelligence\">Threat Intelligence<\/h2>\n\n\n\n<p>Die Threat-Intelligence-Funktion von Sumo Logic \u2013 unterst\u00fctzt von CrowdStrike \u2013 funktioniert sofort einsatzbereit mit unserer AWS Network Firewall-App und erlaubt die zu\u00fcgige Erkennung m\u00f6glicher Bedrohungen sowie von Indicators of Compromise. Diese Informationen helfen Ihnen au\u00dferdem, die Sicherheitslage von Quellen zu verstehen, die sich mit Ihren AWS- und Hybrid-Umgebungen verbinden.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2.png\" alt=\"\" class=\"wp-image-3606\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Threat-Intelligence-v2-575x323.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2.png\" alt=\"\" class=\"wp-image-3607\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-300x169.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-1024x576.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-768x432.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-1536x864.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Granular-Visibility-v2-575x323.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"the-sumo-logic-advantage\">Granulare Sichtbarkeit<\/h2>\n\n\n\n<p>Bietet eine einheitliche Ansicht aller Sicherheitsereignisse f\u00fcr die Verwaltung von Warnungen, die Durchf\u00fchrung von Analysen zur schnellen Erkennung von Bedrohungen, tiefgreifende forensische Untersuchungen und eine schnelle Reaktion auf Vorf\u00e4lle.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"threat-intelligence\">Das Security-First-Prinzip<\/h2>\n\n\n\n<p>Unser starkes Engagement f\u00fcr Datensicherheit wird durch unabh\u00e4ngige Konformit\u00e4tsbescheinigungen und Zertifizierungen der Plattform best\u00e4tigt, darunter PCI DSS 3.2.1 Service Provider Level 1, SOC 2 Type 2 Audit Report, HIPAA, ISO 27001 und CSA STAR Level 2.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"678\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle.png\" alt=\"\" class=\"wp-image-3608\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-300x127.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-1024x434.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-768x325.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-1536x651.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Security-First-Principle-575x244.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"506\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search.png\" alt=\"\" class=\"wp-image-3609\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search.png 1600w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-300x95.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-1024x324.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-768x243.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-1536x486.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-AWS-Network-Firewall-Search-575x182.png 575w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"the-sumo-logic-advantage\">Skalierbares SaaS-Bereitstellungsmodell<\/h2>\n\n\n\n<p>Sumo Logic wurde nativ in AWS entwickelt, um Flexibilit\u00e4t, Skalierbarkeit und Agilit\u00e4t zu bieten, wenn die Arten, Mengen und Quellen der Daten Ihres Unternehmens weiter anwachsen. Die dynamische Skalierung von Sumo Logic kann t\u00e4glich Petabytes an Daten aufnehmen und bietet Ihnen jederzeit einen umfassenden \u00dcberblick \u00fcber Ihre Sicherheitslage.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":29248,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[272],"integration-use-case":[267],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[272],"integration-use-case":[267],"class_list":["post-53309","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-cloud-provider-amazon-web-services","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53309\/revisions"}],"predecessor-version":[{"id":65615,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53309\/revisions\/65615"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/29248"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=53309"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=53309"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=53309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}