{"id":54003,"date":"2025-02-19T09:35:46","date_gmt":"2025-02-19T17:35:46","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/stackrox-kubernetes-sicherheitsplattform-fuer-sumo-logic"},"modified":"2026-01-20T17:06:55","modified_gmt":"2026-01-21T01:06:55","slug":"stackrox-kubernetes-security","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/stackrox-kubernetes-security","title":{"rendered":"StackRox Kubernetes-Sicherheitsplattform f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-baec96a0e63df0b3c9ebb42f22de09af\" id=\"identify-and-remediate-vulnerabilities-misconfigurations-compliance-violations-and-runtime-threats\">Identifizieren und beheben Sie Schwachstellen, Fehlkonfigurationen, Compliance-Verletzungen und Laufzeitbedrohungen.<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/retain-and-visualize-logs-2.svg\" alt=\"\" class=\"wp-image-9997\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"comprehensive-database-cluster-monitoring\">Sichern Sie Ihre Umgebung gegen Schwachstellen<\/h3>\n\n\n\n<p>Sch\u00fctzen Sie Ihre Cloud-nativen Systeme vor Schwachstellen in Bildern, Containern, Kubernetes sowie Ihren laufenden Implementierungen<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/advanced-analytics-8.svg\" alt=\"\" class=\"wp-image-10587\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"detect-and-prevent-accidental-exposures-from-misconfiguration\">Erkennen und verhindern Sie versehentliche Expositionen aufgrund von Fehlkonfigurationen<\/h3>\n\n\n\n<p>Identifizieren Sie Fehlkonfigurationen in Bildern, Containern, Clustern, Kubernetes und Netzwerkrichtlinien und verhindern Sie dadurch unbeabsichtigte Risiken, die Ihre Systeme gef\u00e4hrden<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/troubleshoot-9.svg\" alt=\"\" class=\"wp-image-10624\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"strengthen-chatops-for-incident-management\">Identifizieren Sie Laufzeitbedrohungen und reagieren Sie darauf<\/h3>\n\n\n\n<p>Kombinieren Sie Regeln, Whitelists, Baselines und Verhaltensmodellierungen, um Laufzeitbedrohungen in Ihren Containerumgebungen zu identifizieren und zu beseitigen<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Umfassende Schwachstellenverwaltung<\/h2>\n\n\n\n<p>Stellen Sie sicher, dass Ihre Container- und Kubernetes-Umgebungen frei von Schwachstellen sind \u2013 vom Augenblick des Image-Builds bis zum laufenden Betrieb \u2013, indem Sie Schwachstellen in Images, aktiven Deployments und Clustern identifizieren. Verstehen Sie Ihr Risikoprofil durch vollst\u00e4ndige Transparenz \u00fcber den Schweregrad der Schwachstellen, die Ihre Umgebung betreffen, damit Sie Behebungsma\u00dfnahmen in Bereichen mit h\u00f6herem Risiko priorit\u00e4r behandeln k\u00f6nnen.<\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1472\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-scaled.png\" alt=\"\" class=\"wp-image-66144\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-scaled.png 2560w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-300x172.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-1024x589.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-768x442.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-1536x883.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-2048x1177.png 2048w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxImageViolations-4-1-575x331.png 575w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1545\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-scaled.png\" alt=\"\" class=\"wp-image-66138\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-scaled.png 2560w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-300x181.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-1024x618.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-768x463.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-1536x927.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-2048x1236.png 2048w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxOverview-2-1-575x347.png 575w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Automatisierte Konfigurationsverwaltung<\/h2>\n\n\n\n<p>Operationalisieren Sie die <a href=\"https:\/\/www.stackrox.com\/post\/2019\/07\/kubernetes-security-101\/\" target=\"_blank\" rel=\"noopener\">Kubernetes-Sicherheit<\/a> mithilfe einer automatisierten Konfigurationsverwaltung, damit Ihre Sicherheit mit der Skalierung Ihrer Umgebung mitw\u00e4chst. Verschaffen Sie sich einen \u00dcberblick \u00fcber die Kubernetes-Konfigurationsverst\u00f6\u00dfe in Ihren Bereitstellungen und Namespaces und verstehen Sie Ihr wahres Sicherheitsrisiko, indem Sie Einblicke in den Schweregrad der Verst\u00f6\u00dfe erhalten.<\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Echtzeit-Bedrohungserkennung<\/h2>\n\n\n\n<p>\u00dcberwachen Sie die Ausf\u00fchrung von Prozessen, Netzwerkverbindungen und -fl\u00fcssen, die Ausweitung von Privilegien und den Start von Dateien, um Bedrohungen in Echtzeit zu erkennen. Verwenden Sie das Dashboard f\u00fcr Laufzeitverletzungen, um festzustellen, welche Bereitstellungen und Cluster einen b\u00f6sartigen oder anomalen Prozess ausf\u00fchren und dadurch die forensische Untersuchung und Reaktion zu beschleunigen.<\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1538\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-scaled.png\" alt=\"\" class=\"wp-image-66132\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-scaled.png 2560w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-300x180.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-1024x615.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-768x461.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-1536x923.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-2048x1230.png 2048w, https:\/\/www.sumologic.com\/wp-content\/uploads\/StackRoxRuntimeViolations-1-1-575x345.png 575w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":326,"featured_media":45029,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,270],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,270],"class_list":["post-54003","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-development"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/326"}],"version-history":[{"count":5,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54003\/revisions"}],"predecessor-version":[{"id":66945,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54003\/revisions\/66945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/45029"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=54003"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=54003"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=54003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}