{"id":54042,"date":"2025-02-19T09:45:09","date_gmt":"2025-02-19T17:45:09","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/tessian-app-fuer-sumo-logic"},"modified":"2026-01-05T06:21:59","modified_gmt":"2026-01-05T14:21:59","slug":"tessian","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/tessian","title":{"rendered":"Tessian-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-80571da9f45cc42a9300824c5e5d8b46\" id=\"centralized-view-of-tessian-s-human-layer-events\">Zentralisierte Ansicht der Human-Layer-Ereignisse von Tessian<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"256\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/monitor-2-color-icon-2-1.png\" alt=\"\" class=\"wp-image-11222\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"comprehensive-database-cluster-monitoring\">Erhalten Sie Einblicke \u00fcber Human-Layer-Risiken<\/h3>\n\n\n\n<p>Identifizieren Sie m\u00fchelos versuchte und verhinderte menschliche Risiken wie versehentlichen Datenverlust, Datenexfiltration und Phishing-Ereignisse, indem Sie die Human-Layer-Ereignisse von Tessian zentral einsehen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/performance-2-color-icon.svg\" alt=\"\" class=\"wp-image-11251\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"achieve-faster-remediation-of-threats\">Erzielen Sie eine schnellere Behebung von Bedrohungen<\/h3>\n\n\n\n<p>Vorgefertigte Dashboards helfen Teams bei der schnellen Analyse von Vorf\u00e4llen in Echtzeit und erm\u00f6glichen eine schnelle Priorisierung und Behebung von Bedrohungen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/soar-2-color-icon-1.svg\" alt=\"\" class=\"wp-image-11252\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"strengthen-chatops-for-incident-management\">Kontext zur Sicherheit hinzuf\u00fcgen<\/h3>\n\n\n\n<p>Kombinieren Sie Tessians Human Risk Intelligence mit zus\u00e4tzlichen Datenquellen, um Anomalien zu erkennen und ein ganzheitliches Bild des organisatorischen Risikos zu erhalten.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Erhalten Sie aussagekr\u00e4ftige Einblicke in eingehende E-Mail-Bedrohungen<\/h2>\n\n\n\n<p>Das Defender-Dashboard erm\u00f6glicht Sicherheits- und IT-Teams die proaktive Erkennung eingehender E-Mail-Sicherheitsereignisse und g\u00e4ngiger Bedrohungsarten.<\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"994\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Get-Powerful-Insights-on-Inbound-Email-Threats-1.jpg\" alt=\"\" class=\"wp-image-11253\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"994\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Gain-Comprehensive-Visibility-into-Accidental-Data-Loss-through-Misdirected-Emails-and-Misattached-Files-1.jpg\" alt=\"\" class=\"wp-image-11254\" title=\"\"><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Verschaffen Sie sich einen umfassenden \u00dcberblick \u00fcber versehentliche Datenverluste durch fehlgeleitete E-Mails und falsch angeh\u00e4ngte Dateien:<\/h2>\n\n\n\n<p>Das Guardian-Dashboard bietet einen \u00dcberblick \u00fcber die Anzahl der verhinderten fehlgeleiteten E-Mails sowie die Gr\u00fcnde f\u00fcr die Kennzeichnung. Dadurch k\u00f6nnen die Teams Datenverluste, die zu einem Versto\u00df f\u00fchren k\u00f6nnten, verhindern<\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"monitor-web-server-operations\">Der Exfiltration sensibler Daten einen Schritt voraus<\/h2>\n\n\n\n<p>Das Enforcer-Dashboard bietet Einblicke in die Exfiltration sensibler Daten, indem es Aufschluss \u00fcber versuchte und verhinderte unautorisierte E-Mail-Versuche gibt.<\/p>\n\n\n\n<p><br\/><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"989\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/Get-Ahead-of-Sensitive-Data-Exfiltration-1.jpg\" alt=\"\" class=\"wp-image-11255\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":326,"featured_media":45032,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267],"class_list":["post-54042","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/326"}],"version-history":[{"count":3,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54042\/revisions"}],"predecessor-version":[{"id":64895,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/54042\/revisions\/64895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/45032"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=54042"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=54042"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=54042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}