{"id":52379,"date":"2024-10-14T14:31:00","date_gmt":"2024-10-14T22:31:00","guid":{"rendered":"https:\/\/www.sumologic.com\/solutions\/secops"},"modified":"2026-01-27T06:30:58","modified_gmt":"2026-01-27T14:30:58","slug":"security-analyst-tools","status":"publish","type":"page","link":"https:\/\/www.sumologic.com\/de\/solutions\/security-analyst-tools","title":{"rendered":"SecOps"},"content":{"rendered":"\n<section class=\"e-stn e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 e-stn--main-banner\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-e29c1412f8521d8d563da1604836dba45a7358a5 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<p class=\"eyebrow has-text-color has-link-color wp-elements-766dbc7a10c6b0f47e3f38bba8ecaa61\" style=\"color:#ffffff\">SECURITY- UND SOC-ANALYSTEN<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-afb01e0700f8af7349199cdaa4aaa450\" id=\"modernize-your-secops-workflows\">Modernisieren Sie Ihre SecOps-Arbeitsabl\u00e4ufe<\/h1>\n\n\n\n<p class=\"description has-chinese-silver-color has-text-color has-link-color wp-elements-882c2d82f3c92807b772cc2aafd13e42\">Ordnen Sie Alarme automatisch zu, erkennen Sie Bedrohungen in all Ihren Datenquellen und beschleunigen Sie die Untersuchung von Vorf\u00e4llen in Ihrem Security Operations Center (SOC).<\/p>\n\n\n\n<div class=\"e-div e-div-b8650eb23605cc1c3c2b0261ca56a62af47c216e e-div--button-wrapper\"><div class=\"e-btn e-btn--blue-button-with-right-arrow\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/sign-up\" target=\"_self\">\n<p class=\"title\">Kostenlose Testversion starten<\/p>\n<\/a><\/div>\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\"href=\"https:\/\/www.sumologic.com\/case-studies\/hashicorp\" target=\"_self\">\n<p class=\"title\">Fallstudie lesen<\/p>\n<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<div class=\"e-div e-div-c798c7a4466427637118b74d5226a20455577ae2 e-div--media-wrapper\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"762\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-SecOps_850x762.jpg\" alt=\"\" class=\"wp-image-8994\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-SecOps_850x762.jpg 850w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-SecOps_850x762-300x269.jpg 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-SecOps_850x762-768x688.jpg 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/hero-SecOps_850x762-575x515.jpg 575w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n<\/div>\n\n<div class=\"e-img e-img--section-bg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/main-banner-bg-blur.svg\" alt=\"\" class=\"wp-image-1076\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-8a80b2d47add82859d22e0240a3b38171ed5acc3 e-pt-30 e-pb-20\"><div class=\"container\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h2 class=\"wp-block-heading has-text-align-center has-eigengrau-color has-text-color has-link-color wp-elements-002c00b0413b9319940ec84c03eeef0e\" id=\"cloud-siem-solution\">Cloud-SIEM-L\u00f6sung<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Das\u00a0<a href=\"https:\/\/www.sumologic.com\/de\/solutions\/cloud-siem\" data-type=\"page\" data-id=\"22\">Cloud-native SIEM<\/a>\u00a0von Sumo Logic erkennt und korreliert Bedrohungen und Sicherheitsvorf\u00e4lle automatisch und in Echtzeit \u00fcber Ihre Cloud-, On-Premises- und Hybrid-Cloud-Datenquellen hinweg. Es bietet zudem automatisierte Anreicherungen von Benutzer-, Ger\u00e4te- und Netzwerkdaten, die es Ihren SOC-Teammitgliedern erm\u00f6glichen, ihre Untersuchungen zu beschleunigen. All dies greift nahtlos ineinander, um Ihre Anwendungen und Daten zu sch\u00fctzen, Transparenz \u00fcber Bedrohungen im gesamten Unternehmen zu gewinnen \u2013 unabh\u00e4ngig vom Standort \u2013 und die Alert Fatigue f\u00fcr Sie und Ihr Team drastisch zu reduzieren oder sogar ganz zu eliminieren.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-2\" class=\"e-stn e-stn-5deb0a4d3ac7bfa1b90a05c3a814ce3c00d0f60d e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color has-large-font-size wp-elements-3422a2714b0a05635c6884ee470833aa\" id=\"secure-saas-and-cloud-based-applications\">Sichere SaaS- und Cloud-basierte Anwendungen<\/h2>\n\n\n\n<p>Sorgen Sie f\u00fcr Anwendungssicherheit, ohne die Geschwindigkeit Ihrer Softwareentwicklung zu beeintr\u00e4chtigen. \u00dcberwachen Sie den gesamten CI\/CD-Lifecycle und sichern Sie sowohl die Coding-Phase als auch die Nutzung von Applikationen und Ressourcen ab. Sumo Logic Cloud SIEM erm\u00f6glicht es Ihnen, s\u00e4mtliche Protokolle aus der Anwendungsentwicklung und der Cloud-Security an einem zentralen, sicheren Ort zusammenzuf\u00fchren. So kann Ihr DevSecOps-Team die Durchsetzung von Sicherheitsrichtlinien und Kontrollen mit vollst\u00e4ndiger Transparenz bewerten, um Schwachstellen in Anwendungen zu vermeiden und b\u00f6swillige Zugriffe fr\u00fchzeitig zu erkennen.  <\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/help.sumologic.com\/docs\/cse\/records-signals-entities-insights\/cse-heads-up-display\/\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Mehr erfahren<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"991\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3.png\" alt=\"\" class=\"wp-image-8995\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3.png 1800w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3-300x165.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3-1024x564.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3-768x423.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3-1536x846.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-SECops-saas2-v3-575x317.png 575w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-1\" class=\"e-stn e-stn-9819a45c7d8f2ed5bf74c7e7107f8fe793a3ea4e e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-9819a45c7d8f2ed5bf74c7e7107f8fe793a3ea4e { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"973\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3.png\" alt=\"\" class=\"wp-image-9000\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3.png 1800w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3-300x162.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3-1024x554.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3-768x415.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3-1536x830.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-advanced-3-v3-575x311.png 575w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color has-large-font-size wp-elements-7be490966df3787ce7a6e0ee70df478d\" id=\"advanced-analytics-for-threat-detection-and-investigation\">Erweiterte Analysen zur Erkennung und Untersuchung von Bedrohungen<\/h2>\n\n\n\n<p>Etablieren Sie ein robustes Programm zur Erkennung von Insider-Bedrohungen auf Basis angereicherter Sicherheits-Logdaten und identifizieren Sie mittels\u00a0<a href=\"https:\/\/www.sumologic.com\/blog\/dont-just-shift-left-level-up-building-a-modern-cyber-defense-program\" data-type=\"blog\" data-id=\"4665\">User and Entity Behavior Analytics<\/a>\u00a0(UEBA) untypische Aktivit\u00e4ten gegen\u00fcber definierten Baseline-Metriken. Die\u00a0<a href=\"https:\/\/help.sumologic.com\/docs\/cse\/rules\/about-cse-rules\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sumo Logic Cloud SIEM Rules Engine<\/a>\u00a0erm\u00f6glicht Ihnen die Erstellung komplexer Use Cases und bietet sofort einsatzbereite Erkennungsfunktionen. Dazu geh\u00f6ren speziell auf UEBA-Anforderungen ausgerichtete\u00a0<a href=\"https:\/\/help.sumologic.com\/docs\/cse\/rules\/write-first-seen-rule\/\" target=\"_blank\" rel=\"noreferrer noopener\">First-Seen<\/a>&#8211; und\u00a0<a href=\"https:\/\/help.sumologic.com\/docs\/cse\/rules\/write-outlier-rule\/#:~:text=An%20Outlier%20rule%20is%20different,the%20rule%20will%20apply%20to.\" target=\"_blank\" rel=\"noreferrer noopener\">Outlier-Rules<\/a>. Beschleunigen Sie die Untersuchung von Vorf\u00e4llen sowie die Auswirkungsanalyse durch die Entity Timeline und den Entity Relationship Graph.<\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/help.sumologic.com\/docs\/cse\/records-signals-entities-insights\/about-cse-insight-ui\/#entities-tab\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Mehr erfahren<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-4\" class=\"e-stn e-stn-ef04c0a598ec06449a3755c6ffafb082324cdde7 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color has-large-font-size wp-elements-84a05403dc09080dcc95197882a579d4\" id=\"case-management\">Fallmanagement<\/h2>\n\n\n\n<p>Klassifizieren Sie Vorfallmeldungen schneller mit einem flexiblen Case-Management-Workflow. Priorisieren und delegieren Sie Untersuchungen in k\u00fcrzester Zeit und verstehen Sie pr\u00e4zise, was vor, w\u00e4hrend und nach einem Alarm passiert ist. F\u00fcr eine noch schnellere Aufkl\u00e4rung von Bedrohungen steht Ihnen die benutzerdefinierte Suche mittels Sumo Logic Search Query Language sowie praktische Search Cheat Sheets zur Verf\u00fcgung.<\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/help.sumologic.com\/docs\/cse\/records-signals-entities-insights\/\" target=\"_blank\" rel=\"noopener\">\n<p class=\"title\">Mehr erfahren<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"979\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3.png\" alt=\"\" class=\"wp-image-9001\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3.png 1800w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3-300x163.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3-1024x557.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3-768x418.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3-1536x835.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-case-m4-v3-575x313.png 575w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-3\" class=\"e-stn e-stn-2b166cc875bba5b030d27083cfc6ec7d8f476dc4 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-2b166cc875bba5b030d27083cfc6ec7d8f476dc4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f9fa; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1006\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3.png\" alt=\"\" class=\"wp-image-9002\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3.png 1800w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3-300x168.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3-1024x572.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3-768x429.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3-1536x858.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-auto5-v3-575x321.png 575w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color has-large-font-size wp-elements-b1d71a159b23a4be337326218968e912\" id=\"automated-incident-response\">Automatisierte Reaktion auf Vorf\u00e4lle<\/h2>\n\n\n\n<p>Erstellen Sie benutzerdefinierte, vollst\u00e4ndig automatisierte Workflows oder verwenden Sie vorgefertigte Playbooks. Reichern Sie Warnmeldungen automatisch mit Informationen aus internen und externen Quellen an, um potenzielle Sicherheitsbedrohungen schneller zu untersuchen. Der\u00a0<a href=\"https:\/\/help.sumologic.com\/docs\/cse\/automation-service\/about-automation-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud SIEM Automation Service<\/a>\u00a0bietet Ihnen Zugang zum\u00a0<a href=\"https:\/\/www.sumologic.com\/glossary\/open-integration-framework-oif\" data-type=\"glossary\" data-id=\"11066\">Open Integration Framework<\/a>\u00a0(OIF) und Hunderten von vorkonfiguierten Integrationen.<\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/blog\/quickest-response-not-best-cybersecurity\" target=\"_self\">\n<p class=\"title\">Mehr erfahren<\/p>\n<\/a><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section id=\"section-4\" class=\"e-stn e-stn-ef04c0a598ec06449a3755c6ffafb082324cdde7 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color has-large-font-size wp-elements-4c877a89e5ba49d6e2c7e01a8447343b\" id=\"case-management\">Threat Hunting<\/h2>\n\n\n\n<p>Beschleunigen und optimieren Sie Ihre Threat-Hunting-Strategie durch Anomalieerkennung und SIEM-Korrelationsregeln. Gewinnen Sie tiefere Einblicke in Entities und deren Beziehungen \u2013 etwa bei externen Dienstleistern, Service-Accounts oder bereits ausgeschiedenen Mitarbeitern \u2013 und erhalten Sie eine nach Risiko prioritisierte Ansicht f\u00fcr Ihre Untersuchungen. Mit Sumo Logic verf\u00fcgen Sie \u00fcber einen zentralen Ort, um s\u00e4mtliche Sicherheits-Logs nach beliebigen Kriterien zu durchsuchen \u2013 f\u00fcr alles und \u00fcberall. So wird Ihr Threat Hunting durch eine zentrale, verl\u00e4ssliche Datenquelle optimal unterst\u00fctzt.<\/p>\n\n\n<div class=\"e-btn e-btn--black-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/blog\/quickest-response-not-best-cybersecurity\" target=\"_self\">\n<p class=\"title\">Mehr erfahren<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"997\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3.png\" alt=\"\" class=\"wp-image-9008\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3.png 1800w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3-300x166.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3-1024x567.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3-768x425.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3-1536x851.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-secops-threat-6-v3-575x318.png 575w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"page-section resource-card-section gsbp-585e707 alignfull\" id=\"section-6\">\n<div>\n<div class=\"box-container resource-card-section__container\">\n<div class=\"resource-card-section__heading-wrapper\">\n<h2 class=\"resource-card-section__heading\">Zus\u00e4tzliche Ressourcen<\/h2>\n<\/div>\n\n\n\n<div class=\"grid--l-3 grid--m-2 grid--s-1 gap--l resource-block-wrapper mt-3 grid--3\">\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/hashicorp\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Hashicorp_326x183_Resources-1.png\" alt=\"\" width=\"326\" height=\"183\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Fallstudie<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Monitoring und Sicherung von 10.000 Clouds<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Fallstudie lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/blog\/dont-just-shift-left-level-up-building-a-modern-cyber-defense-program\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Dont-just-shift-left-header-img-2.jpg\" alt=\"\" width=\"1118\" height=\"628\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Aufbau eines modernen Cyber-Verteidigungsprogramms<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Blog lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/case-studies\/ascential\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-logo-ascential-3.jpg\" alt=\"\" width=\"1302\" height=\"731\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Fallstudie<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Cloud SIEM unterst\u00fctzt DevSecOps<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Fallstudie lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/de\/blog\/why-modern-siem\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-ModernSIEM_blog_social_600x314-v2.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Zehn moderne SIEM-Anwendungsf\u00e4lle<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Blog lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/blog\/azure-cloud-purple-team\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Threat_Azure_social_652x366.png\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Blog<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Wie Sie eine Azure Cloud Purple Team-\u00dcbung durchf\u00fchren<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Blog lesen<\/div>\n<\/div>\n<\/a>\n\n\n\n<a class=\"resource-block\" href=\"https:\/\/www.sumologic.com\/guides\/siem-evaluation\">\n<div class=\"resource-block__img-wrap\">\n<figure class=\"resource-block__figure\">\n<img decoding=\"async\" class=\"resource-block__img\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/thumb-Header_Art-1_2024-01-03-225420_dnbu-copy-2.jpg\" alt=\"\" width=\"652\" height=\"366\" loading=\"lazy\" title=\"\">\n<\/figure>\n<\/div>\n\n\n\n<div class=\"resource-block__body-wrap\">\n<div class=\"resource-block__sub-heading\">Leitfaden<\/div>\n\n\n\n<h3 class=\"resource-block__heading\">Der ultimative Leitfaden f\u00fcr modernes SIEM<\/h3>\n\n\n\n<div class=\"btn-right-arrow resource-block__link\">Leitfaden lesen<\/div>\n<\/div>\n<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n<section class=\"e-stn e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 e-stn--events-main-banner e-pt-0\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-ceba3706ee898be52a7a7a7b87aa3e5ff65e62e4 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #101827; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading has-pure-white-color has-text-color has-link-color wp-elements-e7fd44429d9db89a6337f300fb49491b\" id=\"ready-to-modernize-your-security-operations\">Sind Sie bereit, Ihre Sicherheitsabl\u00e4ufe zu modernisieren?<\/h2>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-b9389895fc6d6b4c6dbc9f56863488f0\" style=\"color:#ffffff\">Erleben Sie Sumo Logic Cloud-SIEM selbst und sehen Sie die Bedrohungen, die am wichtigsten sind.<\/p>\n\n\n<div class=\"e-btn e-btn--white-border-button\"><a class=\"e-btn__link\" href=\"https:\/\/www.sumologic.com\/demo\" target=\"_self\">\n<p class=\"title\">Demo ansehen<\/p>\n<\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/sumo-wp-marketing-site-assets.s3.amazonaws.com\/uploads\/2024\/10\/Frame-1073715737.svg\" alt=\"\" class=\"wp-image-1151\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":45276,"parent":51998,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"3","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":".gsbp-9713641,.related-items{display:flex;justify-content:center;flex-direction:column;align-items:center;padding-right:var(--wp--custom--spacing--side, min(3vw, 20px));padding-left:var(--wp--custom--spacing--side, min(3vw, 20px));margin-top:0;margin-bottom:0;position:relative;padding-top:var(--cf-space-xl);padding-bottom:var(--cf-space-xl)}.gsbp-1581a8b{max-width:100%;width:1380px}.related-items__left-col{display:flex;flex-direction:column;column-gap:var(--cf-space-m);row-gap:var(--cf-space-3xs)}body .related-items__heading:is(h1,h2,h3,h4,h5,h6){font-size:var(--cf-text-2xl)}.related-items__right-col{display:flex;column-gap:var(--space-l);row-gap:var(--space-l)}.related-items__item{padding-top:var(--cf-space-s);padding-bottom:var(--cf-space-s);padding-left:var(--cf-space-s);padding-right:var(--cf-space-s);display:flex;flex-direction:column;row-gap:var(--cf-space-xs);text-decoration:none;border-width:1px;border-style:solid;border-color:var(--cf-primary-30)}.related-items__item .relate-items__item-img{max-width:100%;height:auto;object-fit:cover}body .relate-items__item-title:is(h1,h2,h3,h4,h5,h6){text-decoration:none;color:var(--cf-primary)}.related-items__item .relate-items__item-img{text-decoration:none;margin-bottom:var(--cf-space-4xs)}.related-items__item .relate-items__item-title{text-decoration:none;font-size:var(--cf-text-l)}.related-items__item .related-items__item-btn{color:var(--cf-primary);padding-top:var(--cf-space-xs);padding-bottom:var(--cf-space-xs);padding-left:var(--cf-space-xs);padding-right:var(--cf-space-xs);border-width:1px;border-style:solid;max-width:150px;display:flex;justify-content:center}.related-items__item .related-items__item-text{color:var(--cf-primary)}","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-52379","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/52379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/comments?post=52379"}],"version-history":[{"count":7,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/52379\/revisions"}],"predecessor-version":[{"id":67816,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/52379\/revisions\/67816"}],"up":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/pages\/51998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/45276"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=52379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}