Posts by
Blog
Why you need both SIEM and SOAR to improve SOC efficiencies and increase effectiveness
Blog
What it means to be ‘in it’ with our customers every single day
Blog
How to get started with OpenTelemetry auto-instrumentation for Java
Blog
Mind your Single Sign-On (SSO) logs
Blog
Okta evolving situation: Am I impacted?
Blog
Take the very first State of SRE Survey from DevOps Institute
Blog
Sumo Logic all-in with AWS
Blog
How to monitor RabbitMQ logs and metrics with Sumo Logic
Blog
Five women leaders share advice to empower the next generation of women in STEM
Blog
Want to improve collaboration and reduce incident response time? Try Cloud SOAR War Room
Blog
How to monitor ActiveMQ logs and metrics
Blog
Ship software faster by removing bottlenecks and keep work flowing
Blog
Overwhelmed: why SOAR solutions are a game changer
Blog
Minimize downtime, and improve performance for Verizon 5G Edge applications with Sumo Logic
Blog
How to monitor Amazon Kinesis
Blog
SRE: How the role is evolving
Blog
Cloud-native SOAR and SIEM solutions pave the road to the modern SOC
Blog
Adopt user analytics to accelerate security investigations
Blog
Make the most of your observability data with the Data Volume app
Blog
Monitoring AWS Spot instances using Sumo Logic
Blog
Eight best practices for a successful cloud migration strategy
Blog
Monitoring your AWS environment for vulnerabilities and threat detection
Blog
Accelerating software delivery through observability at two very different organizations
Blog
Database monitoring with Sumo Logic and OpenTelemetry-powered distributed tracing
Blog
How teams are breaking down data silos to improve software delivery
Blog
Host and process metrics - monitoring beyond apps
Blog
Log4Shell CVE-2021-44228
Blog
Accelerate security operations today and tomorrow with automation and AI
Blog
User experience is a focus of Sumo Logic Observability innovations
Blog
Announcing new Sumo Logic AWS security Quick Start integrations
Blog
How Cloud SOAR helps teams boost security during cloud migration
Blog
How to streamline Windows monitoring for better security
Blog
Sumo Logic extends monitoring for AWS Fargate powered by AWS Graviton2 processors
Blog
How using Cloud SIEM dashboards and metrics for daily standups improves SOC efficiency
Blog
Extend your DevOps analysis to CircleCI and GitLab data
Blog
Why and how to monitor AWS EKS
Blog
How Sumo Logic monitors unit economics to improve cloud cost-efficiency
Blog
An open letter to Sumo Logic enthusiasts
Blog
The role of APM and distributed tracing in observability
Blog
Three Cloud SIEM innovations that improve team collaboration, tailor SOC workflows, and encourage customization
Blog
Top six Amazon S3 metrics to monitor
Blog
OpenTelemetry: the future of Sumo Logic Observability
Blog
Sumo Logic recognized as a leader in the GigaOm Radar Report for Security Orchestration, Automation, and Response (SOAR)
Blog
Illuminate 2021 - embracing open standards for big picture observability
Blog
How Cloud SOAR mitigates the cybersecurity skill gap problem in modern SOCs
Blog
Analyzing human layer risks with Tessian
Blog
Supply chain security, compliance, and privacy for cloud-native ecosystems
Blog
Sumo Logic extends monitoring for AWS Lambda functions powered by AWS Graviton2 processors
Blog
Introducing Sensu Plus
Blog
Troubleshooting outages at 3 AM with Alert Response
Blog
XDR, what is it? Does everyone agree? What is real impact vs. hype?
Blog
Extending observability to app infrastructure
Blog
Learn how to modernize security operations at Illuminate 21
Blog
Building a cloud-native SOC: fantasy or reality?
Blog
5 reasons to attend Illuminate
Blog
Securing critical infrastructure
Blog
5 reasons why security automation won't replace skilled security professionals
Blog
Supervised active intelligence - the next level of security automation
Blog
How to increase & justify your cybersecurity budget
Blog
Uncovering the power of Cloud SOAR’s Open Integration Framework
Blog
Integrating MITRE ATT&CK with Cloud SOAR to optimize SecOps and incident response
Blog
How to improve MTTD and MTTR with SOAR
Blog
SOAR doesn't replace humans - It makes them more efficient
Blog
All you need to know about HAProxy log format
Blog
Announcing New York State Department of Financial Services Attestation
Blog
How to implement cybersecurity automation in SecOps with SOAR (7 simple steps)
Blog
How the cloud-native journey is changing the CISO’s role
Blog
Monitoring Cassandra vs Redis vs MongoDB
Blog
How to use Cloud SOAR's search query bar to optimize workflow processes
Blog
Sumo Logic brings full coverage to modern IT and SecOps workflows with ServiceNow
Blog
Ready, set, SOAR! The road to next-gen SOC with SOAR security
Blog
5 trends shaping the cybersecurity landscape in 2021
Blog
Cost of cyber attacks vs. cost of cybersecurity in 2021
Blog
Why proactive threat hunting will be a necessity in 2021
Blog
Ransomware attacks 2.0: How to protect your data with SOAR
Blog
The state of SOAR: What to expect in 2021
Blog
Monitoring HAProxy logs and metrics with Sumo Logic
Blog
Modernizing SOC and security
Blog
Sumo Logic Red Hat Marketplace Operator
Blog
Disrupt your SOC or be disrupted
Blog
How SMART are your security program KPIs?
Blog
Flexible Incident Response playbooks for any situation
Blog
Global Confidence: Using crowdsourcing and machine learning to scale your SOC resources
Blog
Our vision for Cloud SOAR and the future
Blog
Sumo Logic completes full stack observability with Real User Monitoring capabilities
Blog
Announcing new Cloud Security Monitoring & Analytics apps to surface the most relevant security insights from AWS GuardDuty, WAF, and Security Hub data
Blog
Deep dive into Security Orchestration, Automation and Response (SOAR)
Blog
How to monitor NGINX deployments with Sumo Logic
Blog
How to use Kubernetes to deploy Postgres
Blog
Modern security ops with Zscaler and Sumo Logic
Blog
How to troubleshoot Apache Cassandra performance using metrics and logs in debugging
Blog
Building a modern SOC
Blog
Hunting for threats in multi-cloud and hybrid cloud environments
Blog
How to monitor Redis logs and metrics
Blog
Legacy vs. modern cloud SOAR-powered SOC
Blog
Queryless vs. query-less. Faster insights and better observer experience with span analytics
Blog
How to monitor Cassandra database clusters
Blog
Analyzing Office 365 GCC data with Sumo Logic
Blog
Optimize value of Cloudtrail logs with infrequent tier
Blog
Monitoring Apache Kafka clusters with Sumo Logic
Blog
Accelerate hybrid threat protection using Sumo Logic Cloud SIEM powered by AWS
Blog
Sumo Logic named a Visionary in the 2021 Gartner Magic Quadrant for SIEM for the first time
Blog
5 important DevOps monitoring metrics
Blog
The role of threat hunting in modern security
Blog
Using pre-built Monitors to proactively monitor your application infrastructure
Blog
Threat hunting with Cloud SIEM
Blog
Introducing new cloud security monitoring & analytics apps
Blog
CMMC compliance made easy with Sumo Logic
Blog
How to monitor application logs
Blog
Ensure cloud security with these key metrics
Blog
Introducing Sensu
Blog
Introducing Sumo Logic Cloud SIEM powered by AWS
Blog
Sumo Logic + DFLabs: Cloud SIEM combined with SOAR automates threat detection and incident response
Blog
Looking to disrupt your legacy SOC? Attend The Modern SOC Summit to find out how!
Blog
Distributed tracing vs. application monitoring
Blog
What is threat intelligence?
Blog
Detecting users crawling the MITRE ATT&CK stages in your AWS environment
Blog
Cloud SIEM accelerates modernizing security operations across Asia Pacific
Blog
Using Telegraf to collect infrastructure performance metrics
Blog
Accelerate incident resolution by benchmarks-enriched on-call contexts
Blog
Tail your logs with Tailing Sidecar Operator
Blog
Extend AWS observability beyond CloudWatch
Blog
Explore NGINX usage, performance, and transactions to increase customer experience
Blog
Sumo Logic joins AWS to accelerate Amazon CloudWatch Metrics collection
Blog
Why Prometheus isn’t enough to monitor complex environments
Blog
Microservices vs. serverless architecture
Blog
Sumo Logic extends support for OpenTelemetry to AWS Lambda
Blog
Sumo Logic extends its APM to browser
Blog
Sumo Logic to accelerate modernization of security operations with proposed acquisition of DFLabs
Blog
Efficiently monitor the state of Redis database clusters
Blog
Sumo Logic continues to expand public sector footprint
Blog
Forrester TEI study: Sumo Logic’s Cloud SIEM delivers 166 percent ROI over 3 years and a payback of less than 3 months
Blog
Service map & dashboards provide insight into health and dependencies of microservice architecture
Blog
Observability vs. monitoring: what's the difference?
Blog
Analyze your tracing data any way you want with Sumo search query language
Blog
Analyze JMX to better assess the health of your Java applications
Blog
How the COVID-19 pandemic has changed IT & security
Blog
Daemons in Cloud SOAR: proactively enhancing SecOps
Blog
How to dynamically auto-steer your traffic to multi-CDN or multiple data-centers
Blog
Sumo Logic achieves FedRAMP-Moderate authorization
Blog
Automating the potential workflows with Sumo Logic APIs
Blog
Case Study: Genesys’ journey to the cloud and DevOps excellence
Blog
Building autocomplete with ANTLR and CodeMirror
Blog
Code42 launches a new app in the Sumo Logic open source partner ecosystem
Blog
Best practices to monitor Cloudflare performance
Blog
Dark theme is here
Blog
SEGA Europe and Sumo Logic: integrating security across clouds
Blog
How to monitor Amazon DynamoDB performance
Blog
Multi-cloud development is accelerating adoption of Kubernetes
Blog
Embracing open source data collection
Blog
Improve your security posture by focusing on velocity, visibility, and vectors
Blog
Automate your SIEM with Sumo Logic in 7 clicks
Blog
How Clorox leverages Cloud SIEM across security operations, threat hunting, and IT Ops
Blog
How to monitor Amazon Aurora RDS logs and metrics
Blog
Everywhere in One Place: OpenTelemetry and Observability in Sumo Logic
Blog
Recommendations for monitoring SolarWinds supply chain attack with Sumo Logic Cloud SIEM
Blog
Automatic correlation of FireEye red team tool countermeasure detections
Blog
Application Performance Management for Microservices with Sumo Logic
Blog
How to Monitor Amazon Redshift
Blog
Building your modern cloud SIEM
Blog
Pondering Dogs and Observability
Blog
Monitoring Microsoft SQL Best Practices
Blog
Onboard your tracing data to Sumo Logic even faster with AWS Distro for OpenTelemetry (now in preview)
Blog
Monitor AWS Lambda functions created from container images
Blog
Sumo Logic partners with AWS to monitor Amazon EKS Distro
Blog
6 Signals that you need SOAR [Infographic]
Blog
How Sumo Logic’s Cloud SIEM Uses MITRE ATT&CK to Develop Content
Blog
Insights from the 5th annual Continuous Intelligence Report
Blog
Full VPC traffic visibility with AWS Network Firewall and Sumo Logic
Blog
How to use Lambda extensions with Sumo Logic to reduce operational overhead and improve performance
Blog
How to Monitor Akamai Logs
Blog
Data security a major concern in healthcare: How to prevent data breaches with SOAR
Blog
The Dramatic Intersection of AI, Data and Modern Life
Blog
Creepy or Unjust: The State of Data in the U.S.
Blog
How to Monitor MongoDB Logs
Blog
Automated Tech Perpetuates the Digital Poorhouse
Blog
IoT cybersecurity in healthcare: How it can be improved with SOAR?
Blog
SOC vs. CSIRT - understanding the difference
Blog
SOAR guide #3: How to maximize your SOAR investment
Blog
How to analyze IIS logs for better monitoring
Blog
Introducing the Sumo Logic Observability suite with distributed tracing - a cornerstone of cloud-native APM
Blog
Security automation vs. security orchestration - what's the difference?
Blog
Illuminate 2020 Keynote: The What, Where and Why of Issues that Affect Reliable Customer Experiences
Blog
National Cyber Security Awareness month 2020 - The importance of SOAR
Blog
Modern App Reliability with Sumo Logic Observability
Blog
Building better software faster - the key to successful digital transformation
Blog
A New Framework for Modern Security
Blog
Building Better Apps: The Open Source Partner Ecosystem
Blog
Kubernetes Security
Blog
PostgreSQL vs MySQL
Blog
Gartner’s 2020 SOAR Market Guide in a nutshell
Blog
Kubernetes Dashboard
Blog
NGINX Log Analyzer
Blog
SOAR guide #2: Taking security operations to the next level
Blog
Leveraging logs to better secure cloud-native applications
Blog
How security automation and orchestration helps you work smarter and improve Incident Response
Blog
Logging and Monitoring Kubernetes
Blog
Get Started with Kubernetes
Blog
Using Data to Find the Mysterious Centrist Voter
Blog
How Goibibo uses Sumo Logic to get log analytics at cloud scale
Blog
SOAR guide: The fundamentals of Security Orchestration, Automation and Response
Blog
Configuring the OpenTelemetry Collector
Blog
4 ways to distinguish a top SOAR platform
Blog
Can We Rely on Data to Predict the Outcome of the 2020 Election?
Blog
Integrating lessons learned into Incident Response
Blog
Kubernetes vs. Docker: What Does it Really Mean?
Blog
6 key steps to building a modern SOC
Blog
Kubernetes
Blog
9 key components of incident and forensics management
Blog
How Cloud SOAR helps higher education institutions prevent cyber attacks
Blog
Why measuring SOC-cess matters - Using metrics to enhance your security program
Blog
Emerging issues in cybersecurity for higher education institutions
Blog
Top 5 Reasons to Attend Illuminate Virtual 2020
Blog
5 common Security Orchestration, Automation and Response (SOAR) use cases
Blog
SOAR to the sky: Discover the power of next-gen progressive automation
Blog
Simplifying log management with logging as a service
Blog
Detecting Windows Persistence
Blog
5 reasons why SOAR is a must-have technology for every high-functioning MSSP
Blog
AWS Observability: Designed specifically for AWS environments
Blog
Observability: The Intelligence Economy has arrived
Blog
How to Use the New Sumo Logic Terraform Provider for Hosted Collectors
Blog
Sumo Logic Achieves FedRAMP-Moderate “In Process”
Blog
Five critical components of SOAR technology
Blog
Distributed tracing analysis backend that fits your needs
Blog
Deploying AWS Microservices
Blog
Gartner SOAR Magic Quadrant: The best of Cloud SOAR is yet to come
Blog
Sumo Logic and ZeroFOX Join Forces to Improve Visibility and Protect your Public Attack Surface
Blog
Microservices vs. Service Oriented Architecture (SOA)
Blog
3 core pillars of a SOAR Solution
Blog
Announcing new Sumo Logic dashboards
Blog
Rethinking Modern SOC Workflow
Blog
Gartner analysis: Why SOAR is the technology for the future
Blog
Reduce AWS bills with aws-nuke
Blog
What Data Types to Prioritize in Your SIEM
Blog
Cloud SIEM: Getting More Out of Your Threat Intelligence - 3 Use Cases for IOCs
Blog
5 Ways SOAR improves collaboration within a SOC team
Blog
Building a Security Practice Powered by Cloud SIEM
Blog
The automation hype is real for SOC teams: unpacking the Dimensional Research “2020 State of SecOps and Automation” report
Blog
Distributed Tracing & Logging - Better Together
Blog
Defense in depth: DoublePulsar
Blog
How SOAR improves the performance of а SOC team
Blog
Improving Application Quality through Log Analysis
Blog
Domain Hijacking Impersonation Campaigns
Blog
Continuous Intelligence for Atlassian tools and the DevSecOps Lifecycle (Part 2)
Blog
The Path of an Outlaw, a Shellbot Campaign
Blog
The power of new-age playbooks in Incident Response
Blog
Gaining Visibility Into Edge Computing with Kubernetes & Better Monitoring
Blog
Why cloud-native SIEM is vital to closing the security skills gap
Blog
How SOAR improves Standard Operating Procedures (SOP)
Blog
Standard Operating Procedures as big piece of the cyber Incident Response puzzle
Blog
The value of a stolen account. A look at credential stuffing attacks.
Blog
The Difference Between IaaS, Paas, and SaaS
Blog
Artificial intelligence and machine learning in cybersecurity
Blog
SOAR takes over where detection starts: Understanding the role of SOAR in Standard Operating Procedures
Blog
A Million Dollar Knob: S3 Object Lifecycle Optimization
Blog
The difference between playbooks and runbooks in Incident Response
Blog
The 7 Essential Metrics for Amazon EC2 Monitoring
Blog
Continuous Intelligence for Atlassian tools and the DevSecOps Lifecycle (Part 1)
Blog
Monitoring MySQL Performance Metrics
Blog
SOAR trends in 2020: What does the future look like for SOAR?
Blog
MySQL Log File Location
Blog
Independent Survey Reveals: Continuous Intelligence Demand Grows as Organizations Shift to Real-time Business
Blog
Service Mesh Comparison: Istio vs. Linkerd
Blog
Profiling "VIP Accounts" Part 2
Blog
The importance of evidence preservation in incident response
Blog
7 Key DevOps Principles
Blog
DevOps Automation: Best Practices and Benefits
Blog
How to Build a DevOps Pipeline
Blog
Utilizing Cloud SOAR to manage IT and OT and strengthen the cybersecurity posture
Blog
NoSQL-based stacks exposed to the Internet
Blog
Spam In the Browser
Blog
Adopting Distributed Tracing: Finding the Right Path
Blog
Profiling “VIP Accounts” Part 1
Blog
Best Practices for Logging in AWS Lambda
Blog
How SOAR improves EDR in SOC processes
Blog
Sumo Logic and NIST team up to secure energy sector IoT
Blog
AWS Lambda Monitoring - what to keep an eye on with serverless
Blog
Remote Admin Tools (RATs): The Swiss Army Knives of Cybercrime
Blog
The cost of cybersecurity solutions vs. the cost of cyber attacks
Blog
How SOAR helps PSPs effectively comply with PSD2 regulations
Blog
The New Opportunity
Blog
How to scale Prometheus monitoring
Blog
Limitless analytics for all your data, at a price that fits your budget
Blog
“Fiel-ding Good” - Three great ways to enrich AWS logs in Sumo Logic
Blog
Triage fraudulent transactions with Cloud SOAR
Blog
5 questions to ask before investing in a SOAR solution
Blog
Sumo Logic Recognized as Data Analytics Solution of the Year Showcasing the Power of Continuous Intelligence
Blog
How SOAR helps protect remote workers from cyber threats
Blog
Best Practices for Data Tagging, Data Classification & Data Enrichment
Blog
COVID-19 crisis management guide for business leaders
Blog
PowerShell and ‘Fileless Attacks’
Blog
Monitoring with Prometheus vs Grafana: Understanding the Difference
Blog
Ensure a secure and reliable Zoom video conferencing service
Blog
How to Monitor Amazon ECS
Blog
Addressing the lack of qualified cybersecurity professionals - What can we do about it?
Blog
Top 5 security challenges with Zoom video conferencing
Blog
COVID-19 Guide for Security Professionals
Blog
4 core functions of a Security Orchestration, Automation and Response (SOAR) solution
Blog
Where will SOAR go in the next 5 years?
Blog
Love In The Time Of Coronavirus
Blog
Sumo Logic Announces Continuous Intelligence for Atlassian Tools
Blog
How SOAR can foster efficient SecOps in modern SOCs
Blog
Alcide kAudit Integrates with Sumo Logic
Blog
Work from home better with secure and reliable enterprise service
Blog
FedRAMP Joint Authorization Board (JAB) Prioritizes Sumo Logic for P-ATO
Blog
How to manage cyber fraud with SOAR
Blog
Best Practices for CSOs to Navigate Today’s Uncertain World
Blog
The top 5 challenges faced by Security Operations Centers
Blog
How does Sumo Logic’s Cloud SOAR compare to other SOAR solutions?
Blog
Amazon VPC Traffic Mirroring
Blog
Automation in cybersecurity: Benefit or a threat?
Blog
What is Amazon ECS?
Blog
CASB vs Cloud SIEM for SaaS Security
Blog
SOAR for Success: How to properly measure KPIs for security operations
Blog
In A Fast Changing World, Peer Benchmarks Are A GPS
Blog
What is SOAR? A comprehensive guide on how SOAR emerged in the cybersecurity world
Blog
A Healthy Outlook on Security From RSA Conference 2020
Blog
5 key benefits of a SOAR solution for MSSPs
Blog
Securing IaaS, PaaS, and SaaS in 2020 with a Cloud SIEM
Blog
A New Integration between Sumo Logic and ARIA Cybersecurity Solutions
Blog
Pre-RSA Twitter Poll: 3 Interesting Observations on SOC, SIEM and Cloud
Blog
How to implement Incident Response automation the right way
Blog
SIEM Yara Rules
Blog
How to Secure Office365 with Cloud SIEM
Blog
How We Understand Monitoring
Blog
Securing your SaaS apps in 2020: 3 pillars you can’t neglect
Blog
How to Monitor EKS Logs
Blog
The total business impact of Sumo Logic Cloud SIEM
Blog
How Data Analytics Support the CDM Program
Blog
Tracking Systems Metrics with collectd
Blog
Understanding the Apache Access Log: View, Locate and Analyze
Blog
AWS offers 175 services now. Should you be adopting many of them now?
Blog
Can You Tell Debug Data and BI Data Apart?
Blog
What is Amazon Elastic Kubernetes Service (EKS)?
Blog
Top 5 Cybersecurity Predictions for 2020
Blog
The Ultimate Guide to Windows Event Logging
Blog
How to View Logs in Kubectl
Blog
All The Logs For All The Intelligence
Blog
Vagrant vs. Docker: Which Is Better for Software Development?
Blog
NGINX vs Apache - Which Web Server Is Right for You?
Blog
Sumo Logic and Amazon Web Services Continue to Help Businesses Thrive in the Cloud Era
Blog
The New Sumo Logic AWS Security Quick Start
Blog
New Sumo Logic Apps with support for AWS Hierarchies
Blog
Announcing Sumo Logic Archive Intelligence Service now in Beta
Blog
Monitor Cloud Run for Anthos with Sumo Logic
Blog
How to Monitor Redshift Logs with Sumo Logic
Blog
How to Monitor AWS CloudTrail Logs with Sumo Logic
Blog
AWS S3 Monitoring with Sumo Logic
Blog
Top 10 SIEM Best Practices
Blog
Multi-Cloud is Finally Here!
Blog
Data Privacy Is Our Birthright - national cybersecurity month
Blog
How to Monitor AWS S3
Blog
Context is Everything - How SPS Commerce uses context to embrace complexity
Blog
What is AWS S3
Blog
How Informatica Confidently Migrates to Kubernetes with Sumo Logic
Blog
How Doximity solved their high operational overhead of their Elastic stack with Sumo Logic
Blog
5 business reasons why every CIO should consider Kubernetes
Blog
Kubernetes DevSecOps with Sumo Logic
Blog
How to Monitor Amazon Redshift
Blog
5 Tips for Preventing Ransomware Attacks
Blog
How to Collect Kubernetes Data
Blog
We Live in an Intelligence Economy - Illuminate 2019 recap
Blog
Cloud Scale Correlation and Investigation with Cloud SIEM
Blog
Service Levels––I Want To Buy A Vowel
Blog
Serverless Computing for Dummies: AWS vs. Azure vs. GCP
Blog
Why Traditional Kubernetes Monitoring Solutions Fail
Blog
How to Secure Kubernetes Using Cloud SIEM?
Blog
Serverless Computing Security Tips
Blog
10 Modern SIEM Use Cases
Blog
Challenges of Monitoring and Troubleshooting in Kubernetes Environments
Blog
More Innovations from Sumo Logic that Harnesses the Power of Continuous Intelligence for Modern Enterprises
Blog
Monitoring Slack workspaces with the Sumo Logic app for Slack
Blog
A 360 degree view of the performance, health and security of MongoDB Atlas
Blog
Reimagining Observability: Announcing Sumo Logic’s new Kubernetes Solution
Blog
Monitor your Google Anthos clusters with the Sumo Logic Istio app
Blog
Helping solve the Kubernetes challenge: Sumo Logic at the helm
Blog
Sumo Logic’s World Class Partner and Channel Ecosystem Experiences Triple Digit Growth
Blog
6 Observations from the 2019 CI Report: State of Modern Applications and DevSecOps In The Cloud
Blog
What is PCI DSS compliance?
Blog
Objectives-Driven Observability
Blog
Peering Inside the Container: How to Work with Docker Logs
Blog
Security Strategies for Mitigating IoT Botnet Threats
Blog
How to Read, Search, and Analyze AWS CloudTrail Logs
Blog
Serverless vs. Containers: What’s the Same, What’s Different?
Blog
How to Monitor Syslog Data with Sumo Logic
Blog
Know Your Logs: IIS vs. Apache vs. NGINX Logs
Blog
Multi-Cloud Security Myths
Blog
What is Amazon Redshift?
Blog
See You in September at Illuminate!
Blog
Sumo Logic adds Netskope to its Security and Compliance Arsenal
Blog
How to SIEMplify through Cloud SIEM
Blog
Illuminate 2019 Stellar Speaker Line-up Will Help Attendees See Business and the World Differently Through Data Analytics
Blog
How to Monitor Fastly CDN Logs with Sumo Logic
Blog
How to Monitor NGINX Logs with Sumo Logic
Blog
To SIEM or not to SIEM?
Blog
Cloud Security: What It Is and Why It’s Different
Blog
How to Monitor Fastly Performance
Blog
Gartner is fully in the cloud. Are you?
Blog
How to monitor NGINX logs
Blog
Why you need to secure your AWS infrastructure and workloads?
Blog
What is AWS CloudTrail?
Blog
6 steps to secure your workflows in AWS
Blog
Machine Data is Business Intelligence for Digital Companies
Blog
Launching the AWS security threats benchmark
Blog
3 key takeaways on Cloud SIEM from Gartner Security & Risk Management Conference 2019
Blog
Sumo Logic provides real-time visibility, investigation and response of G Suite Alerts
Blog
What is NGINX?
Blog
What is Fastly CDN?
Blog
Industry Analysts Recognizing Cloud Analytics Brings Wave of Disruption to the SIEM Market
Blog
Now FedRAMP Ready, Sumo Logic Empowers Public Organizations
Blog
What is Database Security?
Blog
The Super Bowl of the Cloud
Blog
The Cloud SIEM market is validated by Microsoft, Google, and AWS
Blog
Clearing the Air: What Is Cloud Native?
Blog
Key Metrics to Baseline Cloud Migration
Blog
Typing a useReducer React hook in TypeScript
Blog
What is IoT Security?
Blog
Recycling is for Cardboard, not Analytics Tools
Blog
How to Monitor Apache Web Server Performance
Blog
IIS Logs Location
Blog
Software visibility is the key to innovation
Blog
What is Apache? In-Depth Overview of Apache Web Server
Blog
The Why Behind Modern Architectures
Blog
Control Your Data Flow with Ingest Budgets
Blog
From SRE to QE - Full Visibility for the Modern Application in both Production and Development
Blog
Sumo Logic Cert Jams Come to Japan
Blog
Best Practices with AWS GuardDuty for Security and Compliance
Blog
People-driven Documentation
Blog
Improve Alert Visibility and Monitoring with Sumo Logic and Opsgenie
Blog
What is AWS GuardDuty?
Blog
Platforms All The Way Up & Down
Blog
What is Serverless Architecture?
Blog
How Sumo Logic Maps DevOps Topologies
Blog
Endpoint Security Analytics with Sumo Logic and Carbon Black
Blog
RSAC 19 Partner Cam: Sumo Logic & PagerDuty Deliver Seamless SecOps
Blog
AWS 101: An Overview of Amazon Web Services
Blog
Building Cross-platform Mobile Apps
Blog
Sumo Logic Expands into Japan to Support Growing Cloud Adoption
Blog
The Key Message from KubeCon NA 2018: Prometheus is King
Blog
Recapping the Top 3 Talks on Futuristic Machine Learning at Scale By the Bay 2018
Blog
Sumo Logic Experts Reveal Their Top Enterprise Tech and Security Predictions for 2019
Blog
SnapSecChat: Sumo Logic's CSO Explains the Next-Gen SOC Imperative
Blog
How to Analyze Game Data from Killer Queen Using Machine Learning with Sumo Logic Notebooks
Blog
The Insider’s Guide to Sumo Cert Jams
Blog
Understanding the Impact of the Kubernetes Security Flaw and Why DevSecOps is the Answer
Blog
Careful Data Science with Scala
Blog
Why European Users Are Leveraging Machine Data for Security and Customer Experience
Blog
Announcing Extended AWS App Support at re:Invent for Security and Operations
Blog
Complete Visibility of Amazon Aurora Databases with Sumo Logic
Blog
The Latest Trends for Modern Apps Built on AWS
Blog
Comparing a Multi-Tenant SaaS Solution vs. Single Tenant
Blog
An Organized Workflow for Prototyping
Blog
Understanding Transaction Behavior with Slick + MySQL InnoDB
Blog
Exploring Nordcloud’s Promise to Deliver 100 Percent Alert-Based Security Operations to Customers
Blog
Strategies for Managing Long-running API Calls with RxJS
Blog
Near Real-Time Log Collection From Amazon S3 Storage
Blog
SnapSecChat: Sumo Logic CSO Recaps HackerOne's Conference, Security@
Blog
Illuminate 2018 Product Update Q&A with Sumo Logic CEO Ramin Sayar
Blog
How to Triage Test Failures in a Continuous Delivery Lifecycle
Blog
Gain Visibility into Your Puppet Deployments with the New Sumo Logic Puppet App
Blog
Pokemon Co. International and Sumo Logic's Joint Journey to Build a Modern Day SOC
Blog
The 3 Phases Pitney Bowes Used to Migrate to AWS
Blog
Exploring the Future of MDR and Cloud SIEM with Sumo Logic, eSentire and EMA
Blog
Accelerate Security and PCI Compliance Visibility with New Sumo Logic Apps for Palo Alto Networks
Blog
Artificial Intelligence vs. Machine Learning vs. Deep Learning: What's the Difference?
Blog
Illuminate 2018 Video Q&A with Sumo Logic CEO Ramin Sayar
Blog
Intrinsic vs Meta Tags: What’s the Difference and Why Does it Matter?
Blog
Why is Oracle and Microsoft SQL Adoption Low for Developers on AWS?
Blog
Why Decluttering Complex Data in Legends is Hard
Blog
5 Best Practices for Using Sumo Logic Notebooks for Data Science
Blog
How to Monitor Azure Services with Sumo Logic
Blog
Illuminate Day Two Keynote Top Four Takeaways
Blog
Illuminate Day One Keynote Top Five Takeaways
Blog
Announcing the Sumo Logic Global Intelligence Service at Illuminate 2018
Blog
Introducing Sumo Logic’s New Cloud SIEM Solution for Modern IT
Blog
Sumo Logic's Third Annual State of Modern Apps and DevSecOps in the Cloud Report is Here!
Blog
Why Cloud-Native is the Way to Go for Managing Modern Application Data
Blog
Top Reasons Why You Should Get Sumo Logic Certified, Now!
Blog
How Our Customers Influence the Sumo Logic Product
Blog
Understanding Sumo Logic Query Language Design Patterns
Blog
A Look Inside Being a Web UI Engineering Intern at Sumo Logic
Blog
Black Hat 2018 Buzzwords: What Was Hot in Security This Year?
Blog
Top Five Reasons to Attend Illuminate18
Blog
Get Miles Ahead of Security & Compliance Challenges in the Cloud with Sumo Logic
Blog
SnapSecChat: A DevSecOps Approach to Bug Bounties with Sumo Logic & HackerOne
Blog
Building Replicated Stateful Systems using Kafka as a Commit Log
Blog
Employee Spotlight: A Dreamer with a Passion for Product Design & Mentoring
Blog
Postmortems Considered Beautiful
Blog
11 New Google Cloud Platform (GCP) Apps for Continued Multi-Cloud Support
Blog
Sumo Smash Bros: What Creating a Video Game Taught Us About the Power of Data
Blog
A Primer on Building a Monitoring Strategy for Amazon RDS
Blog
Comparing AWS Data Warehouse & Analytics Services — Migrating to AWS Part 3
Blog
What is Blockchain, Anyway? And What Are the Biggest Use Cases?
Blog
Comparing Europe’s Public Cloud Growth to the Global Tech Landscape
Blog
React Tables: How to Evaluate Options and Integrate a Table into Your Project
Blog
Thoughts from Gartner’s 2018 Security & Risk Management Summit
Blog
Deadline to Update PCI SSL & TLS Looms, Are You Ready?
Blog
DevOps Redemption: Don't Let Outdated Data Analytics Tools Slow You Down
Blog
SnapSecChat: The Demand for Security as a Service
Blog
Log Management and Analytics for the AWS ELB Classic Service
Blog
Transform Graphite Data into Metadata-Rich Metrics using Sumo Logic’s Metrics Rules
Blog
Accelerate Data Analytics with Sumo Logic’s Logs-to-Metrics Solution
Blog
The Sumo Logic Advantage for the Analytics Economy
Blog
Monitoring Kubernetes: What to Monitor (Crash Course, Part 2)
Blog
Monitoring Kubernetes: The K8s Anatomy (Crash Course, Part 1)
Blog
Employee Spotlight: Exploring the Parallels Between Finance and DevSecOps Engineering
Blog
Gain Full Visibility into Microservices Architectures Using Kubernetes with Sumo Logic and Amazon EKS
Blog
Sumo Logic Partners with IP Intelligence Leader Neustar to Meet Growing Customer Needs at Scale
Blog
Comparing RDS, DynamoDB & Other Popular Database Services – Migrating to AWS Part 2
Blog
Join the Data Revolution - Listen to our New Masters of Data Podcast
Blog
Sumo Logic For Support and Customer Success Teams
Blog
Sumo Logic Announces Search Templates to Improve the Customer Experience with Better, Faster Application Insights
Blog
Call for Speakers for Illuminate 2018 Now Open!
Blog
SnapSecChat: Sumo Logic’s Chief Security Officer Ruminates on GDPR D-Day
Blog
Comparing AWS S3 and Glacier Data Storage Services - Migrating to AWS Part 1
Blog
How to Build a Scalable, Secure IoT Platform on GCP in 10 Days
Blog
Introducing New Content Sharing Capabilities for Sumo Logic Customers
Blog
SnapSecChat: RSA 2018 Musings from Sumo Logic's Chief Security Officer
Blog
Comparing Kubernetes Services on AWS vs. Azure vs. GCP
Blog
IRS 2018 Tax Day Website Outage: Calculating The Real Monetary Impact
Blog
Challenges to Traditional Cloud Computing: Security, Data, Resiliency
Blog
DevSecOps and Log Analysis: Improving Application Security
Blog
RSA CSO Corner: Okta & Sumo Logic Talk MFA, Minimizing Risk in the Cloud
Blog
RSA CSO Corner: Neustar & Sumo Logic Talk GDPR, IP Intelligence
Blog
Survey Data Reveals New Security Approach Needed for Modern IT
Blog
Sumo Logic's Dave Frampton Live on theCube at RSA
Blog
Log Analysis on the Microsoft Cloud
Blog
RSA CSO Corner: Twistlock & Sumo Logic Talk GDPR, Container Security
Blog
RSA CSO Corner: CloudPassage & Sumo Logic Talk DevSecOps, Cloud Security
Blog
RSA Video: GDPR Flash Q&A with Sumo Logic Execs
Blog