Open source has come a long way. One of my favorite reports on the subject is Red Hat’s State of Enterprise Open Source. For 2020, 95% of respondents said that open source is strategically important to their business needs. Here, I will be recapping my recent Illuminate presentation about embracing open source data collection and I thought it’s important to first talk about how open source has changed.
Troubleshooting incidents in a modern AWS app is challenging given the diversity of AWS services in use and the dependencies between them. This customer session will lead AWS infra/DevOps engineers and SREs through a root cause exploration methodology and best practices that will reduce time to resolution.
Ever wondered how you compare with the rest of the industry when it comes to AWS services and security? Come see what Sumo Logic has to offer with our Global Intelligence Service for AWS. If you attended either our “Getting started with security at Sumo Logic” or “Leveraging the Sumo Logic platform for security and compliance” sessions, you’ll definitely want to see this unique capability in action!
Discover new ways to leverage Sumo Logic to assist your organization with achieving compliance toward cyber security frameworks, including NIST 800-53/171, HIPAA, ISO 27001, NIST CMMC, PCI-DSS, and SOX. By simply leveraging text panels within dashboards, you can simplify compliance by highlighting control elements covered by Sumo Logic queries. Save time spent on audit walkthroughs and measuring control effectiveness by using real-time compliance dashboards which can be easily shared with your internal and external auditors.
Advance your knowledge of how to leverage the Sumo Logic platform for security. We’ll discuss utilizing LogReduce/LogCompare, and our outlier functionality to determine anomalous activity around entities. You’ll learn how to take advantage of Sumo’s out-of-the-box content for security applications—including several new Work From Home solutions. In addition, we’ll walk through our native integration with CrowdStrike’s threat intelligence feed and how you can gain real-time dashboards and alerts. Finally, we’ll share how you can collapse your compliance use cases all in one place).