Skip to content

Commit

Permalink
DOCS-669 - Update "Logs for Security" section (#5040)
Browse files Browse the repository at this point in the history
* DOCS-669 - Update logs for security section

* Update docs/security/additional-security-features/index.md

Co-authored-by: Kim (Sumo Logic) <[email protected]>

---------

Co-authored-by: Kim (Sumo Logic) <[email protected]>
  • Loading branch information
jpipkin1 and kimsauce authored Feb 5, 2025
1 parent 3e622fe commit 18581b2
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 12 deletions.
5 changes: 1 addition & 4 deletions docs/security/additional-security-features/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,10 +5,7 @@ title: Logs for Security

import useBaseUrl from '@docusaurus/useBaseUrl';

Sumo Logic provides features that let you use logs for security use cases. You can use these features to:

* Collect security log and event data from your infrastructure and applications, on-premises and in-cloud.
* Analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries.
"Logs for Security" is Sumo Logic's full set of features that leverage logs for security use cases. First, you collect security log and event data from your infrastructure and applications, on-premises and in-cloud. Then, you analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries.

This section contains the following topics:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,14 +7,18 @@ description: Learn basic concepts about using logs for security use cases.

import useBaseUrl from '@docusaurus/useBaseUrl';

Sumo Logic permits you to leverage logs for security use cases, and includes apps, customizable dashboards, and tools to analyze your security data. This allows you to use Sumo Logic's core functionality, including data collection, ingestion, and storage, to produce findings that help protect your attack surfaces from threats.
"Logs for Security" is Sumo Logic's full set of features that leverage logs for security use cases. These features includes apps, customizable dashboards, and tools to analyze your security data. This allows you to use Sumo Logic's core functionality, including data collection, ingestion, and storage, to produce findings that help protect your attack surfaces from threats.

You can use Sumo Logic logs for:
* [Threat detection and investigation](/docs/security/additional-security-features/threat-detection-and-investigation). Identify and explore threats or security-related events within your assets, applications, or networks as quickly and effectively as possible.
* [Security data lake storage](/docs/security/additional-security-features/data-lake). Store your structured and unstructured data in a centralized repository so it can be easily accessed for analytics.
* [Audit and compliance](/docs/security/additional-security-features/audit-and-compliance). Audit your systems to ensure they are in compliance with the rules set by governments and regulatory organizations. This helps protect end users and keep information private and secure, in addition to outlining protocols in the event of a breach.
* [Application security](/docs/security/additional-security-features/application-security). Monitor your software development pipeline to ensure it is secure during the continuous integration/continuous deployment (CI/CD) process and production cycle.
* [Cloud infrastructure security](/docs/security/additional-security-features/cloud-infrastructure-security/). Monitor the health of your cloud infrastructure via a unified security and compliance audit view.
* [Cloud infrastructure security](/docs/security/additional-security-features/cloud-infrastructure-security/). Monitor the health of your cloud infrastructure via a unified security and compliance audit view.

:::note
After you have collected logs for security, you can use them with [Cloud SIEM](/docs/cse/) and [Cloud SOAR](/docs/cloud-soar/), our solutions for threat detection, investigation, and response.
:::

## The Sumo Logic data pipeline

Expand Down
10 changes: 4 additions & 6 deletions docs/security/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,12 +8,10 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
<img src={useBaseUrl('img/icons/security/security.png')} alt="Shield icon" width="60"/>

Sumo Logic's security solutions support the entire spectrum of security use cases, from security analytics to SIEM and SOAR:

| Cloud monitoring | Threat detection and investigation | Threat response |
| :-- | :-- | :-- |
| [Logs for Security](/docs/security/additional-security-features/) | [Cloud SIEM](/docs/cse/) | [Cloud SOAR](/docs/cloud-soar/) |
| Provides enhanced insight **for security analysts** into threat activity via logs. Collect security log and event data from your infrastructure and applications, on-premises and in-cloud. Analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries. | Gives **SOC (security operations center) analysts** prioritized and contextualized actionable threats with automated security workflows. Out-of-the-box automated detection reduces manual work, saving valuable resource time and enabling your team to be more effective by allowing them to focus on higher-value security functions. | Fully automates triage, investigation, and remediation of threats **for any security professional**. The open integrations framework allows you to connect to a multitude of third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR). |

* **[Logs for Security](/docs/security/additional-security-features/)**<br/>Provides enhanced insight for security analysts into threat activity via logs. Collect security log and event data from your infrastructure and applications, on-premises and in-cloud. Analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries.
* **Threat detection, investigation, and response**<br/>After you have collected logs for security, you can use them with the following solutions for threat detection, investigation, and response:
* **[Cloud SIEM](/docs/cse/)**<br/>Gives SOC (security operations center) analysts prioritized and contextualized actionable threats with automated security workflows. Out-of-the-box automated detection reduces manual work, saving valuable resource time and enabling your team to be more effective by allowing them to focus on higher-value security functions.
* **[Cloud SOAR](/docs/cloud-soar/)**<br/>Fully automates triage, investigation, and remediation of threats for any security professional. The open integrations framework allows you to connect to a multitude of third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR). |

## Security feature comparison

Expand Down

0 comments on commit 18581b2

Please sign in to comment.