Operations | Monitoring | ITSM | DevOps | Cloud

October 2019

How to Read, Search, and Analyze AWS CloudTrail Logs

In a recent post, we talked about AWS CloudTrail and saw how CloudTrail can capture histories of every API call made to any resource or service in an AWS account. These event logs can be invaluable for auditing, compliance, and governance. We also saw where CloudTrail logs are saved and how they are structured. Enabling a CloudTrail in your AWS account is only half the task.

Data Privacy Is Our Birthright - national cybersecurity month

Never before in history has the concept of identity been so vital. To a large extent, everything we rely on to live our lives depends on who we are… or perhaps more accurately, who we can prove ourselves to be. Our data has come to be the standard by which we define ourselves. Because this identity-defining data is online, the protection of our data is of paramount importance.

How to Monitor AWS S3

In the first part of our AWS S3 series, we discussed what AWS S3 buckets are, the difference between S3 and EC2s, advantages of AWS S3 object storage, and AWS S3 API integration. In this next post, we’ll be covering AWS S3 Monitoring, including the importance of leveraging data and monitoring metrics, and how Sumo Logic provides insight into your infrastructure with S3 logs.

Context is Everything - How SPS Commerce uses context to embrace complexity

If there is one thing that all Software as a Service (SaaS) companies understand, it is the pressure of “being fired”, as SPS Commerce’s Andy Domeier puts it. SPS Commerce is a cloud-based supply chain management software company and Andy is a Senior Director of Technology there - so he knows what he is talking about. Part of the core value of buying SaaS solutions is that you are typically buying a subscription, which means that you can also cancel that subscription at some point.

What is AWS S3

Amazon Simple Storage Service, widely known as Amazon S3, is a highly scalable, fast, and durable solution for object-level storage of any data type. Unlike the operating systems we are all used to, Amazon S3 does not store files in a file system, instead it stores files as objects. Object Storage allows users to upload files, videos, and documents like you were to upload files, videos, and documents to popular cloud storage products like Dropbox and Google Drive.

How Informatica Confidently Migrates to Kubernetes with Sumo Logic

Informatica is an enterprise cloud data management company, which means they have a full suite of products that focus on data integration and data management. In fact, they are a leader in 5 different magic quadrants including Enterprise Integration Platform as a Service, Data Quality Tools, and Master Data Management Solutions.

How to Monitor Amazon Redshift

In the first post of our three-part Amazon Redshift series, we covered what Redshift is and how it works. For the second installment, we’ll discuss how Amazon Redshift queries are analyzed and monitored. Before we go deep into gauging query performance on Redshift, let’s take a quick refresher on what Amazon Redshift is and what it does.

5 Tips for Preventing Ransomware Attacks

You don't need to be a cybersecurity expert to know that ransomware attacks have become one of today's greatest IT security threats. From WannaCry to the attack against the city of Atlanta, major ransomware exploits have become so commonplace in the last few years that they may seem impossible to avoid. Fortunately, preventing ransomware is far from impossible. Let's take a look at a few strategies you can put in place to mitigate your risk of becoming part of the next ransomware statistic.

Tracking Malicious Activity across the Sumo Attack Lifecycle

In modern network security monitoring, it is not enough to just detect bad things happening. ROI of security operations is always under scrutiny. Security teams, when they exist, and their leadership (CISOs), continually struggle to get budget, at least until a public breach occurs.

How to Collect Kubernetes Data

Now that we understand what machine data is available to us, how do we get to this data? The good news is that Kubernetes makes most of this data readily available, you just need the right tool to gather and view it. The solution we will discuss here heavily utilizes open source tools for collection and data enrichment because of their deep integrations and overwhelming community support.

Pokemon - Next Generation SOC From Theory to Practice

This session will focus on developing a modern security operations center (SOC) from the ground up leveraging progressive technologies and process. Pokemon will cover the original plan and execution strategy over the past 18 months. They will also highlight Sumo Logic's role in both security architecture and operations and map the map ahead for both Sumo and our SOC.

Looker - A single source of truth in multi-source world

Richard Reinders at Looker shows us how you get to Sumo Logic as a single source of truth in a multi cloud environment? How do you ensure consistency? How do you keep your team from having to go into many different systems to get their answers? Finally, how do you get other teams invested in ensuring that what you built is maintained?

We Live in an Intelligence Economy - Illuminate 2019 recap

What a pleasure it was to see many of our customers at our Illuminate user conference, September 11-12. We had record attendance from customers, influencers, and partners. Our time was packed with keynotes, customer presentations (35 customer breakout sessions), certifications, sharing best practices, and time networking and having fun together.

Cloud Scale Correlation and Investigation with Cloud SIEM

Virtually every organization is a victim of cybercrime today. As the threat landscape evolves and proliferates, it’s necessary to prioritize the protection of data, customers’ privacy and brand reputation. Security directors must be prepared and equipped with the necessary tools to detect security events and address them accordingly at all times.