SaaS and Cloud Apps
Learn about the Sumo Logic apps for SaaS and Cloud applications.
1Password
1Password helps you monitor your 1Password account’s sign-in and item usage events.
Abnormal Security
Gain robust monitoring of email security threats.
Acquia
Gain visibility into your key Acquia platform components.
Airtable
Monitor and analyze your Airtable audit logs.
Akamai Cloud Monitor
Analyze and correlate Akamai data with origin data.
Akamai DataStream
Monitor and analyze the performance of Akamai Edge server
Armis
Monitor and manage your device security.
Asana
Monitor and analyze the Asana data to detect potential security threats related to user activity.
Atlassian
Monitor and analyze the critical events of Atlassian data.
Box
Gain insight into user behavior patterns and resources.
Cato Networks
Gain insight into the events and identify potential security threats with admin activities.
Cisco Meraki - C2C
Gain insights into the events and identify potential network events along with admin activities.
Cisco Umbrella
View analytics on DNS, Proxy, and Audit admin activities.
Citrix
Track configuration modifications impacting your environment and admins.
Cloudflare
Analyze logs, events, and trends from your websites and apps on the Cloudflare network.
CrowdStrike Falcon FileVantage
Monitor and analyze file integrity.
CrowdStrike FDR Host Inventory
Monitor and manage your device security.
CrowdStrike Spotlight
Gather real-time visibility into the vulnerabilities.
Digital Guardian ARC
Monitor, detect, and respond to critical events.
DocuSign
Monitor and secure your DocuSign account.
Dropbox
Monitor and analyze your Dropbox usage data.
Druva Cyber Resilience
Enhance your cybersecurity posture by providing real-time insights.
Fastly
Control how and where you serve content, and view performance analytics.
Gmail Trace Logs
Monitor spam, malware threats, and dropped or rejected messages.
Istio
Gain visibility into your Istio and control plane component performance.
Kandji
Identify security threats by analyzing threat events and device events.
KnowBe4
Monitor and analyze KnowBe4 Phishing Security logs.
LastPass
Identify security threats by analyzing audit events.
Microsoft Azure AD Inventory
Identify security threats by analyzing users and devices logs.
Microsoft Exchange Trace Logs
Monitor Delivered, Failed, Quarantined, Pending, and Spam messages.
Mimecast
Monitor and analyze Mimecast email data to identify potential threats and improve email security posture.
Microsoft Graph Security V1
Identify security threats by analyzing alert logs.
Microsoft Graph Security V2
Identify security threats by analyzing alert logs.
Miro
Monitoring and investigate Miro potential security threats.
MS Graph Azure AD Reporting
Monitor and analyze user activity, sign-in patterns and provisioning activities.
Opsgenie
Gain insight into your incidents and event handling operations.
PagerDuty V2
Monitor PagerDuty V2 incident data.
PagerDuty V3
Monitor PagerDuty V3 incident data.
Palo Alto Cortex XDR
Monitor and analyze alerts and incidents from Palo Alto Networks Cortex XDR platform.
Proofpoint on Demand
Analyze message logs and improve your security posture.
Proofpoint TAP
Analyze messages and clicks of malicious URLs to improve your security posture.
Qualys VMDR
Track errors, health, start-up progress, and cloud security.
Rapid7
Monitor asset and vulnerability management activities.
Salesforce
Analyze event logs generated by your Salesforce instance and apps.
SentinelOne
Monitor your organization's SentinelOne Threats and Agents logs.
Slack
Monitor analytics for your Slack users, channels, and access logs for workspaces.
Sophos
Identify security threats by analyzing alerts and events logs.
Symantec Web Security Service
Gain insights into the web traffic and identify potential security threats.
Tenable
Gain comprehensive visibility and actionable insights into your organization's security posture.
Webex
Monitor and analyse Webex security events, user activities, and system health.
Workday
Monitor Workday login activity, user activity, and admin activity.
Zendesk
Identify security threats by analyzing audit logs.
Zoom
Monitor your organization's Zoom performance, security, and user activity.