Skip to main content

SaaS and Cloud Apps

Learn about the Sumo Logic apps for SaaS and Cloud applications.

Thumbnail icon

1Password

1Password helps you monitor your 1Password account’s sign-in and item usage events.

icon

Abnormal Security

Gain robust monitoring of email security threats.

icon

Acquia

Gain visibility into your key Acquia platform components.

airtable-icon.png

Airtable

Monitor and analyze your Airtable audit logs.

icon

Akamai Cloud Monitor

Analyze and correlate Akamai data with origin data.

icon

Akamai DataStream

Monitor and analyze the performance of Akamai Edge server

armis-icon.png

Armis

Monitor and manage your device security.

asana-icon.png

Asana

Monitor and analyze the Asana data to detect potential security threats related to user activity.

atlassian-icon.png

Atlassian

Monitor and analyze the critical events of Atlassian data.

icon

Box

Gain insight into user behavior patterns and resources.

icon

Cato Networks

Gain insight into the events and identify potential security threats with admin activities.

icon

Cisco AMP

Monitor and analyze the host activity status and file types implicated in cybersecurity incidents.

icon

Cisco Meraki - C2C

Gain insights into the events and identify potential network events along with admin activities.

icon

Cisco Umbrella

View analytics on DNS, Proxy, and Audit admin activities.

citrix-cloud-icon

Citrix

Track configuration modifications impacting your environment and admins.

icon

Cloudflare

Analyze logs, events, and trends from your websites and apps on the Cloudflare network.

icon

CrowdStrike Falcon FileVantage

Monitor and analyze file integrity.

icon

CrowdStrike FDR Host Inventory

Monitor and manage your device security.

icon

CrowdStrike Spotlight

Gather real-time visibility into the vulnerabilities.

Thumbnail icon

Digital Guardian ARC

Monitor, detect, and respond to critical events.

Thumbnail icon

DocuSign

Monitor and secure your DocuSign account.

dropbox-icon.png

Dropbox

Monitor and analyze your Dropbox usage data.

dropbox-icon.png

Druva Cyber Resilience

Enhance your cybersecurity posture by providing real-time insights.

Thumbnail icon

Fastly

Control how and where you serve content, and view performance analytics.

icon

Gmail Trace Logs

Monitor spam, malware threats, and dropped or rejected messages.

icon

Istio

Gain visibility into your Istio and control plane component performance.

icon

Kandji

Identify security threats by analyzing threat events and device events.

icon

KnowBe4

Monitor and analyze KnowBe4 Phishing Security logs.

icon

LastPass

Identify security threats by analyzing audit events.

icon

Microsoft Azure AD Inventory

Identify security threats by analyzing users and devices logs.

icon

Microsoft Exchange Trace Logs

Monitor Delivered, Failed, Quarantined, Pending, and Spam messages.

icon

Mimecast

Monitor and analyze Mimecast email data to identify potential threats and improve email security posture.

icon

Microsoft Graph Security V1

Identify security threats by analyzing alert logs.

icon

Microsoft Graph Security V2

Identify security threats by analyzing alert logs.

icon

Miro

Monitoring and investigate Miro potential security threats.

icon

MS Graph Azure AD Reporting

Monitor and analyze user activity, sign-in patterns and provisioning activities.

icon

Opsgenie

Gain insight into your incidents and event handling operations.

icon

PagerDuty V2

Monitor PagerDuty V2 incident data.

icon

PagerDuty V3

Monitor PagerDuty V3 incident data.

icon

Palo Alto Cortex XDR

Monitor and analyze alerts and incidents from Palo Alto Networks Cortex XDR platform.

icon

Proofpoint on Demand

Analyze message logs and improve your security posture.

icon

Proofpoint TAP

Analyze messages and clicks of malicious URLs to improve your security posture.

icon

Qualys VMDR

Track errors, health, start-up progress, and cloud security.

icon

Rapid7

Monitor asset and vulnerability management activities.

Thumbnail icon

Salesforce

Analyze event logs generated by your Salesforce instance and apps.

sentinelone-icon.png

SentinelOne

Monitor your organization's SentinelOne Threats and Agents logs.

icon

Slack

Monitor analytics for your Slack users, channels, and access logs for workspaces.

icon

Sophos

Identify security threats by analyzing alerts and events logs.

icon

Symantec Web Security Service

Gain insights into the web traffic and identify potential security threats.

icon

Tenable

Gain comprehensive visibility and actionable insights into your organization's security posture.

icon

Webex

Monitor and analyse Webex security events, user activities, and system health.

icon

Workday

Monitor Workday login activity, user activity, and admin activity.

icon

Zendesk

Identify security threats by analyzing audit logs.

icon

Zoom

Monitor your organization's Zoom performance, security, and user activity.

Status
Legal
Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.