Best Cybersecurity Software for Sumo Logic

Find and compare the best Cybersecurity software for Sumo Logic in 2025

Use the comparison tool below to compare the top Cybersecurity software for Sumo Logic on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    60,425 Ratings
    See Software
    Learn More
    Google Cloud Platform offers an extensive range of cybersecurity solutions aimed at securing cloud assets, incorporating features such as encryption, identity management, and real-time threat detection. With resources like Google Cloud Armor for DDoS mitigation and the Cloud Security Command Center for comprehensive security analytics, GCP empowers organizations to protect their information and infrastructure effectively. New users are welcomed with $300 in complimentary credits, allowing them to explore, test, and implement workloads while assessing the platform's security capabilities to ensure their applications are well-protected. GCP’s security offerings are meticulously crafted to shield sensitive information across every aspect of the cloud, from data storage to application deployment. Additionally, Google adopts a layered security strategy, providing proactive measures that include automatic updates, vulnerability assessments, and management of access controls.
  • 2
    Airlock Digital Reviews
    See Software
    Learn More
    Airlock Digital delivers an easy-to-manage and scalable application control solution to protect endpoints with confidence. Built by cybersecurity professionals and trusted by organizations worldwide, Airlock Digital enforces a Deny by Default security posture to block all untrusted code, including unknown applications, unwanted scripts, malware, and ransomware.
  • 3
    Wiz Reviews
    See Software
    Learn More
    Wiz is a new approach in cloud security. It finds the most important risks and infiltration vectors across all multi-cloud environments. All lateral movement risks, such as private keys that are used to access production and development environments, can be found. You can scan for vulnerabilities and unpatched software in your workloads. A complete inventory of all services and software within your cloud environments, including version and package details, is available. Cross-reference all keys on your workloads with their privileges in your cloud environment. Based on a complete analysis of your cloud network, including those behind multiple hops, you can see which resources are publicly available to the internet. Compare your industry best practices and baselines to assess the configuration of cloud infrastructure, Kubernetes and VM operating system.
  • 4
    Orca Security Reviews
    Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world's most comprehensive coverage and visibility of risks across AWS, Azure, Google Cloud and Kubernetes.
  • 5
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,740 Ratings
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 6
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 7
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 8
    Dropzone AI Reviews

    Dropzone AI

    Dropzone AI

    $36,000/year
    Dropzone AI emulates the methods used by top-tier analysts to conduct thorough investigations for every alert without human intervention. This dedicated AI agent handles complete investigations autonomously, ensuring that all alerts are addressed comprehensively. Designed to mirror the investigative strategies employed by leading SOC analysts, its output is not only quick but also detailed and precise. Users have the added benefit of engaging with its chatbot for more in-depth discussions. The cybersecurity reasoning framework of Dropzone, uniquely developed using cutting-edge technology, executes a meticulous investigation for each alert. Its foundational training, contextual awareness of organizational specifics, and built-in safeguards contribute to its impressive accuracy. Ultimately, Dropzone produces a comprehensive report that includes a conclusion, an executive summary, and detailed insights presented in clear language. Moreover, the chatbot feature enhances user engagement by allowing for on-the-fly questions and clarifications.
  • 9
    Stream Security Reviews

    Stream Security

    Stream Security

    $8,000 per year
    Stay proactive against exposure threats and malicious actors by utilizing real-time detection of configuration changes and conducting automated threat investigations that integrate with your overall security posture and activities. Monitor every adjustment to uncover critical vulnerabilities and harmful combinations before they can be exploited by attackers. Harness the power of AI to effectively identify and remedy issues using your preferred approaches. Employ any of your favorite SOAR tools for immediate responses, or implement our recommended code snippets as needed. Strengthen your defenses to prevent external breaches and lateral movement threats by concentrating on genuinely exploitable risks. Identify harmful combinations of security posture and vulnerabilities while recognizing any gaps in segmentation intent to enforce a zero-trust model. Quickly address any cloud-related inquiries with contextual insights. Ensure compliance and avert any deviations from established protocols. We seamlessly integrate with your current investments and are ready to collaborate with your security teams to meet any specific requirements unique to your organization. Our commitment includes ongoing communication to enhance your security strategy effectively.
  • 10
    Armis Centrix Reviews
    Armis Centrix™ unifies cybersecurity operations by delivering continuous discovery, monitoring, and protection of every asset across complex hybrid networks. Its AI-powered intelligence engine enables security teams to detect unmanaged devices, assess vulnerabilities, and mitigate risks before attackers can exploit them. Organizations can manage IT systems, industrial OT environments, medical IoMT fleets, and IoT devices from a single platform with zero blind spots. The platform supports both on-premises and SaaS deployments, making it flexible for industries like healthcare, utilities, manufacturing, and critical infrastructure. VIPR Pro enhances the platform with automated remediation workflows, helping teams prioritize issues based on real-world threat activity. Early Warning intelligence provides insight into vulnerabilities actively being weaponized, ensuring organizations can act ahead of threats. Armis Centrix™ also improves business outcomes by increasing operational efficiency, supporting compliance, and strengthening resilience. Trusted by global enterprises and recognized by Gartner and GigaOm, Armis Centrix™ is built to meet the cybersecurity demands of modern digital environments.
  • 11
    Swimlane Reviews
    Swimlane Turbine is the world’s fastest and most scalable security automation platform. Turbine is built with the flexibility and cloud scalability needed for enterprises and MSSP to automate any SecOps process, from SOC workflows to vulnerability management, compliance, and beyond. Only Turbine can execute 25 million daily actions per customer, 17 times faster than any other platform, provider, or technology.
  • 12
    SeeMetrics Reviews
    Introducing a cutting-edge platform designed for cybersecurity performance management, enabling security leaders to monitor, analyze, and enhance their operations effectively. Access a comprehensive overview of your security program's performance from a single dashboard. Rely on a unified source to evaluate the effectiveness of your technology stack while identifying areas for improvement. Eliminate the hassle of gathering and merging data from various sources. Make decisions, strategize, and allocate resources based on concrete data rather than relying solely on instincts. With actionable insights regarding products, personnel, and budgets, you can optimize your corporate security strategies more effectively. Uncover vulnerabilities in your cyber resilience and performance through cross-product analyses and responses to real-time threats. Benefit from ready-to-use, dynamic metrics that can be easily communicated with non-technical stakeholders. With SeeMetrics’ agentless platform, you can seamlessly integrate all your current tools and start deriving valuable insights within just a few minutes, enhancing your security posture significantly. This streamlined approach not only saves time but also allows for a proactive stance against evolving cybersecurity challenges.
  • 13
    Mindflow Reviews
    Harness the power of hyper-automation on a large scale with user-friendly no-code solutions and AI-crafted workflows. Gain access to an unparalleled integration library that provides every tool you could possibly need. Simply select your desired service from the Integrations library and start automating your processes. You can onboard and establish your initial workflows in just a matter of minutes. If you require assistance, utilize pre-built templates, engage with the AI assistant, or take advantage of the resources available at the Mindflow excellence center. By entering your requirements in straightforward text, you allow Mindflow to handle everything else seamlessly. Generate workflows tailored to fit your technological environment from any given input. With Mindflow, you can create AI-generated workflows designed to tackle any scenario, significantly minimizing the time required for development. This platform revolutionizes enterprise automation by offering an extensive array of integrations. You can effortlessly incorporate any new tool into our system in mere minutes, effectively overcoming the limitations imposed by conventional integration methods. Furthermore, seamlessly connect and orchestrate your entire tech stack, regardless of the tools you choose to utilize, ensuring a more efficient operational flow.
  • 14
    Claroty Reviews
    Our platform, driven by Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, offers a comprehensive suite of industrial cybersecurity controls that integrate flawlessly with your current infrastructure, scale easily, and boast the lowest total cost of ownership (TCO) in the industry. These robust cybersecurity controls are built around the REVEAL, PROTECT, DETECT, CONNECT framework, ensuring you have the necessary tools to enhance your industrial cybersecurity, no matter your current stage in the journey. The Claroty Platform is utilized across various industries, each presenting its own specific operational and security challenges. Effective industrial cybersecurity begins with a clear understanding of what needs protection, and our platform eliminates the obstacles that hinder industrial networks from securely connecting to essential business operations, allowing for innovation while maintaining an acceptable risk threshold. By prioritizing security without sacrificing operational efficiency, our solution enables businesses to thrive in an increasingly complex digital landscape.
  • Previous
  • You're on page 1
  • Next