Sumo Logic Features
Response (10)
Resolution Automation
Diagnose and resolve incidents without the need for human interaction.
Resolution Guidance
Guide users through the resolution process and give specific instructions to remedy individual occurrences.
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Threat Intelligence
Gathers information related to threats in order to gain further information on remedies.
Alerting
Clearly notifies users with relevant information and anomalies in a timely manner.
Performance Baselin
Sets a standard performance baseline by which to compare log activity.
High Availability/Disaster Recovery
Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities.
Dashboards and Visualization
Incident Alerting
Root Cause Analysis (RCA)
Records (3)
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Resource Usage
Analyzes recurring incidents and remedies to ensure optimal resource usage.
Management (3)
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Database Management
Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.
Workflow Management
Administrators can organize workflows to guide remedies to specific situations incident types.
Network Management (3)
Activity Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
Provides security information and stores the data in a secure repository for reference.
Incident Management (3)
Event Management
Alerts users of incidents and allows users to intervene manually or triggers an automated response.
Automated Response
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reporting
Documents cases of abnormal activity and compromised systems.
Security Intelligence (4)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Advanced Analytics
Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Monitoring (14)
Usage Monitoring
Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste.
Database Monitoring
Monitors performance and statistics related to memory, caches and connections.
API Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Real-Time Monitoring - Cloud Infrastructure Monitoring
Constantly monitors system to detect anomalies in real time.
Security and Compliance Monitoring
Enables monitoring of security and compliance standards across cloud infrastructure.
Performance Baselines
Performance Analysis
Performance Monitoring
AI/ML Assistance
Multi-System Monitoring
Resource utilization
Optimizes resource allocation.
Real-time monitoring
Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time.
Performance baseline
Sets up standard performance baseline to compare live container activities.
API monitoring
Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Administration (7)
Activity Monitoring
Actively monitor status of work stations either on-premise or remote.
Multi-Cloud Management
Allows users to track and control cloud spend across cloud services and providers.
Automation
Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements.
Auto-Scaling & Resource Optimization
Automatically scales resources based on demand and optimizes for performance and cost.
Security Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Integration
Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
Allows users to track and control activity across cloud services and providers.
Analysis (13)
Reporting
Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Spend Forecasting and Optimization
Ability to project spend based on contracts, usage trends, and predicted growth.
Track Trends
Allows user to track log trends.
Detect Anomalies
Identify and predict anomalies in real-time with outlier detection and uncover root-causes
Metric and Event Data
Analyze both metric and event data on the same platform regardless of source or structure
Search
Search your logs for troubleshooting and open-ended exploration of your data
Alerts
Create alerts based on search patterns, thresholds for specific log metrics, or other conditions
Live Tail
See your data, in real time, streaming into the system from multiple data sources
Search
Allows users to search logs for troubleshooting and open-ended exploration of data.
Reporting
Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
Visualization
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Track trends
Allows users to track log trends.
Visibility (3)
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Alerts and Notifications
Clearly notifies users with relevant information and anomalies in a timely manner.
Reporting
Creates reports outlining log activity and relevant metrics.
Monitoring and Management (3)
Automation
Automatically allocates resources to address log anomalies.
Performance Baseline
Sets a standard performance baseline by which to compare log activity.
Real-Time Monitoring
Constantly monitors logs to detect anomalies in real time.
Automation (6)
Workflow Mapping
Visually displays connected applications and integrated data. Allows customization and management of workflow structures.
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Log Monitoring
Constantly monitors logs to detect anomalies in real time.
Resolution automation
Diagnoses and resolves incidents without the need for human interaction.
Automation
Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements.
Orchestration (4)
Security Orchestration
Integrates additional security tools to automate security and incident response processes.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Data Visualization
Offer pre-built and custom reporting and dashboards for quick insights into system states.
Activity Monitoring (4)
Usage Monitoring
Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste.
Database Monitoring
Monitors performance and statistics related to memory, caches and connections.
API Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Activity Monitoring
Actively monitors status of work stations either on-premise or remote.
Security (3)
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Risk Analysis
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Reporting
Creates reports outlining log activity and relevant metrics.
Data Preparation (4)
Data Sources
Automatically collect logs from all your services, applications, and platforms
Indexing
Automate the indexing of machine data that's critical to your operations
Automated Tagging
See log data in context with automated tagging and correlation
Data Blending
Mix and match data from apps, hosts, containers, services, networks, and more
Visualization (2)
Dashboards
Visualize log data on dashboards
Data Discovery
Drill down and explore data to discover new insights
Responses (3)
Personalization
Provides personalized responses to interlocator based on segmentation or past responses.
Route To Human
Has tools (e.g. dashboards and reports) to better understand conversations Intelligent Virtual Assistants have had.
Natural Language Understanding (NLU)
Can have a natural, human-like conversation with an interlocator.
Platform (3)
Conversation Editor
Allows business to edit conversations to meet the unique needs of one's business.
Integration
Gives users the ability to update systems, like CRM, based on conversations.
Human-In-The-Loop
Allows users to maintain and observe the accuracy and viability of Intelligent Virtual Assistants.
Performance (2)
Real User Monitoring (RUM)
Captures and analyzes each transaction by users of a website or application in real time.
Second by Second Metrics
Provides high-frequency metrics data.
Functionality (4)
Synthetic Monitoring
Monitors and test apps to address issues before they affect end users.
Dynamic Transaction Mapping
Provides dynamic end-to-end maps of every single transaction.
Load Balancing
Automatically adjusts resources base on application usage.
Cloud Observability
Monitors cloud microservices, containers, kubernetes, and other cloud native software.
Alerts management (3)
Multi-mode alerts
Alerts over email, text, phone call, or more to multiple parties.
Opimization alerts
Provides information related to unnecessary spending and unused resources.
Incident alerts
Gives alerts when incidents arise.
Issue Resolution (3)
Root cause identification
Directly identifies, or increases identification speed for, root causes for container issues.
Resolution guidance
Provides paths, suggestions, or other general assistance towards issue resolution.
Proactive identification
Proactively identifies trends on container systems that could lead to failures or errors.
Generative AI (4)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Automation - AI Agents (5)
Sales Follow-Up
Allows users to automate responses to customer inquiries across various channels.
Customer Interaction Automation
Allows users to automate responses to customer inquiries across various channels.
Lead Generation
Allows users to automate the process of generating and qualifying sales leads.
Document Processing
Allows users to automate the handling, processing, and management of documents.
Feedback Collection
Provides users the ability to automate the collection and analysis of feedback from customers, employees, or other stakeholders.
Autonomy - AI Agents (4)
Independent Decision Making
Allows the AI agent to learn from interactions and adapt its responses accordingly.
Adaptive Responses
Allows the AI agent to learn from interactions and adapt its responses accordingly.
Task Execution
Provides the AI agent the ability to execute tasks without requiring constant user input.
Problem Solving
Allows the AI agent to identify and resolve issues without user intervention.
Telemetry Collection & Ingestion - Observability (2)
Multi-Telemetry Ingestion
Ingests and processes multiple telemetry types, such as logs, metrics, and traces.
OpenTelemetry Support
Supports ingestion and standardization of observability data via OpenTelemetry protocol.
Visualization & Dashboards - Observability (3)
Service Dependency Mapping
Displays relationships between services to visualize system dependencies.
Unified Dashboard
Provides a consolidated view of system-wide telemetry in a single dashboard.
Trace Visualization
Allows users to explore and visualize distributed traces and span relationships.
Correlation & Root Cause Analysis - Observability (3)
Cross-Telemetry Correlation
Correlates logs, metrics, and traces to surface performance patterns and root causes.
Root Cause Detection
Identifies likely causes of issues using system insights and correlation logic.
Intelligent Alerting
Automatically alerts users to anomalies or critical events using contextual data.
Scalability & Ecosystem Integration - Observability (2)
Kubernetes Monitoring
Provides observability into containerized workloads and Kubernetes clusters.
Hybrid/Multi-Cloud Support
Enables observability across public cloud, private cloud, and on-prem environments.
AI Features - Observability (3)
Predictive Insights
Forecasts future system issues based on historical performance trends.
AI-Generated Incident Summaries
Summarizes incident root causes and potential fixes using generative AI.
AI Anomaly Detection
Uses machine learning to detect unusual behavior across telemetry data.
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Application Performance Monitoring (APM) (5)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Log Analysis (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud Infrastructure Monitoring (6)
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Log Monitoring (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
AI Automation - Cloud Infrastructure Monitoring (2)
AI-Powered Anomaly Detection
Utilizes machine learning to automatically detect and alert on unusual patterns in infrastructure metrics.
AI-Driven Insight Recommendations
Provides AI-generated insights and actionable recommendations to optimize resource performance and cost.
Agentic AI - Observability Software (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives






