Cloud

1/30/2018
10:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sumo Logic Acquires FactorChain, Targets Security Analytics for Cloud and Application Delivery

REDWOOD CITY, Calif. -- Jan. 23, 2018 -- Sumo Logic, the leading cloud-native, machine data analytics platform that delivers continuous intelligence, today announced it has acquired FactorChain, an early stage security company with a Security Investigation Platform which makes transformational improvements in speed and depth of threat investigations, enabling resolution of complex threats spanning both IT and security in minutes instead of hours. Combined with Sumo Logic’s machine data analytics strength across the cloud infrastructure, platform, and application layers, this acquisition accelerates the development of a new class of converged IT Ops and Security solutions which are essential for modern application delivery in the cloud.

“We are seeing more and more digital businesses struggling to adapt traditional security models to cloud and modern application delivery,” said Ramin Sayar, CEO of Sumo Logic. "Resolving which threats to assess in the avalanche of alerts and how to quickly resolve them is a challenging enough problem in traditional IT environments, but in the dynamic large scale cloud environment this problem can’t possibly be answered without new thinking in security analytics and operations. The FactorChain acquisition accelerates our vision of a new model which converges operations and security in the cloud and provides innovative solutions to persistent challenges in investigation workflows at cloud scale. We’re thrilled to welcome the team onboard to drive our shared vision and disrupt traditional legacy SIEM markets moving too slowly to keep pace with accelerating cloud transitions.”

Cloud and Modern Application Delivery Requires New Model for Security

Traditional approaches of siloed information, systems, and staff are not keeping pace with the scale or rate of change in dynamic modern cloud application delivery. Fundamental challenges with understanding application and cloud data with existing tools and skill sets, resolving IT vs. security symptoms and root causes, and quickly triangulating across cloud scale data sets to resolve threats are preventing the natural extension of traditional methods to the cloud. Further, DevOps models require security to align traditional centralized, backlog approaches to threat investigation to new rapid response, distributed and democratized models. Along with scope of workflow and insight, fundamental breakthroughs are needed in data search, navigation, and human-machine collaboration to enable the velocity demanded by these new models.

“We have redesigned our security defense in several fundamental areas to scale the defense of our cloud service and applications - traditional concepts of rigid, centralized security operations centers with cumbersome SIEM infrastructure have given way to decentralized agile models which blend workflows and insight across operations and security,” said Jarrod Sexton, Lead Security Engineer at Genesys. “Sumo Logic has been instrumental in converging these two worlds for us, and having seen FactorChain’s investigation platform and integration plans we are enthusiastic to see the company innovating to address the next wave of unsolved pain points in cloud security.”

As part of Sumo Logic security analytics solution, FactorChain’s investigation platform will integrate completely into Sumo’s SaaS Machine Data Analytics Platform, providing step function improvements in speed, accuracy, and retained learning of threat investigation workflows across IT and Security. Integrated data, analytics, and workflow will enable analysts to resolve complex investigations in minutes while quickly identifying infection spread and applying accumulated learning across IT and security teams. Leveraging the FactorChain acquired domain expertise, natively developed capabilities to correlate and prioritize threats with unique insight across the application and infrastructure layer will focus joint security and IT teams on the right threats to investigate.  Learning on both workflow and data models from these services will provide insight on other IT and security processes including alert tuning, configuration, policy, prioritization, etc.

“Cloud and modern application deployments demand a fundamentally new approach to security threat investigation - workflows must span both the application and infrastructure layers, integrate seamlessly across both Security and ITOps, and enable resolution in minutes,” said Dave Frampton, founder and CEO for FactorChain. “FactorChain’s innovations in web speed contextual search, information models for rapid insight in large data sets, and investigation workflows which maximize human & machine synergy will combine with Sumo Logic’s machine data analytics platform to scale security for cloud & modern application delivery. We’re thrilled to join the SumoLogic team are pursue our shared vision of a new converged security IT model for the cloud.”

As part of the acquisition, Sumo Logic has incorporated the entire FactorChain team along with Industry veteran leadership into its engineering and product teams. Dave Frampton, FactorChain co-founder and CEO, will be VP of Security Solutions leading the company’s security analytics business. Ken Tidwell, FactorChain co-founder and CTO and former chief architect of ArcSight, will be VP of Security Engineering leading the security analytics development and architecture.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1659
PUBLISHED: 2019-02-21
A vulnerability in the Identity Services Engine (ISE) integration feature of Cisco Prime Infrastructure (PI) could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. The vulnerability is due to...
CVE-2019-8983
PUBLISHED: 2019-02-21
MDaemon Webmail 14.x through 18.x before 18.5.2 has XSS (issue 1 of 2).
CVE-2019-8984
PUBLISHED: 2019-02-21
MDaemon Webmail 14.x through 18.x before 18.5.2 has XSS (issue 2 of 2).
CVE-2018-20122
PUBLISHED: 2019-02-21
The web interface on FASTGate Fastweb devices with firmware through 0.00.47_FW_200_Askey 2017-05-17 (software through 1.0.1b) exposed a CGI binary that is vulnerable to a command injection vulnerability that can be exploited to achieve remote code execution with root privileges. No authentication is...
CVE-2018-6687
PUBLISHED: 2019-02-21
Loop with Unreachable Exit Condition ('Infinite Loop') in McAfee GetSusp (GetSusp) 3.0.0.461 and earlier allows attackers to DoS a manual GetSusp scan via while scanning a specifically crafted file . GetSusp is a free standalone McAfee tool that runs on several versions of Microsoft Windows.