Listing Thumbnail

    Logs for Security (AWS Built-In)

     Info
    Deployed on AWS
    Monitor your entire AWS environment in minutes. Sumo Logic integrates with your AWS SaaS services, providing unparalleled visibility into your cloud infrastructure and security data at scale.
    4.4

    Overview

    Logs for Security provides a unified security and compliance audit view of your AWS infrastructure and insight into threat activity across that environment. It leverages native AWS tools and telemetry to accelerate the work of development, operations, security, and reliability management teams in maintaining security, monitoring their environment, and managing their risk and attack surface.

    Modern ever-changing cloud environments need ongoing audits of configuration, vulnerability, versioning, activity, and other factors to ensure they are well maintained and not subject to vulnerability created by aging or drifting configuration, access rights, or software. Logs for Security helps teams get rapid, ongoing security visibility into the diverse aspects of their environment and provides customizable alerting, evaluation, and remediation of issues.

    Sumo Logic rapid onboarding process makes setup easy, allowing AWS users to visualize and begin improving the security posture of their environments in minutes.

    New Sumo Logic AWS Built In automation and integration. An AWS Certified deployment that reduces the time and effort to configure your multi-account environment, starting with AWS Control Tower and key Cloud Foundational Services to achieve a stronger security posture that drives efficiency and reduces risk in your business critical applications.

    The price below is for a two year subscription to ingest up to 5 GB per day. If you require more than 5 GB per day, please contact your AWS sales representative.

    Highlights

    • Unified security visibility and analytics across your entire AWS environment using native and 3rd-party data sources.
    • Integrated threat intel which accelerates threat detection and reduces the time to detect and investigate
    • Global Intelligence Service that creates statistical baselines for Amazon GuardDuty and AWS CloudTrail to help accurately pinpoint investigations and resources

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Logs for Security (AWS Built-In)

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    24-month contract (1)

     Info
    Dimension
    Description
    Cost/24 months
    5GB/Day Ingest
    5GB/day ingest with 365 days retention
    $13,350.00

    Vendor refund policy

    Please see seller website for refund details.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Start by visiting Sumo Logic Support at https://support.sumologic.com/support/s/  or email us directly at support@sumologic.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Log Analysis
    Top
    25
    In Security
    Top
    25
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Unified Security Visibility
    Provides unified security and compliance audit view across entire AWS infrastructure using native and third-party data sources with analytics capabilities
    Threat Intelligence Integration
    Integrates threat intelligence to accelerate threat detection and reduce time to detect and investigate security incidents
    Statistical Baseline Analysis
    Leverages Global Intelligence Service that creates statistical baselines for Amazon GuardDuty and AWS CloudTrail to pinpoint investigations and resources
    Multi-Account Environment Configuration
    Supports AWS Certified deployment with AWS Control Tower integration for automated configuration of multi-account environments
    Customizable Security Alerting
    Provides customizable alerting, evaluation, and remediation capabilities for configuration, vulnerability, versioning, and activity monitoring
    Cloud Native Application Protection Platform
    Adversary-focused Cloud Native Application Protection Platform with holistic intelligence providing end-to-end protection from host to cloud
    Multi-Cloud Threat Detection and Response
    Threat detection and response capabilities across AWS, Azure, and GCP with industry-fastest threat detection and response mechanisms
    Container and Kubernetes Security
    Container and Kubernetes protection with container image security, runtime protection, and support for on-premises, hybrid, and multi-cloud environments
    Cloud Security Posture Management
    Continuous posture management with discovery, visibility, and compliance monitoring across cloud infrastructure with automated misconfigurations detection
    Workload Runtime Protection
    Workload runtime protection with automated discovery, EDR for cloud workloads and containers, and managed threat hunting on a single lightweight agent
    Threat Detection Engine
    Library of 900+ out-of-the-box detections with user and attacker behavior analytics backed by community threat intelligence
    Data Ingestion and Integration
    Ingests CloudTrail, GuardDuty, EC2 network traffic, raw logs via SQS from multiple AWS accounts, on-premises networks, remote endpoints, and SaaS solutions
    Investigation and Response Capabilities
    Visual investigation timeline with detailed log timelines, automated response workflows, and instant actions such as asset quarantining
    Deception Technology
    Honeypots, honey credentials, and honey files for layered defense mechanisms
    Compliance and Monitoring
    File Integrity Monitoring (FIM) with support for PCI, HIPAA, and GDPR compliance requirements, plus detection of new AWS regions, services, and EC2 instance types

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    391 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    60%
    36%
    3%
    0%
    1%
    6 AWS reviews
    |
    385 external reviews
    External reviews are from G2  and PeerSpot .
    Pavan Pavan

    Automated threat insights have reduced detection time and improved SOC investigation efficiency

    Reviewed on Feb 24, 2026
    Review provided by PeerSpot

    What is our primary use case?

    The main use case for Sumo Logic Security  is as a SIEM  platform where our customers prefer it to gather logs from multiple places and have good detections, especially Sumo Logic insights, which is helping us a great deal to detect and correlate logs from different platforms and consolidate them into one insight. It helps for investigation and analysis. The major part is threat detection and threat analysis.

    What is most valuable?

    The best features of Sumo Logic Security  are automated log and event correlation, which may come from a firewall event, and User Entity Behavior Analytics (UEBA ) for detecting impossible travel and unusual access times. Threat intelligence enrichments are good, and the MITRE ATT&CK framework is beneficial. The centralized log search for investigation is better compared to multiple SIEM  solutions, where I can query everything in one place. The SEC records feature, something that returns index=sec_records, provides all the logs from different places. Pre-built dashboards and analytics, especially threat trends and the anomalies that return compliance patterns, are valuable. The workflow, including playbooks and workflows, can be triggered when we need to quarantine an endpoint, revoke credentials, or block IPs. Most importantly, it is cloud-native and has elastic scale. As a cloud-native SIEM, it scales up very well automatically, and real-time threat detection is available.

    One of the most important things is MTTD, which is faster threat detection that reduced our MTTD, and we were able to detect alerts with multiple detections that used to take hours. Now the correlated alerts surface the real threat very quickly. Detection time has dropped significantly. We used to have MTTD of three to four hours, but now it is under 30 minutes. Automatically, our mean time to response has also increased substantially. Analysts are able to quickly pivot items and make faster decisions, especially without switching between tools. We have all our EDR tools and firewalls integrated to the same platform and viewing everything there. As a SOC, which faces major problems, it reduced the alert fatigue by over 100 days of low volume alerts, which have been made into insights, and this has greatly improved our alert efficiency and decision quality, the way we are able to enrich information. Operation stability has also improved very much. It has significantly impacted our organization, and our KPIs have improved substantially with respect to this.

    What needs improvement?

    If I want to mention anything related to Sumo Logic Security, I would say that with the current AI situation, AI enrichments should be very well integrated. I saw something in insights that it is doing something around 14 days of correlation, but I would prefer something around seven days would be better. Sometimes we see alerts coming from a different time frame. In some places, correlation could be much better in Sumo Logic. There is a scenario where we see five to six employees from the company log in from the same IP address, which is a shared IP address. Maybe one employee has login failures, perhaps because they forgot their password. In this situation, Sumo Logic gives us an alert saying that a brute-force alert was detected or a credential compromise was detected, stating that five people have successful logins and one user has a bad password. This is not practically correct detection. They should be doing some kind of better analysis, such as a historical analysis of this IP, to make it clear that this IP is a shared IP, so the logins that happened for all other users are normal. Sumo Logic has the capability as a modern SOC to include behavior correlation or attack chain visibility, which would be a great addition to reduce false positives. Good dashboards with AI capabilities would also be more helpful.

    Since our product is also AI-based, something where they can focus more on AI with the possibility of detection engineering, writing custom correlation rules, and tuning detections to make more valid true positives would be beneficial. I have experienced some situations where false positives occurred. There can be more improvement in MITRE ATT&CK mapping, especially, as it helps us measure coverage gaps and where we are positioned. Beyond that, SOAR  capabilities with automation focus should include more enrichments into the detection part and provide higher levels of true positives overall. When I compare Sumo Logic Security with other solutions like Splunk, Azure Sentinel , or Sentinel  One, these are improvements I would expect to see.

    Automation should be improved further. As we move to AI SOC, there is talk of automated multi-step response workflows where playbooks should be enriched for logs of different activities based on IP, user, user agent, or other fields. More advanced playbook-based correlation should be coming up with a set of rules that can help detect real true positives. Rich incident response playbooks and better integrations with ticketing tools would be beneficial so that we can take quick actions if a breach has been identified. Advanced attack path visualizations would be helpful. Creating a good attack graph showing when something has been detected, how quickly it has been investigated, what the timeline of all these activities was, and including entities such as user, host, network, cloud, or indicators of compromise would be valuable. Built-in threat group playbooks would be very helpful, whether for ransomware, account compromise, or data exfiltration. AI-driven threat insights at the automated flow of investigation would be more helpful. Sumo Logic Security is very good at role-based access controls, and we were able to manage that very well without any issues. Advanced attack path visualizations and built-in threat group playbooks for ransomware, account compromise, or data exfiltration scenarios would enhance the platform significantly.

    For how long have I used the solution?

    I have been using Sumo Logic Security for the past four years in my previous two organizations.

    What do I think about the stability of the solution?

    Sumo Logic Security is stable. It operates very well as a cloud-native SaaS platform with high availability, and there is no downtime that I have experienced. Sometimes we had API integration issues, but the platform scales up automatically without any performance degradation, especially with large volumes of logs without any failures in ingestion. This is something that I have seen be difficult in other places. It does not require any hardware and patch management, which is another good thing for being stable. These are some of the reasons why I would say it is stable.

    What do I think about the scalability of the solution?

    Sumo Logic Security scales up automatically because it is a cloud-native SIEM, and I do not need to worry about hardware clusters or capacity planning. The platform grows as security data grows. Real-world ingestion limits, cold versus hot data performance, and retention implications on the cost and query performance under high load are all handled very well. It supports business growth, as when the company grows, security analytics also grows with more servers, more users, and more applications, but without infrastructure headaches. Onboarding is something that I need to mention as well. I can ingest identity logs, endpoint detections, or any type of logs without worrying about underlying capacity. I was able to ingest all types of logs with Sumo Logic Security. In other platforms, we faced some challenges with complexities, especially in terms of handling the hardware part as well.

    How are customer service and support?

    Support for Sumo Logic Security is good. We have had a couple of issues, especially with the technical support team troubleshooting problems, particularly around API integration issues, but they had a faster response time. I would score them around 9 out of 10. Direct support includes documentations, tutorials, and training access along with community forums, which helps us resolve many questions independently without reaching out to them. Where we have faced some challenges, I would say it may be because of region-specific support in India or Europe, as some support times were slower. Some tickets even took two weeks when we were finding issues with email-related matters. Everything else is good because their documentation is very helpful and querying is also very good. They have a limited direct call option for support, but the response is good, and technically they will explain everything we need to do. Premium support is also available. The customer support is very good with them, and the documentation is helping us to fix issues today.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We used Devo  and Splunk before Sumo Logic Security. Due to our organization's budget platforms and other factors, we switched to Sumo Logic to have our SIEM. We used to face challenges before, such as storage clusters and scaling issues, and the detection part was very much worse in other SIEMs. I may not give specific details, but Sumo Logic insights are playing a major role today in our investigation and reporting parts. I have used Splunk, Devo , and even ArcSight.

    What was our ROI?

    As I mentioned, we have 100% return on investment very well. I have experienced that we used to have over 100 alerts where we needed eight analysts, but now we are able to operate with five analysts because the time drop in investigation has been from 20 to 40 minutes. We have saved 64 hours of our time overall. Before we used to have eight analysts, now we have at least five analysts and we are able to do the work completely. We have a good return on investment in terms of even the log retention part as well.

    Which other solutions did I evaluate?

    We have not typically evaluated other solutions as alternatives. As I mentioned, we used Splunk, Azure Sentinel , and Devo. We directly switched to Sumo Logic Security as per our organization's needs. We had used different SIEM platforms as well.

    What other advice do I have?

    I would say to define especially what problems they have, particularly the threat detection part, incident response part, reporting part, cloud security monitoring, or insider threat analytics. They need to plan their log strategy about how much quality versus quantity they require and send only meaningful logs while filtering out debug and low-level information that makes noise. Categorizing the logs by priority is one of the most important things. Using something with very much tiered retention periods is helpful because Sumo Logic Security provides pre-built dashboards, correlation rules, analytics, and threat intelligence feeds. That is going to be helping. I would recommend investing in training, as good training helps the team write more effective queries, build custom correlation rules, alert tuning, and perform threat hunting. These are things to focus on, which especially help the organization. Measure metrics as well, such as MTTD, MTTR, false positive rate, analyst hours worked, and threat signals escalated, as these are outstanding for Sumo Logic Security.

    Regarding additional thoughts about Sumo Logic Security before wrapping up, I would mention improvement in the detection part with AI integration regarding log summarization and advanced analytics, which should be part of the roadmap. Also, how Sumo Logic Security is going to handle scalability, such as onboarding different data sources or tuning alerts. The major direction I am interested in seeing is how Sumo Logic Security will move forward with AI-based SOC capabilities, as that is the next era of SIEM tools. I would give Sumo Logic Security an overall rating of 8 out of 10.

    Genesis M.

    Flexible Record Analysis with Clean, Shareable Dashboards

    Reviewed on Feb 19, 2026
    Review provided by G2
    What do you like best about the product?
    I really like how flexible it is for analyzing records. The visual dashboards are not only clean, but also very easy to share, which makes collaboration a lot smoother.
    What do you dislike about the product?
    You have to stay vigilant, because if you leave a console.log file behind or forget about it, it can generate gigabytes of garbage. Then your bill becomes an unpleasant surprise.
    What problems is the product solving and how is that benefiting you?
    I’ve been spared the hassle of installing patches, which gives me real peace of mind about potential attacks; it’s a very intelligent tool. On top of that, thanks to its anomaly detection, it alerts me when something is off before the system crashes.
    Hu D.

    Great Log Search, Overall Solid Experience

    Reviewed on Feb 11, 2026
    Review provided by G2
    What do you like best about the product?
    What stands out to me is Sumo Logic’s real-time analytics and ease of deployment. The agent-based and API-driven ingestion makes onboarding fast, and the query language is powerful yet intuitive. The platform’s machine learning capabilities for anomaly detection are also valuable for proactive threat detection and operational visibility.
    What do you dislike about the product?
    While the query language is powerful, there can be a learning curve for teams coming from tools like Splunk or Elastic. Advanced queries and dashboard optimization sometimes require deeper platform familiarity.
    What problems is the product solving and how is that benefiting you?
    For me, the benefit is better decision-making. Instead of reacting to incidents blindly, I get actionable insights—whether that’s identifying anomalous behavior, proving compliance with logging requirements, or correlating security and operational events in one platform.
    Frank Krieger

    Modern security platform has reduced alert fatigue and supports a small SOC across multi-cloud

    Reviewed on Feb 10, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Sumo Logic Security  encompasses all three areas: SIEM , SOAR , and log management.

    What is most valuable?

    Sumo Logic Security  offers excellent features including ease of use. I came from a competing product, Splunk, and I was able to recycle a lot of the knowledge from that tool into Sumo because the logic was very similar.

    Beyond the ease of use, the consumption model of Sumo Logic Security is also easy to understand, which was helpful. The build-out with Sumo was very good, as they spent a lot of time ensuring that we were sized correctly for the product, and the follow-ups were good. Sumo Logic Security has really good customer support.

    The capabilities of Sumo Logic Security in providing security visibility across multi-cloud and hybrid environments are very good, particularly because Mambu  is still a multi-cloud vendor, and the product worked extremely well in that scenario.

    Regarding the automated TDRI workflows in Sumo Logic Security, they are excellent. I would put them at the top because they are truly useful and actually work as advertised.

    My experience with Sumo Logic Security has been good. My SOC analysts were crushed under Splunk, but Sumo has actually eased the workload and made it tolerable for three people.

    The improvements or benefits I have seen from Sumo Logic Security relate to alerts. We were buried under alerts and Sumo actually helped us clean that up. The number one value is being able to action things in a proper time frame.

    What needs improvement?

    A more transparent roadmap as to what Sumo Logic Security is trying to achieve would be beneficial. Sumo often gives information in three-month cycles, which makes it hard for planning purposes.

    For how long have I used the solution?

    I have been using Sumo Logic Security for about a year and a half.

    What do I think about the stability of the solution?

    In terms of stability, Sumo Logic Security rates a ten; it has been up.

    What do I think about the scalability of the solution?

    Regarding scalability, I give Sumo Logic Security a nine. I have yet to run into an issue with scalability, but we really have not tested it.

    How are customer service and support?

    The build-out with Sumo was very good, as they spent a lot of time ensuring that we were sized correctly for the product, and the follow-ups were good. Sumo Logic Security has really good customer support.

    The interactions have been extremely good, and the account team is great, so I never feel as though they just forgot us.

    I rate the technical support for Sumo Logic Security a nine.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I came from a competing product, Splunk, and I was able to recycle a lot of the knowledge from that tool into Sumo because the logic was very similar.

    When comparing Sumo Logic Security to Splunk or other vendors, the models are vastly different. Sumo's consumption model is easier to understand, while Splunk's is much more complex. Additionally, the Splunk service was not really fit for the size of our organization, which was about 1,000 people as it was a much more robust solution for something larger.

    How was the initial setup?

    The initial deployment of Sumo Logic Security was complex, but working with Sumo made it very easy.

    It took three months to deploy Sumo Logic Security.

    What about the implementation team?

    I do use the SOC analyst agent for alert triage. I have three SOC analysts.

    What was our ROI?

    The return on investment I have seen with Sumo Logic Security in the past year and a half is tough to quantify, but I would estimate it has hit the milestones we set internally for return on investment, as we have not looked at the product and said it is not paying for itself.

    What's my experience with pricing, setup cost, and licensing?

    When it comes to pricing, I would say Sumo Logic Security is in the upper middle-class tier. It is not expensive, but it is not inexpensive, sitting between those two.

    From one to ten, where one is cheap and ten is expensive, I would put Sumo Logic Security at a seven.

    What other advice do I have?

    Regarding the effectiveness of AI-driven analytics in reducing the workload and response times, it is too early to tell, as it is something that recently came out and we have not consumed it yet.

    My impressions on the built-in threat intelligence feature are not bad. I would give them four out of five stars. They tend to be very good, but very specific to certain situations.

    The impact of Sumo Logic Security in prioritizing alerts has been hard to quantify at this stage, as we are still trying to determine the value of that.

    I could not tell you if the knowledge agent has helped improve onboarding efficiency because we do not utilize that function.

    When it comes to how much time Sumo Logic Security saves, I would not say it is a time saver. It is an FTE saver. It did not really make my analysts work less in a day. They still have to work, but it avoided the need to procure more analysts to do the work.

    Sumo Logic Security has probably saved us three FTEs.

    Approximately 15 users utilize Sumo Logic Security.

    Sumo Logic Security does not require any maintenance as it is a SaaS-based solution. We do not have to patch it, maintain it, or host it.

    Sumo Logic Security was purchased through an engagement that was done pre-Marketplace, but it was purchased through Marketplace.

    My advice for others looking to implement Sumo Logic Security would be three things: first, do a proof of concept because these solutions are very expensive. Second, definitely keep involved with Sumo through the entire process, making them a partner throughout the process. Third, and this is the most critical one, definitely take time to size your environments correctly because once you sign those contracts, that is the size.

    I rate this review an overall eight.

    Juliana M.

    Visually Powerful KPIs and Time-Saving LogReduce/LogCompare

    Reviewed on Feb 09, 2026
    Review provided by G2
    What do you like best about the product?
    I like it because it’s visually powerful and flexible when it comes to displaying availability KPIs. On top of that, tools like LogReduce and LogCompare save me hours of work by filtering out noise and junk in the logs, so I can focus on what really matters.
    What do you dislike about the product?
    The downside is that if the Data Tiers aren’t configured correctly, the bills can increase considerably.
    What problems is the product solving and how is that benefiting you?
    It has benefited me by breaking down data silos through the integration of operational and security visibility. It has also taken a weight off my shoulders when it comes to audit compliance.
    View all reviews