1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Award winning SIEM
In IT security circles, Emotet is one of the most notorious and prominent examples of [...]
Cybercriminals use increasingly sophisticated methods to steal data and commit fraud. Yet, it's often the [...]
While malware is one of the biggest cyber threats we deal with today, it has [...]
Implementation of the General Data Protection Regulation (GDPR) in May 2018 revolutionized how businesses in [...]
By Bhabesh Raj Rai, Associate Security Analytics Engineer On December 13, 2020, CISA released Emergency [...]
By Bhabesh Raj Rai, Associate Security Analytics Engineer On Tuesday, December 8, FireEye disclosed that they [...]
When most people think of the word “Trojan,” images of the Trojan horse come to [...]
Updated Jan 2024Your home probably houses some vital possessions and heirlooms, so when you leave [...]
By Bhabesh Raj Rai, Associate Security Analytics Engineer First discovered in August 2018, Ryuk is [...]
Anyone who does anything online should be aware of the risk of a cyber attack. [...]
Originally By Friedrich von Jagwitz, Sales Engineer - Updated 30 August 2023What is Lateral Movement?Lateral [...]
Every user, device or system in a network leaves behind a virtual trail of security [...]