1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Award winning SIEM
Originally By Ivan Vinogradov, Security Analyst, Logpoint - updated Oct 2023Data exfiltration is the practice [...]
By Bhabesh Raj Rai, Associate Security Analytics Engineer The October release of Oracle's quarterly Critical [...]
By Martha Chrisander, Head of Product Marketing, LogPoint The latest LogPoint release is all about [...]
Cyber security and choosing the right Security Analytics is one of the, if not the [...]
Managed security service providers (MSSPs) handle multiple customers within their technology stack. Therefore they need [...]
Updated July 2023Finding the right balance between digitalization and data accessibility is not an easy [...]
Modern SIEM is a cornerstone technology in modern Cybersecurity and the Security Operations Center (SOC). [...]
Modern businesses have become reliant on data analytics, especially within cybersecurity, IT operations and compliance. [...]
By Nils Krumrey, Global Customer Success Manager, Logpoint When customers speak to us, the number [...]
By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On February 11, 2020, Microsoft released [...]
By Ivan Vinogradov, Solution Architect, LogPoint Risky insiders (also known as insider threats) are one [...]
By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint Cryptomining malware was extremely popular in [...]