1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Award winning SIEM
by Bhabesh Raj Rai, Security ResearchOn June 2, 2022, Atlassian released a security advisory for [...]
by Bhabesh Raj Rai, Security ResearchOn May 27, 2022, a security researcher highlighted a malicious [...]
by Bhabesh Raj Rai, Security Research In this month’s patch Tuesday, Microsoft fixed a high [...]
by Aida Grollov, Product Marketing Manager, LogpointDid you know that SAP customers generate 87% of [...]
Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]
by Bhabesh Raj Rai, Security ResearchAmong developers, ngrok is a popular reverse proxy utility for [...]
by Gustav Elkjær Rødsgaard, Junior Security AnalystIn 2019 Netwalker, a type of ransomware that is [...]
by Bhabesh Raj Rai, Security ResearchEven the most sophisticated and advanced state-sponsored attackers leave digital [...]
Security is a huge part of any digital transformation, however, according to a recent Ponemon [...]
By Ivan Vinogradov, Security analyst, Logpoint, and Jan Quach, Global Director of Customer Success Engineering, [...]
by Bhabesh Raj Rai, Security Research DepartmentOn January 25, 2022, Qualys disclosed the details of a memory [...]
Our free guide “Meeting Information Security Standards with SAP Security” provides recommendations and best practices [...]