• Thoughts from a LogPointer: Normalization, The Unsung Hero

    By Alan Humphrey, LogPoint Enterprise Sales Manager noun: normalization the process of bringing or returning something [...]

  • The next evolution of SIEM and SOAR with LogPoint 7

    By Christian Have, LogPoint CTOEvolution is far from a linear process – just like in [...]

  • UEBA update enables peer grouping capabilities and more stable operations

    by Ira Lisa Kristina Leino Product Marketing ManagerAn update to our UEBA product will be [...]

  • Detecting, investigating and mitigating privilege escalation vulnerabilities to prevent full AD control

    by Bhabesh Raj Rai, Associate Security Analyst EngineerRecent Active Directory (AD) privilege escalation vulnerabilities allow [...]

  • LogPoint – A cloud-native SIEM+SOAR solution

    By Gitte Gade, Product Marketing Manager, LogPointLogPoint now offers a cloud-native SIEM platform that combines [...]

  • Streamline security operations with LogPoint 7

    By Gitte Gade, Product Marketing Manager, LogPointSOC teams often struggle with SIEM and SOAR systems [...]

  • Logpoint 2022 Predictions: The year of holistic threat detection and incident response

    By Christian Have, CTO, LogpointWhen the time comes to make predictions for the coming year, [...]

  • Status on Log4j vulnerability in LogPoint

    Last updated 20/12/2021, 10 am CESTStatus of Log4j vulnerability in LogPointRecently, a critical remote code [...]

  • Detecting Log4Shell requires more than just a SIEM

    by Bhabesh Raj, Associate Security Analyst Engineer and Kennet Harpsøe, Senior Cyber AnalystThe Log4Shell vulnerability is [...]

  • The Remote Access Trojan (RAT), a Legacy Product at a Mass Market Price

    By Gitte Gade, Product Marketing Manager, LogPointThe Remote Access Trojan (RAT) can be considered a [...]

  • SAP under attack: Be aware of the gap

    Christoph Aschauer, Director, LogPoint for SAPSAP is a market leader in enterprise application software and [...]

  • The importance of SAP® Read Access Log in times of GDPR

    The protection of corporate intellectual property is becoming more and more important in times of [...]