1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Wordpress Developer
We take it by now you have heard of crypto currency, so we won’t insult [...]
In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and [...]
by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the [...]
by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German [...]
When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in [...]
By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP [...]
By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your [...]
By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]
You may have noticed that, over the last two years, it seems that cyberattacks are [...]
Emails house a treasure trove of data, but what kind of data do they contain? [...]
By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]