1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Wordpress Developer
Large databases housing valuable information are an appealing target for threat actors. After all, it’s [...]
by Bhabesh Raj Rai, Security ResearchOn September 29, 2022, Microsoft confirmed reports of adversaries exploiting [...]
by Sükrü ilkel Birakoglu, Senior Director Business Critical Systems house a wealth of business-critical data relating [...]
XDR offerings are gaining popularity at an exponential rate. Many cybersecurity vendors have adapted the [...]
by Sükrü ilkel Birakoglu, Senior Director In all common programming languages, faults during development may lead [...]
As volumes of data increase exponentially, businesses are seeking more and more help from Managed [...]
Managed Detection and Response (MDR) services play a hugely valuable role for their clients.Some clients [...]
A Managed Security Service Provider’s (MSSP) number one priority is to ensure that clients stay [...]
By Dmitry Gutsko, SAP Security ExpertWe know that SAP database systems are often overlooked when [...]
-Nilaa Maharjan Logpoint Global Services & Security ResearchExecutive Summary:QakBOT, also spelled Quakbot is an old [...]
Matthew Rhodes, Regional Director, MSSP and Consulting PartnersManaged Security Service Providers (MSSPs) find themselves faced [...]
by Nilaa Maharjan, Security ResearchInternal penetration testing often requires security specialists to attempt to extract [...]