1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
In cybersecurity research, it's easy to get caught up in the pursuit of uncovering new [...]
With the surge of cyberattacks, sharing threat intelligence in the form of insights, trends, and [...]
The cybersecurity industry is grappling with a massive shortage of skilled professionals while rising cyber [...]
Latrodectus, also known as BlackWidow, was developed by the same creators of IcedID malware, notoriously [...]
Adding AI-driven Network Detection & Response (NDR) capabilities to Logpoint’s Security Information and Event Management [...]
There’s no doubt that open-source projects are immense contributors to the software ecosystem. With an [...]
Updated August 26, 2024Scheduled Tasks are the automated processes configured to run automatically at a [...]
There’s no doubt that Microsoft 365 is widely used among companies of all sorts of [...]
In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and haunting us. Such [...]
Fast Facts OS Credential Dumping (T1003) is a critical cybersecurity threat. It involves stealing credential [...]
Fast Facts:The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia's military intelligence [...]
Every year, 34% of organizations are hit by insider attacks. Because the insider uses valid [...]