1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German [...]
When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in [...]
By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP [...]
By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your [...]
By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]
You may have noticed that, over the last two years, it seems that cyberattacks are [...]
Emails house a treasure trove of data, but what kind of data do they contain? [...]
By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]
by Sükrü ilkel Birakoglu, Senior Director Supplier diversity is a business strategy that ensures a diverse [...]
By Christian HaveAs 2023 closes in it’s time to make our predictions for the cybersecurity [...]
By Anish Bogati, Logpoint Global Services and Security ResearchContentsTL;DRWhat is Emotet?Fast FactsBackgroundEmotet operations, tactics and [...]