• Logpoint 2022 Predictions: The year of holistic threat detection and incident response

    By Christian Have, CTO, LogpointWhen the time comes to make predictions for the coming year, [...]

  • Status on Log4j vulnerability in LogPoint

    Last updated 20/12/2021, 10 am CESTStatus of Log4j vulnerability in LogPointRecently, a critical remote code [...]

  • Detecting Log4Shell requires more than just a SIEM

    by Bhabesh Raj, Associate Security Analyst Engineer and Kennet Harpsøe, Senior Cyber AnalystThe Log4Shell vulnerability is [...]

  • The Remote Access Trojan (RAT), a Legacy Product at a Mass Market Price

    By Gitte Gade, Product Marketing Manager, LogPointThe Remote Access Trojan (RAT) can be considered a [...]

  • SAP under attack: Be aware of the gap

    Christoph Aschauer, Director, LogPoint for SAPSAP is a market leader in enterprise application software and [...]

  • The importance of SAP® Read Access Log in times of GDPR

    The protection of corporate intellectual property is becoming more and more important in times of [...]

  • Detecting Privilege Escalation Zero Day (CVE-2021-41379)

    by Bhabesh Raj Rai, Associate Security Analytics Engineer On November 22, 2021, Security researcher Abdelhamid [...]

  • Implementing a Syslog Proxy compliant with LogPoint

    PurposeThough syslog protocol is very common, some customers are experiencing challenges to set it up [...]

  • Add Netflow log ingestion to LogPoint

    Netflow support is available in LogPoint and requires the Netflow Application to be installed. Once [...]

  • Implementing SOAR Solutions: How Do You Select the Best SOAR Tools?

    The world of security is changing and evolving, and traditional perimeter security is no longer [...]

  • Using SOAR to improve your cybersecurity posture

    Effective cybersecurity is an important goal for every business. More so, as many companies have [...]

  • A shift from detection to holistic response

    By Christian Have, LogPoint CTOThe capabilities of SOAR are driving the shift from security analytics [...]