1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
By Christian Have, CTO, LogpointWhen the time comes to make predictions for the coming year, [...]
Last updated 20/12/2021, 10 am CESTStatus of Log4j vulnerability in LogPointRecently, a critical remote code [...]
by Bhabesh Raj, Associate Security Analyst Engineer and Kennet Harpsøe, Senior Cyber AnalystThe Log4Shell vulnerability is [...]
By Gitte Gade, Product Marketing Manager, LogPointThe Remote Access Trojan (RAT) can be considered a [...]
Christoph Aschauer, Director, LogPoint for SAPSAP is a market leader in enterprise application software and [...]
The protection of corporate intellectual property is becoming more and more important in times of [...]
by Bhabesh Raj Rai, Associate Security Analytics Engineer On November 22, 2021, Security researcher Abdelhamid [...]
PurposeThough syslog protocol is very common, some customers are experiencing challenges to set it up [...]
Netflow support is available in LogPoint and requires the Netflow Application to be installed. Once [...]
The world of security is changing and evolving, and traditional perimeter security is no longer [...]
Effective cybersecurity is an important goal for every business. More so, as many companies have [...]
By Christian Have, LogPoint CTOThe capabilities of SOAR are driving the shift from security analytics [...]