• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    State of Managed Security services: How MSSPs can Capture New Business
    State of Managed Security services: How MSSPs can ...

    A report outlining how MSSPs can capture business opportunities based on what drives customers to...

    Logpoint 2025 predictions: Cybersecurity in transformation
    Logpoint 2025 predictions: Cybersecurity in transf...

    Here are Logpoint's 2024 predictions: Technological advancements provide cybersecurity teams with...

    EDR Killers: After All, EDRs Are Not Invincible
    EDR Killers: After All, EDRs Are Not Invincible

    EDR Killers are a growing cybersecurity threat in 2025 - Read our report and find out how Logpoint...

    Director’s latest release: Take Total Control of Your MSSP Business
    Director’s latest release: Take Total Control of Y...

    For MSSPs who strive at managing multiple tenants' security, Director gives the more control to run...

    Webinar: Ingesting data from Kubernetes
    Webinar: Ingesting data from Kubernetes

    Join our webinar about Applied Analytics to get an introduction to how Logpoint can help you bridge...

    Exploring Strela Stealer: Initial Payload Analysis and Insights
    Exploring Strela Stealer: Initial Payload Analysis...

    Learn more about the techniques employed by StrelaStealer during its infection and how to leverage...

    Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
    Hiding in Plain Sight: The Subtle Art of Loki Malw...

    Learn more about the techniques employed during Loki malware infection and how Logpoint SIEM can...

    Uncover more resources with Logpoint’s latest release
    Uncover more resources with Logpoint’s latest rele...

    With improvements in SIEM, Automation and Case Management, Logpoint's latest release helps...

    Latrodectus: The Wrath of Black Widow
    Latrodectus: The Wrath of Black Widow

    Latrodectus, also known as BlackWidow, was developed by the same creators of IcedID malware,...

    Logpoint and Muninn: Better Together
    Logpoint and Muninn: Better Together

    Adding AI-driven Network Detection & Response (NDR) capabilities to Logpoint’s Security Information...

    How to use Logpoint pySigma Backend for threat detection
    How to use Logpoint pySigma Backend for threat det...

    There’s no doubt that open-source projects are immense contributors to the software ecosystem. With...

    Shenanigans of Scheduled Tasks
    Shenanigans of Scheduled Tasks

    Updated August 26, 2024 Scheduled Tasks are the automated processes configured to run automatically...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy