1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely [...]
Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]
In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily [...]
In the seemingly never-ending quest to stay relevant and competitive in the tech industry the [...]
In today's interconnected world, the risk of cyber threats and attacks is ever-present. The escalating [...]
In today's ever-evolving cybersecurity landscape, organizations face a growing number of sophisticated threats. To effectively [...]
Fast FactsLockBit is a highly persistent and sophisticated ransomware that operates on the Ransomware-as-a-Service (RaaS) [...]
When it comes to cybersecurity, your organization is never too safe. However, adversaries will always [...]
Updated July 18, 2023Fast FactsCVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability.No [...]
If you’ve invested in SAP SuccessFactors, you’ve taken a big step toward modernizing your human [...]
Executive Summary BianLian ransomware surfaced in June 2022 and has been a persistent threat to [...]
In the quest of increasing their security posture, organizations tend to think that security operations [...]