1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Executive Summary:First appeared in June 2022, still active and victimizing high-profile targets.Second Highest number of [...]
By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]
As cybersecurity becomes increasingly vital to the way we manage our computer systems, it's important [...]
We’ve all heard the phrase “new year, new me,” but in the world of cybersecurity, [...]
If you’re running a business in 2023, having a watertight cybersecurity infrastructure in place is [...]
By Swachchhanda Shrawan Poudel, Security ResearchContentsCrypto mining fast factsThe current landscape of crypto miningHow cyber-miners [...]
SAP is one of the largest software companies in the world, providing enterprise application software [...]
by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes [...]
We take it by now you have heard of crypto currency, so we won’t insult [...]
There are few sectors where privacy is as essential as it is in healthcare. People's [...]
In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and [...]
by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the [...]