• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Director’s latest release: Take Total Control of Your MSSP Business
    Director’s latest release: Take Total Control of Y...

    As Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) continue to...

    Exploring Strela Stealer: Initial Payload Analysis and Insights
    Exploring Strela Stealer: Initial Payload Analysis...

    In cybersecurity research, it’s easy to get caught up in the pursuit of uncovering new...

    Uncover more resources with Logpoint’s latest release
    Uncover more resources with Logpoint’s latest rele...

    The cybersecurity industry is grappling with a massive shortage of skilled professionals while...

    Logpoint and Muninn: Better Together
    Logpoint and Muninn: Better Together

    Adding AI-driven Network Detection & Response (NDR) capabilities to Logpoint’s Security...

    How to use Logpoint pySigma Backend for threat detection
    How to use Logpoint pySigma Backend for threat det...

    There’s no doubt that open-source projects are immense contributors to the software...

    Shenanigans of Scheduled Tasks
    Shenanigans of Scheduled Tasks

    Updated August 26, 2024 Scheduled Tasks are the automated processes configured to run...

    Threat Detection and Monitoring with Microsoft 365
    Threat Detection and Monitoring with Microsoft 365

    There’s no doubt that Microsoft 365 is widely used among companies of all sorts of sizes. This...

    The Story of regreSSHion: A Resurfaced sshd Vulnerability
    The Story of regreSSHion: A Resurfaced sshd Vulner...

    In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and...

    Logpoint’s latest release: Gain control over your security operations
    Logpoint’s latest release: Gain control over your ...

    Organizations depend on their security analyst to detect, investigate, and respond to any...

    Beginners guide to SAP Security: Why is it important and how does it work?
    Beginners guide to SAP Security: Why is it importa...

    Organizations widely use SAP systems to perform daily operations throughout almost every step...

    Inside DarkGate: Exploring the infection chain and capabilities
    Inside DarkGate: Exploring the infection chain and...

    As the threat landscape continually evolves, some positive developments, such as authorities...

    The importance of visibility for effective cloud security
    The importance of visibility for effective cloud s...

    The greater adoption of cloud technology has transformed how organizations operate, expand,...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy