• Webinar on demand: Maximizing your investment in Converged SIEM with Threat Hunting

    Presenters: Sergio Lozano Alvarez (Product Marketing Manager), Henrik Berggren (Senior Sales Engineer).Key Webinar Info: Threat hunting [...]

  • Webinar on demand: Reducing the risk of data exfiltration with Converged SIEM

    Webinar Details: Presenters: Gail Carpenter, Head of Field and Channel Marketing, Nils Krumrey - Senior Sales [...]

  • Decoding the Threat: HTML Smuggling Detection Essentials

    Modern web applications perform most of their processing and rendering on the client side, enhancing [...]

  • Webinar on demand: Winning the war against ransomware attacks with Converged SIEM

    Presenters: Sergio Lozano Alvarez, Product Marketing Manager, Louis Worrell - Sales EngineerKey Webinar Info:Ransomware is [...]

  • The ultimate SIEM pricing guide

    Struggling with SIEM pricing complexity? Explore our guide for insights into various models, hidden costs, and why Logpoint's transparent approach stands out.

  • Emerging Threat: Cactus, a new player in the ransomware game – Is it the last?

    Fast FactsCactus ransomware has been active since March 2023 and has been targeting high-profile targets [...]

  • The difference between SIEM and EDR (SIEM vs EDR)

    Sometimes different tools can have overlapping functionalities/capabilities, which may prove to be confusing to decision-makers. [...]

  • Phishing and Quishing – Email Investigation and Response Using Logpoint

    Fast FactsPhishing is the most common form of cybercrime, with an estimated 3.4 billion spam [...]

  • Introducing Vulnerability Monitoring Analyzer: Your SAP Security Patch Solution

    Streamline SAP security patch management to safeguard your business from unnecessary threats.SAP continually releases security [...]

  • Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]

  • Preventing data exfiltration with Logpoint

    Losing control over your organization’s data is one of the main concerns for businesses and [...]

  • On Demand: Defending Against 8base

    The threats 8base poses to organizations have made headlines, and we held a webinar discussing [...]