• Responding to the WannaCry malware

    Update: Read our latest blog post on our newly released WannaCry ApplicationAs WannaCry has wrecked havoc over [...]

  • Big Data Analytics

    Teaching the Big Boys to ShareJake Anthony – Sales Engineering Manager, LogPointBig Data and Big [...]

  • Detecting ransomware with LogPoint

    By Thorsten Mandau Senior Pre-Sales Consultant, CISSP, LogPoint - February 2017 Ransomware is doubtless a rising threat [...]

  • Ingesting vulnerability management data to LogPoint

    February 2017Getting Qualys VM data into LogPoint is something many of our customers have been [...]

  • Threat Intelligence: The other side of security

    There are almost as many definitions of Threat Intelligence as there are security vendors!In my [...]

  • How to: Create long-term complex correlations with alert feedback

    By Julien Soukhavong, Security Consultant, November 16, 2016.Feedback from correlated events can be extremely useful for [...]

  • Durham County Council reduces data log analysis costs by 50% with real-time analysis and security tool | Finance Digest Magazine

    LogPoint's SIEM tool will also help the organisation deal with increasing IT demands [...]

  • A better way of updating LogPoint

    By Christian Have, VP Product & innovation, November 7, 2016.We have all been there; we just [...]

  • How to reduce the impact of ransomware

    By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016.One of the big concerns at the moment [...]

  • Would shared UK digital infrastructure reinforce council security practices?

    Graeme Stewart, Managing Director of LogPoint UK and Ireland, discusses the lessons UK local government [...]

  • Normalization part II

    By Thomas Have, VP Product Development, 22 August 2016 Welcome to the second instalment [...]

  • More data, more intelligence – the use of SIEM beyond compliance

    SIEM (Security Information and Event Management) technology is growing in popularity in Europe as [...]