Blog

What is CEO Fraud - and how can LogPoint detect it?

  About CEO Fraud By Prabhat Pokharel & Cintia Szabó, April 25, 2017 CEO fraud is the most recent generation of cyber crimes, which involves impersonation of the CEO and other senior business managers, by using social engineering attacks to trick someone at the organization into wiring business money to the fraudsters. The U.S. Federal Bureau of Investigation (FBI) has warned about a dramatic increase in Business E-Mail Scams, known as CEO fraud, which has, over the past three years, cost organizations more than $2.3 billion in losses. Many organizations think email...

LogPoint secures $10 million in funding led by Evolution Equity Partners

LogPoint positioned to accelerate growth with advanced analytics and machine learning driving the next generation of SIEM. Copenhagen – April 4, 2017 LogPoint, the next-generation security information and event management (SIEM) and big data analytics platform, today announced it has secured $10 million in Series B funding from Evolution Equity Partners. The funding will enable LogPoint to enter the next phase of growth; fueling expansion in new markets and providing for continuous enhancement of the LogPoint Enterprise SIEM platform. LogPoint enables enterprises to proactively monitor...

New Release of Logpoint Agent

Introducing the latest release of the LogPoint Agent. By Christian Have, VP of product management in LogPoint - March 2017 After a long period of development, we are now ready with the largest feature release of the LogPoint agent in the history of LogPoint. With this release the agent will be faster, more stable and offer more features. Combined with the recent changes in LogPoint 5.6 (Policy Based Routing), the new agent can make drastic cuts in resource consumption! New Features  File Integrity Monitoring and Windows Registry Scanning is now supported. The agent now...

Releasing 5.6.0

Releasing LogPoint 5.6.0 By Christian Have, VP of product management in LogPoint - March 2017 We are proud to announce LogPoint 5.6! Since our last large upgrade back in April 2016 (5.5.0), we have had minor releases and in parallel worked on this release.  Note: Please go through the release notes and ensure you have prepared your platform and fulfilled all the prerequisites before upgrading. New Features  Policy Based Routing The feature allows your organization to: Reduce costs of storage: Filter messages before they are stored. Optimize workflows:...

Detecting Ransomware with LogPoint

Detecting Ransomware with LogPoint By Thorsten Mandau, Senior Pre-Sales Consultant, CISSP, LogPoint - February 2017 Ransomware is doubtless a rising threat nowadays, putting all small, medium-sized and large businesses at risk. Our IT and security professionals at LogPoint are constantly working to help our clients withstand such attacks. When fighting ransomware, planning and forethought are crucial so you can limit the impact and quickly recover with minimal disruption. Keep in mind that ransomware variants are constantly changing, and it's hard to thwart every attack...

Ingesting Vulnerability Management data to LogPoint

Ingesting Vulnerability Management data to LogPoint  February 2017 Getting Qualys VM data into LogPoint is something many of our customers have been asking for. In this document we outline how data is pulled from the Qualys Reporting API, into LogPoint for easy analysis, correlation and reporting.  Overview  When you are using Qualys, either from the cloud or via an on premise appliance, the scan results and management of the scan is maintained from the Qualys Cloud. Qualys exposes an API that LogPoint uses to pull the data. To get started you have to download the Qualys...

Introducing LogPoint Free

Introducing LogPoint Free...! December 13, 2016 We are excited to announce that we are introducing a new way of experiencing LogPoint! LogPoint Free is a completely free version of LogPoint, which lets you ingest up to 350 events per second (eps), from up to 10 nodes. LogPoint Free provides full LogPoint functionality, access to support, Help Center and Community.    Free Extension The LogPoint Free license runs for 90 days but can be extended for free upon request. You can also easily upgrade to a LogPoint license if needed. Is LogPoint Free for you? LogPoint Free is...

Syscall Auditing in Unix

Syscall Auditing in Unix By Prabhat Pokharel, KB Lead Architect at LogPoint, December 09, 2016.  Logging defaults from Linux is great for many different aspects of security. Going the step deeper allows for more granular security monitoring with deeper insights. Today in this blog, we introduce how to use auditd to achieve much deeper security analytics. We will go through auditing of file access in Unix environment using the syscall (system calls). Communication between software and a linux kernel is handled by syscall.  Here we'll use auditd tool for...

Risk for Security and Compliance

Risk for Security and Compliance: Vulnerabilities in Industrial Systems By Pascal Cronauer, Country Manager DACH at LogPoint, December 5, 2016 Industrial systems are often inadequately protected against cyberattacks. But the threats have become greater in light of digital integration. Through digital integration, it has become more difficult to secure SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems), and the potential threat has increased due to the changing risk landscape. The latest generation of SCADA systems has consistently networked control...

Threat Intelligence: The Other Side of Security

Threat Intelligence: The Other Side of Security. By Frédéric Saulet, Regional Director of Southern Europe. November 28, 2016 There are almost as many definitions of Threat Intelligence as there are security vendors! In my view, Threat Intelligence is the capacity to identify the signs of compromise in an infrastructure that the organization must do something about. To do that, the logs in that infrastructure must be analysed so as to identify the faint signals that can indicate a potential attack.  In a Big Data environment, event and security data management by a SIEM can...

VIEW MORE ENTRIES

Why LogPoint?

With LogPoint, you will discover a full enterprise SIEM solution. 

LogPoint is EAL 3+ certified and the solution is tailored to solve the specific security management challenges of your business - whether the goal is compliance, forensics or operational insight.

And the best part..? We have the most predictable licensing model in the industry.