1,000+ Customers, 12 years of best-in-class solutions
Converged SIEM
SIEM
SOAR
UEBA
Endpoint Security
SAP Security
Multitenancy
Product Security
SIEM Sizing Calculator
MITRE ATT&CK framework
Product Demo Tours
Early Access Program
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Documentation
Community
Award winning SIEM
Title: Infrastructure and Cloud SecurityPresenters: Sergio Lozano Álvarez and Adrien DebosschereDescriptionThe security challenge remains the [...]
Global cyber onslaughts were witnessed in 2023 across industries, affecting many organizations, and exposing millions [...]
Presenters: Sergio Lozano Alvarez (Product Marketing Manager), Henrik Berggren (Senior Sales Engineer).Key Webinar Info: Threat hunting [...]
Webinar Details: Presenters: Gail Carpenter, Head of Field and Channel Marketing, Nils Krumrey - Senior Sales [...]
Presenters: Sergio Lozano Alvarez, Product Marketing Manager, Louis Worrell - Sales EngineerKey Webinar Info:Ransomware is [...]
Struggling with SIEM pricing complexity? Explore our guide for insights into various models, hidden costs, and why Logpoint's transparent approach stands out.
Sometimes different tools can have overlapping functionalities/capabilities, which may prove to be confusing to decision-makers. [...]
By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]
NIS2 builds on the requirements of the original directive; it still aims to protect critical [...]
Discover the latest updates to SOAR, bringing ease of work to your security operations platform.In [...]
Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely [...]
In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily [...]