1,000+ Customers, 12 years of best-in-class solutions
Converged SIEM
SIEM
SOAR
UEBA
Endpoint Security
SAP Security
Multitenancy
Product Security
SIEM Sizing Calculator
MITRE ATT&CK framework
Product Demo Tours
Early Access Program
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Documentation
Community
Award winning SIEM
In today's interconnected world, the risk of cyber threats and attacks is ever-present. The escalating [...]
In today's ever-evolving cybersecurity landscape, organizations face a growing number of sophisticated threats. To effectively [...]
Even though SAP SuccessFactors contains some of the organization’s most sensitive and regulated data, it [...]
SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires [...]
Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic [...]
The webinar is now on demand and is hosted by Logpoint and has Marc Noergaard [...]
By Santosh Nepal and Anish Bogati; Security ResearchUpdated on 21st AprilQuick Digest:When a new application [...]
by Nilaa Maharjan and Anish Bogati, Security ResearchA serious vulnerability tagged CVE-2023-23397 has recently been [...]
Threat hunting. What do you know about it? You hear it and read about it, [...]