1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Wordpress Developer
Compliance is one of the biggest hurdles for any business and is only getting more [...]
Speakers, Sergio Lozano Alvarez, Product Marketing Manager, Edy Almer, Product Director.Familiarize yourself with Logpoint's latest [...]
Presenters: Sergio Lozano Alvarez, Product Marketing Manager, Louis Worrell – Sales Engineer An increasing number of [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]
By Nilaa Maharjan and Anish Bogati, Security Research Foreword: Ransomware is a type of [...]
On-demand Webinar Why NIS2 is a Gamechanger The NIS2 directive adopted by the European Parliament [...]
The latest update of Logpoint’s Converged SIEM is here!Security analysts will receive a wide set [...]
Introducing AgentX, a brand new Endpoint Security element that's native to our Converged SIEM platform.AgentX [...]
Cybersecurity is an essential practice for safeguarding data within business-critical systems and applications.Criminals are likely [...]
By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]
By Swachchhanda Shrawan Poudel, Security ResearchContentsCrypto mining fast factsThe current landscape of crypto miningHow cyber-miners [...]
by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes [...]