1,000+ Customers, 12 years of best-in-class solutions
Converged SIEM
SIEM
SOAR
UEBA
Endpoint Security
SAP Security
Multitenancy
Product Security
SIEM Sizing Calculator
MITRE ATT&CK framework
Product Demo Tours
Early Access Program
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Documentation
Community
Wordpress Developer
We take it by now you have heard of crypto currency, so we won’t insult [...]
In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and [...]
by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the [...]
by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German [...]
When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in [...]
By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP [...]
By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your [...]
By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]
You may have noticed that, over the last two years, it seems that cyberattacks are [...]
Emails house a treasure trove of data, but what kind of data do they contain? [...]
By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]