1,000+ Customers, 12 years of best-in-class solutions
Converged SIEM
SIEM
SOAR
UEBA
Endpoint Security
SAP Security
Multitenancy
Product Security
SIEM Sizing Calculator
MITRE ATT&CK framework
Product Demo Tours
Early Access Program
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Documentation
Community
Ensuring your organization is secure, and stays that way, is not an easy job. There [...]
Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]
SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires [...]
Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information [...]
You could be forgiven for thinking it's the month of snake, as the Russian Intelligence’s [...]
Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose in the [...]
With the advent of cloud and container technologies, businesses and organizations are adopting them at [...]
Securing your SAP systems and applications is one of our top priorities. We want you [...]
Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]