Features in LogPoint


Features in LogPoint

By utilizing the LogPoint solution, you can monitor and access systems where sensitive personal data is stored as well as monitor security across all systems and receive alerts when they are relevantly triggered.  Below are some of the key LogPoint Use Cases when it comes to supporting the GDPR.


Gain an overview of attempts to compromise privileged data in your company.

Screen Shot 2017 04 05 at 7.33.18 PM

LogPoint provides an overview of user access to files and transfers of data to, e.g., removable devices, ensuring confidentiality and integrity of the data and providing an opportunity to pinpoint lost data and to aid in required and relevant data recoveries. 

Screen Shot 2017 04 05 at 8.01.42 PM


By chapter 3 of the GDPR about the rights of Data Subjects, the collection of personal data must be limited to what is necessary for the purpose of the collection and similarly must not be retained in a form that allows for identification for any longer than necessary for the purpose, for which it was collected.

Data Erasure, also known as “the right to be forgotten," ensures that data has to be erased once it's no longer needed. In other words, users should not specify that a particular data sample has to be erased, but the process should be implicitly defined and automated by your company.

LogPoint provides organizations with an overview of user accounts to allow for data rectification and erasure. Additionally, applying a data retention policy ensures that personal data is not retained for longer than necessary, while LogPoint’s routing policy enhances the feature of data erasure on a granular level.

Screen Shot 2017 04 05 at 8.16.52 PM


The prohibition on personal data transfers outside the EU and certain territories deemed Adequate Jurisdictions, necessitates a solid understanding of the organization's cross-border data flow to ensure that transfers take place in a lawful manner

LogPoint provides organizations with an overview of international data transfers, allowing the organization to map these crucial data movements.

Screen Shot 2017 03 31 at 3.02.15 PM


The compliance demonstration and 72-hour breach notification requirements require both optimized investigation and reporting processes.

LogPoint enables a significantly improved ability for organizations to design and deliver reports. Reports can be created as deep-dives within silos; this includes complex reports on Exchange audit information or SAP purchasing transactions etc.

Reports can also be generated cross-platform, showing relationships between different components in the enterprise, such as how changes in firewalls can impact the availability of business services or how changes in the corporate website affect the capacity of firewalls. Reports can build on collected events as well as correlation with external data sources.
If you want to gain a better insight into the features of LogPoint, you can get started by downloading our free version

Check here, which features are available in the free version or download it directly using the form below and get it running in less than 5 minutes!

Why LogPoint?

With LogPoint, you will discover a full enterprise SIEM solution. 

LogPoint is EAL 3+ certified and the solution is tailored to solve the specific security management challenges of your business - whether the goal is compliance, forensics or operational insight.

And the best part..? We have the most predictable licensing model in the industry.