1,000+ Customers, 12 years of best-in-class solutions
SIEM
NDR
Automation
Case Management
Micosoft Defender XDR
Marketplace
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Data Privacy Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic [...]
The webinar is now on demand and is hosted by Logpoint and has Marc Noergaard [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]
When purchasing a new security solution, decision-making is rarely an individual process but rather an [...]
By Nilaa Maharjan and Anish Bogati, Security Research Foreword: Ransomware is a type of [...]
Incident response follows threat detection, and is usually the last step leading up to a [...]
Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and has released [...]
Successfully detect, monitor, and mitigate compliance risks with a holistic vulnerability management solution.SAP SuccessFactors is [...]
On-demand Webinar Why NIS2 is a Gamechanger The NIS2 directive adopted by the European Parliament [...]
In the current cybersecurity landscape, MSSPs play a crucial role in delivering the management and [...]