Home/Why Choose Logpoint?/Product Recognitions

Product & Service Recognitions

We are committed to creating the best SIEM in the world and with a large variety of solutions we built to achieve this, we have already gained significant awareness as well as product & service recognitions from research & advisory companies based on their technical knowledge as well as the feedback of our customers.

Gartner logo
Gartner-Peer-Insights-Customers-Choice-badge

Logpoint receives top scores on SIEM and SOAR in G2 peer-to-peer reviews

Peer reviewers on the independent software review platform G2 have awarded Logpoint top marks in their reviews of SIEM and SOAR platforms. We are incredibly proud to be ranking as a Leader in the G2 Grid® for SOAR and among the top vendors in SIEM. In both the SOAR and SIEM categories on G2, Logpoint receives an overall G2 Score (rating) of 4.5 out of 5.

Logpoint again breaks the scale in the Info-Tech 2021 Emotional Footprint report

With an overall Customer Satisfaction score of 9,2 (out of 10), Logpoint is defined as an “Outlier” among Champions in the Info-Tech 2021 Emotional Footprint report for SIEM. Logpoint demonstrates an industry-leading ability to establish and maintain a positive vendor-customer relationship while delivering product effectiveness.

Info tech Emotional Footprint

Logpoint breaks the scale in the Info-Tech 2020 Emotional Footprint report

With an overall Customer Satisfaction score of 9,3 (out of 10) vs. the 8,2 industry average, Logpoint is defined as an “Outlier” among Champions in the Info-Tech 2020 Emotional Footprint report for SIEM. Logpoint demonstrates an industry-leading ability to establish and maintain a positive vendor-customer relationship while delivering product effectiveness.

Info tech Emotional Footprint
Trusted by Thousands, Guarding Millions

Get Started with Logpoint

Book a personal demo and discover the benefits of our Converged SIEM platform that combines data analytics, incident automation, behavioral analytics, mission-critical security, and endpoint security.