• Ingesting vulnerability management data to LogPoint

    February 2017Getting Qualys VM data into LogPoint is something many of our customers have been [...]

  • Threat Intelligence: The other side of security

    There are almost as many definitions of Threat Intelligence as there are security vendors!In my [...]

  • How to: Create long-term complex correlations with alert feedback

    By Julien Soukhavong, Security Consultant, November 16, 2016.Feedback from correlated events can be extremely useful for [...]

  • A better way of updating LogPoint

    By Christian Have, VP Product & innovation, November 7, 2016.We have all been there; we just [...]

  • How to reduce the impact of ransomware

    By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016.One of the big concerns at the moment [...]

  • Normalization part II

    By Thomas Have, VP Product Development, 22 August 2016 Welcome to the second instalment [...]

  • Creating realtime, moving dashboards for Big-Screen Operations

    Christian Have LogPoint as a product has many ways of visualising data that is [...]

  • Normalization

    By Thomas Have, VP Product Development, 19 July 2016. In a previous blog post, we [...]

  • My top 10 sites for security inspiration

    By Janne Nyman, Managing Director at Newman IT SolutionsLeading up to my annual holiday, I [...]

  • 6 steps towards superior organizational governance

    By Nicolai Zerlang, Marketing Manager, LogPointThis post is intended to describe initiatives and processes designed [...]

  • Agentless, WMI-Less collection of endpoint logs

    By Christian Have, CPO Many organizations face challenges of securing and monitoring endpoints beyond [...]