1000+ clients, 12 ans de solutions de premier ordre
SIEM
Automation
Case Management
Behavior Analytics
Sécurité des produits
SIEM Sizing Calculator
Produit Tours
EDR
Sécurité essentielle à l’entreprise
Logpoint Director
MITRE ATT&CK framework
Top 10 des cas d’usage SIEM
Conformité
Détection des menaces
Sécurité SAP
Opérations de sécurité
Protection contre les menaces
Intégrations au cloud
Éducation
Vente au détail
Administration publique
Services financiers
Infrastructure critique
Pharmaceutiques
Fabrication
Services
Partenaires
Blog
Webinaires
Brochures et PDF
Espace Presse
Logpoint Support & Services
Contacter Logpoint
Documentation
Communauté
February 2017Getting Qualys VM data into LogPoint is something many of our customers have been [...]
There are almost as many definitions of Threat Intelligence as there are security vendors!In my [...]
By Julien Soukhavong, Security Consultant, November 16, 2016.Feedback from correlated events can be extremely useful for [...]
By Christian Have, VP Product & innovation, November 7, 2016.We have all been there; we just [...]
By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016.One of the big concerns at the moment [...]
By Thomas Have, VP Product Development, 22 August 2016 Welcome to the second instalment [...]
Christian Have LogPoint as a product has many ways of visualising data that is [...]
By Thomas Have, VP Product Development, 19 July 2016. In a previous blog post, we [...]
By Janne Nyman, Managing Director at Newman IT SolutionsLeading up to my annual holiday, I [...]
By Nicolai Zerlang, Marketing Manager, LogPointThis post is intended to describe initiatives and processes designed [...]
By Christian Have, CPO Many organizations face challenges of securing and monitoring endpoints beyond [...]