Monitor and solve cases through orchestration and automation (when used with SOAR) helping standardize response
Automate what really matters to accelerate triage and investigation
Ready-to-use normalization transforming log data from different sources into a single language to create high-quality data for analysis
Alert taxonomy. A consistent representation that is mapped to MITRE.
Ready to use playbooks triggered by use cases, other playbooks or by an analyst as part of the lifecycle of a case ensuring repeatable, documented and structured ways of tackling investigation and response.
Use cases. Including, how to tackle phishing emails, ransomware on an endpoint of malicious insiders.
Actions: Such as taking on external systems to drive orchestration.
Integrations: Connecting to external systems that enable Logpoint to collect data from or perform a response action.