LogPoint
LogPoint
Blog Post
  • We are excited to announce the launch of LogPoint version 6.2.0, characterized by new, cutting edge data visualization. Besides refining the existing ways of visualising data, LogPoint 6.2.0 contains six additional innovative charts suitable for four different response types. We at LogPoint know that having the data is not sufficient without powerful visualisations to [...] The post Introducing Lo...

LogPoint
LogPoint
Blog Post
  • Source: Data Protection Risk and Regulation in the Global Economy, Ponemon Institute LLC, June 2016 Several organizations are currently undertaking GDPR implementation – but many lack the technology to map and protect the data required in order become GDPR compliance. By imposing compliance requirements against advanced algorithms for detecting unusual patterns of activity you [...] The post GDPR ...

LogPoint
LogPoint
Blog Post
  • User and Entity Behavioral Analytics (UEBA) solutions have been around for some time, and you may be wondering what they are and if you need one. UEBA tools analyze the behavior of users and entities (hosts, devices, files and transactions) to find interesting or malicious behaviors and patterns. Essentially, UEBA makes your security team [...] The post Why do you need UEBA? appeared first on LogP...

LogPoint
LogPoint
Blog Post
  • Ransomware is without doubt one of the most rising threats nowadays, and the latest outbreak proves that all small, medium-sized and large organisations are at risk. At LogPoint our IT and security professionals constantly work on helping our clients withstand attacks like these. When fighting ransomware, planning and forethought are crucial in order for [...] The post Bad Rabbit Ransomware appear...

LogPoint
LogPoint
Blog Post
  • Today we have released our application to detect the KRACK attacks. For detailed information about the attack please refer to https://www.krackattacks.com/. Since the attack can target both infrastructure and endpoints, patching the infrastructure alone will not be sufficient to protect against the attacks. Patching endpoints will be a tedious process for large organizations, especially if [...] T...

LogPoint
LogPoint
Blog Post
  • Andy Deacon, Pre Sales Manager UK & I, LogPoint There are lots of different reasons why you might need to consider safeguarding, but how does it affect your organization, what are your obligations ? It could be mandated via industry guidance, regulation or legislation. Maybe it’s more moralistic or driven by social responsibility. Whatever the [...] The post Safeguarding – Your moral duty of care...

LogPoint
LogPoint
Blog Post
  • An increase of dangerous Advanced Persistent Threats (APT) attacks was reported by Symantec last week. The sophisticated attack group Dragonfly (also known as Energetic Bear), is reportedly behind. Dragonfly 2.0, as this wave of attacks is dubbed, appears to have begun already in 2015 and share tactics earlier used by the group to infiltrate [...] The post The re-emergence of Dragonfly appeared fi...

LogPoint
LogPoint
Blog Post
  • LogPoint, the next-generation security information and event management (SIEM) and big data analytics platform, today announced award winning technology distributor e92plus as sole distributor of the LogPoint Enterprise SIEM Solution in the UK and Ireland.   The partnership will play a key role in expanding LogPoint’s channel community and managed services in the region and [...] The post LogPoint...

LogPoint
LogPoint
Blog Post
  • How is your organization preparing to deal with the new and sophisticated cyber threats? Here at LogPoint, we’ve worked hard to develop a world-class SIEM solution, which minimizes threat detection and response time and gives your organization a streamlined overview of its data. We stay on top of things. In the current environment, [...] The post LogPoint at the RSA Conference appeared first on Lo...

LogPoint
LogPoint
Blog Post
  • LogPoint at the RSA Conference How is your organization preparing to deal with the new and sophisticated cyber threats? Here at LogPoint, we’ve worked hard to develop a world-class SIEM solution, which minimizes threat detection and response time and gives your organization a streamlined overview of its data. We stay on top of things. In the current environment, nonetheless, many organizations ha...

LogPoint
LogPoint
Blog Post
  • LogPoint adds UEBA module to its Next Generation SIEM solution LogPoint and Fortscale join forces on the embedded UEBA engine, Presidio. This will enable hundreds of LogPoint’s SIEM platform customers, to natively detect malicious activity of users and entities, with advanced machine learning analytics. Copenhagen, Denmark; San Francisco, CA, Sep 18, 2017 LogPoint, big data analytics and Security ...

LogPoint
LogPoint
Blog Post
  • The re-emergence of Dragonfly Created by Nicolai Zerlang, September 11, 2017 An increase of dangerous Advanced Persistent Threats (APT) attacks was reported by Symantec last week. The sophisticated attack group Dragonfly (also known as Energetic Bear), is reportedly behind. Dragonfly 2.0, as this wave of attacks is dubbed, appears to have begun already in 2015 and share tactics earlier used by the...

LogPoint
LogPoint
Blog Post
  • Petya/NotPetya Created by Roshan Pokharel, June 29, 2017 A new ransomware outbreak named "Petya", similar to WannaCry malware, was seen on June 27, 2017. This malware spread quickly and affected various organizations in Europe and the US. The ransomware was thought to be a variant of Petya family but researcher determined that they are not related and now renamed to "NotPetya". Petya/NotPetya do...

LogPoint
LogPoint
Blog Post
  • Introducing the WannaCry application  By Prabhat Pokharel, Roshan Pokhrel & Cintia Szabó, May 16, 2017 After our blog post on Sunday regarding the WannaCry malware breakout, LogPoint today is excited to announce our turn-key application to detect and respond to WannaCry. The application works on LogPoint and LogPoint Free, works for all types of devices  (firewalls, content security appliances, fi...

LogPoint
LogPoint
Blog Post
  • By Christian Have, VP Products & Innovation, May 13, 2017 Update: Read our latest blog post on our newly released WannaCry Application As WannaCry has wrecked havoc over the weekend, many organizations will face the impact of the malware during the beginning of the week. WannaCry is a ransomware attack that exploits the MS17-010 vulnerability. Infection After exploiting the vulnerability the ma...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.