LogPoint
LogPoint
Blog Post
  • The Retail Industry are vulnerable to Cyberattack as the custodians of large amounts of sensitive customer information, ranging from credit card details to information about personal preferences. The significance of this responsibility cannot be underestimated as it directly affects Consumer confidence in Retail Brands. Retailers must able to detect and react to Cyberthreats in [...] The post Cust...

LogPoint
LogPoint
Blog Post
  • Join LogPoint’ Friday webinar where you will learn how: LogPoint SIEM solution is tailored to solve the specific security management challenges of any organisation, whether the goal is compliance, application security monitoring, operational insight or protection from cyber attacks. LogPoint believes that a SIEM solution is only as powerful as the data it contains therefore healthcare organisation...

LogPoint
LogPoint
Blog Post
  • Join LogPoint’ Friday webinar where you will learn how: LogPoint SIEM solution is tailored to solve the specific security management challenges of any organisation, whether the goal is compliance, application security monitoring, operational insight or protection from cyber attacks. LogPoint believes that a SIEM solution is only as powerful as the data it contains therefore healthcare organisation...

LogPoint
LogPoint
Blog Post
  • Join LogPoint’ Friday webinar where you will learn how: LogPoint SIEM solution is tailored to solve the specific security management challenges of any organisation, whether the goal is compliance, application security monitoring, operational insight or protection from cyber attacks. LogPoint believes that a SIEM solution is only as powerful as the data it contains therefore healthcare organisation...

LogPoint
LogPoint
Blog Post
  • By Thomas Have, VP Product Development, 22 August 2016Welcome to the second instalment of our blog post series on normalization. In the first instalment, we described what normalization is in LogPoint and the benefits it provides. In this instalment, we will dig into the technical details of how normalization is done.Collectors & FetchersTo properly describe normalization [...] The post Normalizat...

LogPoint
LogPoint
Blog Post
  • By Thomas Have, VP Product Development, 19 July 2016.In a previous blog post, we described a new compiled normalizer for Windows. Continuing that, this blog post is the first in a series of blog posts on normalization in LogPoint in general. In this first instalment, we will explain what normalization means in a LogPoint context. The [...] The post Normalization appeared first on LogPoint.

LogPoint
LogPoint
Blog Post
  • U.S. government authorities have issued warnings about malware attacks related to the Hidden Cobra group. In response LogPoint has developed a Hidden Cobra Application specifically designed to detect Joanap and Brumbul malware, that seems to be the current Hidden Cobra weapons of choice. The LogPoint Hidden Cobra App is available to all LogPoint users [...] The post Facing the Hidden Cobra threat:...

LogPoint
LogPoint
Blog Post
  • Hidden Cobra is an APT hacking group mostly targeting against media organizations, aerospace, financial and critical infrastructure across the globe. The malware Hidden Cobra uses Remote Access Trojan (RAT) called Joanap and Server Message Block (SMB) worm called Brambul.Indicator of Compromise1. Check for file integrity. Possible indicators of compromise are hash values listed below:4613f51087f01...

LogPoint
LogPoint
Blog Post
  • The Danish National Police Cyber Crime Center (NC3) are reporting an increasing number of cyberattacks via Office 365. The LogPoint SIEM solution can track data breaches in the Office 365 environment real-time by detecting lateral movements within the network including exploitation of privileges.Copenhagen – May 29, 2018 – The warning issued by the Danish National [...] The post Detect and prevent...

LogPoint
LogPoint
Blog Post
  • Michael Persechini joins LogPoint Inc. based in Boston, MA, as VP of Sales to establish a Channel Partner based sales operation across the U.S. market. As a Cybersecurity veteran, Michael has been involved in all stages of the rapidly developing security industry. His new mission is to help US enterprises reduce risk, time [...] The post LogPoint employs former Cisco Cybersecurity Sales Leader Mic...

LogPoint
LogPoint
Blog Post
  • The usual vendors in the SIEM market are facing tough competition as Log-Point is moving into the US. LogPoint offers proven Next-Generation SIEM ca-pabilities: Easy to integrate, deploy and maintain while challenging legacy providers by offering a node-based licensing model, rather than traditional models based on ever-growing data volumes and unpredictable costs Copenhagen– [...] The post LogPoi...

LogPoint
LogPoint
Blog Post
  • Andrew Morris joins LogPoint with a demonstrable history of success in building and leading high-performance sales organizations. His merits include 5 years running the EMEA partner and cloud business at Splunk, where he led record quarters and delivered significant year-over-year growth. At LogPoint, he will be charged with heading up and driving the [...] The post Industry veteran and SIEM pione...

LogPoint
LogPoint
Blog Post
  • Join LogPoint’s Friday webinar where you will learn how: LogPoint's SIEM solution is tailored to solve specific security management challenges of any e-organization, whether the goal is compliance, security monitoring,  operational insight or protection from cyber-attacks LogPoint believes that a SIEM solution is only as powerful as the data it contains therefore, healthcare organizations [...] Th...

LogPoint
LogPoint
Blog Post
  • Join LogPoint’s Friday webinar where you will learn how: LogPoint's SIEM solution is tailored to solve specific security management challenges of any e-organization, whether the goal is compliance, security monitoring,  operational insight or protection from cyber-attacks LogPoint believes that a SIEM solution is only as powerful as the data it contains therefore, healthcare organizations [...] Th...

LogPoint
LogPoint
Blog Post
  • We are excited to announce the launch of LogPoint version 6.2.0, characterized by new, cutting edge data visualization. Besides refining the existing ways of visualising data, LogPoint 6.2.0 contains six additional innovative charts suitable for four different response types. We at LogPoint know that having the data is not sufficient without powerful visualisations to [...] The post Introducing Lo...

LogPoint
LogPoint
Blog Post
  • Source: Data Protection Risk and Regulation in the Global Economy, Ponemon Institute LLC, June 2016 Several organizations are currently undertaking GDPR implementation – but many lack the technology to map and protect the data required in order become GDPR compliance. By imposing compliance requirements against advanced algorithms for detecting unusual patterns of activity you [...] The post GDPR ...

LogPoint
LogPoint
Blog Post
  • User and Entity Behavioral Analytics (UEBA) solutions have been around for some time, and you may be wondering what they are and if you need one. UEBA tools analyze the behavior of users and entities (hosts, devices, files and transactions) to find interesting or malicious behaviors and patterns. Essentially, UEBA makes your security team [...] The post Why do you need UEBA? appeared first on LogP...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.